WorldWideScience

Sample records for protocols requiring varying

  1. Time-varying Capital Requirements and Disclosure Rules

    DEFF Research Database (Denmark)

    Kragh, Jonas; Rangvid, Jesper

    , implying that resilience in the banking system is also increased. The increase in capital ratios is partly due to a modest reduction in lending. Using a policy changes, we show that banks react stronger to changes in capital requirements when these are public. Our results further suggest that the impact......Unique and confidential Danish data allow us to identify how changes in disclosure requirements and bank-specific time-varying capital requirements affect banks' lending and capital accumu-lation decisions. We find that banks increase their capital ratios after capital requirements are increased...... of capital requirements differ for small and large banks. Large banks raise their capital ratios more, reduce lending less, and accumulate more new capital compared to small banks....

  2. Optimal protocol for maximum work extraction in a feedback process with a time-varying potential

    Science.gov (United States)

    Kwon, Chulan

    2017-12-01

    The nonequilibrium nature of information thermodynamics is characterized by the inequality or non-negativity of the total entropy change of the system, memory, and reservoir. Mutual information change plays a crucial role in the inequality, in particular if work is extracted and the paradox of Maxwell's demon is raised. We consider the Brownian information engine where the protocol set of the harmonic potential is initially chosen by the measurement and varies in time. We confirm the inequality of the total entropy change by calculating, in detail, the entropic terms including the mutual information change. We rigorously find the optimal values of the time-dependent protocol for maximum extraction of work both for the finite-time and the quasi-static process.

  3. Time-Varying Capital Requirements and Disclosure Rules

    DEFF Research Database (Denmark)

    Imbierowicz, Björn; Kragh, Jonas; Rangvid, Jesper

    2018-01-01

    We investigate how banks' capital and lending decisions respond to changes in bank-specific capital and disclosure requirements. We find that an increase in the bank-specific regulatory capital requirement results in a higher bank capital ratio, brought about via less asset risk. A decrease...

  4. Distributed project scheduling at NASA: Requirements for manual protocols and computer-based support

    Science.gov (United States)

    Richards, Stephen F.

    1992-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of Space Shuttle mission planning.

  5. An RCT protocol of varying financial incentive amounts for smoking cessation among pregnant women

    Directory of Open Access Journals (Sweden)

    Lynagh Marita

    2012-11-01

    Full Text Available Abstract Background Smoking during pregnancy is harmful to the unborn child. Few smoking cessation interventions have been successfully incorporated into standard antenatal care. The main aim of this study is to determine the feasibility of a personal financial incentive scheme for encouraging smoking cessation among pregnant women. Design A pilot randomised control trial will be conducted to assess the feasibility and potential effectiveness of two varying financial incentives that increase incrementally in magnitude ($20 vs. $40AUD, compared to no incentive in reducing smoking in pregnant women attending an Australian public hospital antenatal clinic. Method Ninety (90 pregnant women who self-report smoking in the last 7 days and whose smoking status is biochemically verified, will be block randomised into one of three groups: a. No incentive control group (n=30, b. $20 incremental incentive group (n=30, and c. $40 incremental incentive group (n=30. Smoking status will be assessed via a self-report computer based survey in nine study sessions with saliva cotinine analysis used as biochemical validation. Women in the two incentive groups will be eligible to receive a cash reward at each of eight measurement points during pregnancy if 7-day smoking cessation is achieved. Cash rewards will increase incrementally for each period of smoking abstinence. Discussion Identifying strategies that are effective in reducing the number of women smoking during pregnancy and are easily adopted into standard antenatal practice is of utmost importance. A personal financial incentive scheme is a potential antenatal smoking cessation strategy that warrants further investigation. Trial registration Australian New Zealand Clinical Trials Registry (ANZCTR number: ACTRN12612000399897

  6. Isolated cleft palate requires different surgical protocols depending on cleft type.

    Science.gov (United States)

    Elander, Anna; Persson, Christina; Lilja, Jan; Mark, Hans

    2017-08-01

    A staged protocol for isolated cleft palate (CPO), comprising the early repair of the soft palate at 6 months and delayed repair of the eventual cleft in the hard palate until 4 years, designed to improve maxillary growth, was introduced. CPO is frequently associated with additional congenital conditions. The study evaluates this surgical protocol for clefts in the soft palate (CPS) and for clefts in the hard and soft palate (CPH), with or without additional malformation, regarding primary and secondary surgical interventions needed for cleft closure and for correction of velopharyngeal insufficiency until 10 years of age. Of 94 consecutive children with CPO, divided into four groups with (+) or without (-) additional malformations (CPS + or CPS - and CPH + or CPH-), hard palate repair was required in 53%, performed with small local flaps in 21% and with bilateral mucoperiosteal flaps in 32%. The total incidence of soft palate re-repair was 2% and the fistula repair of the hard palate was 5%. The total incidence of secondary velopharyngeal surgery was 17% until 10 years, varying from 0% for CPS - and 15% for CPH-, to 28% for CPS + and 30% for CPH+. The described staged protocol for repair of CPO is found to be safe in terms of perioperative surgical results, with comparatively low need for secondary interventions. Furthermore, the study indicates that the presence of a cleft in the hard palate and/or additional conditions have a negative impact on the development of the velopharyngeal function.

  7. In vivo evaluation of an anti-PSMA antibody conjugated with varying numbers of biotin molecules in a pretargeting protocol

    International Nuclear Information System (INIS)

    Wilbur, D.S.; Hamlin, D.K.; Quinn, J.; Vessella, R.L.

    2003-01-01

    An investigation has been conducted to determine the effect of varying the number of biotin molecules conjugated with an anti-PSMA antibody (mAb) as part of our studies to optimize biotinylated antibodies and radiolabeled streptavidin in pretargeting protocols for Targeted Radionuclide Therapy of prostate cancer. In the investigation, the anti-PSMA antibody 107-1A4 was biotinylated with varying amounts of biotinamidocaproate N-hydroxysuccinimide ester. This procedure resulted in obtaining 107-1A4 with 2.3, 4.5, and 6.8 biotin conjugated as measured by the standard HABA assay. The biotinylated 107-1A4 was radioiodinated and was evaluated in a pretargeting protocol in athymic mice bearing LNCaP human tumor xenografts. In the protocol, 50 μg biotinylated [ 125 I]107-1A4 was injected, followed 48h later by 25 μg of avidin for blood clearance, and 1h after that 20 μg of radiolabeled succinylated recombinant streptavidin ([ 13 1I]sSAv) was administered. The tumor localization and tissue distribution was evaluated at 24, 48, and 72h post [ 131 I]sSAv injection. With 2.3 biotin/mAb, an approximate 1:1 molar ratio (4-5 pmol/g) of sSAv/mAb was obtained at all three time points. With 4.5 biotin/mAb, a 1:1 ratio was observed at 24h, but approx. 2: 1 was observed at 48 and 72h pi. With 6.8 biotin/mAb, sSAv/mAb ratios of approximately 1.5:1; 2:1; and 3:1 were obtained at 24, 48, and 72h pi respectively. The amount of sSAv localized in the tumor was nearly the same (4-5 pmol/g) when 107-1A4 had 2.3 or 4.5 biotin conjugated, but decreased to 3-4.5 pmol/g with 6.8 biotin conjugated. Because the highest levels of co-localized sSAv was found with the lowest number of biotin conjugates, the observed differences in ratios of sSAv/mAb may be best explained as differences in internalization, and degradation of mAb and protease resistant sSAv. In duplicate experiments, similar results were obtained with biotinylated 107-1A4 F(ab') 2 , but not with an mAb to a non-internalizing antigen

  8. Information required from States, including 'small quantities protocol' status, under the Protocol Additional to Safeguards Agreements

    International Nuclear Information System (INIS)

    Tuley, N.

    1999-01-01

    The Model, or Additional, Protocol to the Model Safeguards Agreement, INFCIRC/153, contains, inter alia, provisions for expanded declarations from Member States to the IAEA. These provisions include earlier design information declarations and information on fuel cycles activities, such a mining and milling, that were not previously part of safeguards. The session discusses the extent of the expanded declarations and provides examples of the forms that will be used to provide the information to the Agency. (author)

  9. Hyperbaric oxygen therapy for wound healing in diabetic rats: Varying efficacy after a clinically-based protocol.

    Directory of Open Access Journals (Sweden)

    Johan W van Neck

    Full Text Available Hyperbaric oxygen therapy (HBOT is a clinical treatment in which a patient breathes pure oxygen for a limited period of time at an increased pressure. Although this therapy has been used for decades to assist wound healing, its efficacy for many conditions is unproven and its mechanism of action is not yet fully clarified. This study investigated the effects of HBOT on wound healing using a diabetes-impaired pressure ulcer rat model. Seven weeks after streptozotocin-induced diabetes in rats (n = 55, a pressure ulcer was created on dorsal skin. Subsequently, animals received HBOT during 6 weeks following a standard clinical protocol (HBOT group with varying endpoints up to 42 days post-wounding versus controls without HBOT. Capillary venous oxygen saturation (SO2 showed a significant increase in the HBOT group on day 24; however, this increase was significant at this time point only. The quantity of hemoglobin in the micro-blood vessels (rHB showed a significant decrease in the HBOT group on days 21 and 42, and showed a trend to decrease on day 31. Blood flow in the microcirculation showed a significant increase on days 17, 21 and 31 but a significant decrease on days 24 and 28. Inflammation scoring showed significantly decreased CD68 counts in the HBOT group on day 42, but not in the early stages of wound healing. Animals in the HBOT group showed a trend for an increase in mean wound breaking strength on day 42.

  10. INTEGRATED DATA CAPTURING REQUIREMENTS FOR 3D SEMANTIC MODELLING OF CULTURAL HERITAGE: THE INCEPTION PROTOCOL

    Directory of Open Access Journals (Sweden)

    R. Di Giulio

    2017-02-01

    In order to face these challenges and to start solving the issue of the large amount of captured data and time-consuming processes in the production of 3D digital models, an Optimized Data Acquisition Protocol (DAP has been set up. The purpose is to guide the processes of digitization of cultural heritage, respecting needs, requirements and specificities of cultural assets.

  11. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    Directory of Open Access Journals (Sweden)

    Kevin McCluskey

    2017-08-01

    Full Text Available The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD. The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  12. Minimizing transfusion requirements for children undergoing craniosynostosis repair: the CHoR protocol.

    Science.gov (United States)

    Vega, Rafael A; Lyon, Camila; Kierce, Jeannette F; Tye, Gary W; Ritter, Ann M; Rhodes, Jennifer L

    2014-08-01

    Children with craniosynostosis may require cranial vault remodeling to prevent or relieve elevated intracranial pressure and to correct the underlying craniofacial abnormalities. The procedure is typically associated with significant blood loss and high transfusion rates. The risks associated with transfusions are well documented and include transmission of infectious agents, bacterial contamination, acute hemolytic reactions, transfusion-related lung injury, and transfusion-related immune modulation. This study presents the Children's Hospital of Richmond (CHoR) protocol, which was developed to reduce the rate of blood transfusion in infants undergoing primary craniosynostosis repair. A retrospective chart review of pediatric patients treated between January 2003 and Febuary 2012 was performed. The CHoR protocol was instituted in November 2008, with the following 3 components; 1) the use of preoperative erythropoietin and iron therapy, 2) the use of an intraoperative blood recycling device, and 3) acceptance of a lower level of hemoglobin as a trigger for transfusion (protocol implementation served as controls. A total of 60 children were included in the study, 32 of whom were treated with the CHoR protocol. The control (C) and protocol (P) groups were comparable with respect to patient age (7 vs 8.4 months, p = 0.145). Recombinant erythropoietin effectively raised the mean preoperative hemoglobin level in the P group (12 vs 9.7 g/dl, p protocol that includes preoperative administration of recombinant erythropoietin, intraoperative autologous blood recycling, and accepting a lower transfusion trigger significantly decreased transfusion utilization (p < 0.001). A decreased length of stay (p < 0.001) was seen, although the authors did not investigate whether composite transfusion complication reductions led to better outcomes.

  13. Approach to integrate current safeguards measures with additional protocol requirements at national level

    International Nuclear Information System (INIS)

    Ramirez, R.

    2001-01-01

    Peru adhered to the Additional Protocol in March 2000 which was also approved by the Congress in May 2001. After approval by law the obligations derived from this Additional Protocol will be in force after 180 days. After the signing of the Protocol an approach was designed to help better fulfill these requirements in an integrated way with the previous measures. As first stage, a review of the current state of safeguards was undertaken. Under the current agreement (an INFCIRC/153 type agreement) the reporting is less complicated and inexpensive to be carried out because these reports include only the declared nuclear material and the features of declared facilities where the nuclear material is used. No other related facility or material or activity needs to be declared. In Peru there are only two MBAs where low enriched uranium (LEU) is used and the record system includes general ledgers, inventory records and operational books. The results of national inspections and copies of reports and communications sent to the IAEA are also kept in this system. Under the agreement and subsidiary arrangements material balance reports (MBR), physical inventory listings (PIL) and inventory change reports (ICR) are prepared and submitted to the IAEA at scheduled periods. The MBR and PIL reports are sent after yearly regular inspections carried out by the IAEA. The ICR is sent just every time when an import or export of nuclear material is made. The time devoted to carry out all of these activities is not so extensive for both the State System for Accountability and Control (SSAC) and the users because of the limited nuclear activities in the country. Because of the characteristics and limited quantities of nuclear material the efforts for inspection and reporting activities are few. Another subject under review was the procedure for controlling the imports of nuclear material. Under the current agreement this subject was not a problem, as all of the radioactive and nuclear

  14. Results of a protocol of transfusion threshold and surgical technique on transfusion requirements in burn patients.

    Science.gov (United States)

    O'Mara, Michael S; Hayetian, Fernando; Slater, Harvey; Goldfarb, I William; Tolchin, Eric; Caushaj, Philip F

    2005-08-01

    Blood loss and high rates of transfusion in burn centers remains an area of ongoing concern. Blood use brings the risk of infection, adverse reaction, and immunosuppression. A protocol to reduce blood loss and blood use was implemented. Analysis included 3-year periods before and after institution of the protocol. All patients were transfused for a hemoglobin below 8.0 gm/dL. Operations per admission did not change during the two time periods (0.78 in each). Overall units transfused per operation decreased from 1.56+/-0.06 to 1.25+/-0.14 units after instituting the protocol (pburns of less than 20% surface area, declining from 386 to 46 units after protocol institution, from 0.37 to 0.04 units per admission, and from 0.79 to 0.08 units per operation in this group of smallest burns. There was no change noted in the larger burns. This study suggests that a defined protocol of hemostasis, technique, and transfusion trigger should be implemented in the process of burn excision and grafting. This will help especially those patients with the smallest burns, essentially eliminating transfusion need in that group.

  15. 557 Test and Manage Protocol for 841 Patients Requiring Iodinated Contrast Media (Icm) in Pediatrics

    Science.gov (United States)

    Diaz, Maria Cristina; Lavrut, Alberto Jorge; Spinelli, Silvia Susana

    2012-01-01

    Background ICM's adverse effects are quite frequent and potentially serious. The use of protocols to test and manage patients receiving ICM could help to decrease the adverse effects because they advise against the studies or prescribe the administration of premedication; however, its use in pediatrics is still limited. We describe the results of the use of a test and management protocol for pediatric patients requiring ICM. Methods All the patients of a pediatric hospital prescribed with ICM between 31st January 2008 and 5th March 2011 were included. The following variables have been analyzed: age, sex, type of study to be performed, diagnoses and hospitalized or outpatient, risk (regular, increased or non-advised) and the presence of adverse reactions. We also analyzed the relation between risk and age, sex and condition (chi cuadrado o t test). Significance level P < 0.05. Results We included 841 patients (56.9% male, age = 92.7 ± 24.5 months, 60% hospitalized). The most frequent test was chest Tc (36%) and the most frequent diagnosis was solid tumors (25%). Patients with increased risk were significantly lower than those with regular risk (75.7 ± 69.7 months vs 109.7 ± 61.6, P < 0.001). During the research period there were no adverse effects. Conclusions The classification of risk groups by this Goverment Buenos Aires City protocols allows a rational management of the patients requiring ICM and minimize the adverse effects.

  16. SU-F-R-40: Robustness Test of Computed Tomography Textures of Lung Tissues to Varying Scanning Protocols Using a Realistic Phantom Environment

    International Nuclear Information System (INIS)

    Lee, S; Markel, D; Hegyi, G; El Naqa, I

    2016-01-01

    Purpose: The reliability of computed tomography (CT) textures is an important element of radiomics analysis. This study investigates the dependency of lung CT textures on different breathing phases and changes in CT image acquisition protocols in a realistic phantom setting. Methods: We investigated 11 CT texture features for radiation-induced lung disease from 3 categories (first-order, grey level co-ocurrence matrix (GLCM), and Law’s filter). A biomechanical swine lung phantom was scanned at two breathing phases (inhale/exhale) and two scanning protocols set for PET/CT and diagnostic CT scanning. Lung volumes acquired from the CT images were divided into 2-dimensional sub-regions with a grid spacing of 31 mm. The distribution of the evaluated texture features from these sub-regions were compared between the two scanning protocols and two breathing phases. The significance of each factor on feature values were tested at 95% significance level using analysis of covariance (ANCOVA) model with interaction terms included. Robustness of a feature to a scanning factor was defined as non-significant dependence on the factor. Results: Three GLCM textures (variance, sum entropy, difference entropy) were robust to breathing changes. Two GLCM (variance, sum entropy) and 3 Law’s filter textures (S5L5, E5L5, W5L5) were robust to scanner changes. Moreover, the two GLCM textures (variance, sum entropy) were consistent across all 4 scanning conditions. First-order features, especially Hounsfield unit intensity features, presented the most drastic variation up to 39%. Conclusion: Amongst the studied features, GLCM and Law’s filter texture features were more robust than first-order features. However, the majority of the features were modified by either breathing phase or scanner changes, suggesting a need for calibration when retrospectively comparing scans obtained at different conditions. Further investigation is necessary to identify the sensitivity of individual image

  17. SU-F-R-40: Robustness Test of Computed Tomography Textures of Lung Tissues to Varying Scanning Protocols Using a Realistic Phantom Environment

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S; Markel, D; Hegyi, G [Medical Physics Unit, McGill University, Montreal, Quebec (Canada); El Naqa, I [University of Michigan, Ann Arbor, MI (United States)

    2016-06-15

    Purpose: The reliability of computed tomography (CT) textures is an important element of radiomics analysis. This study investigates the dependency of lung CT textures on different breathing phases and changes in CT image acquisition protocols in a realistic phantom setting. Methods: We investigated 11 CT texture features for radiation-induced lung disease from 3 categories (first-order, grey level co-ocurrence matrix (GLCM), and Law’s filter). A biomechanical swine lung phantom was scanned at two breathing phases (inhale/exhale) and two scanning protocols set for PET/CT and diagnostic CT scanning. Lung volumes acquired from the CT images were divided into 2-dimensional sub-regions with a grid spacing of 31 mm. The distribution of the evaluated texture features from these sub-regions were compared between the two scanning protocols and two breathing phases. The significance of each factor on feature values were tested at 95% significance level using analysis of covariance (ANCOVA) model with interaction terms included. Robustness of a feature to a scanning factor was defined as non-significant dependence on the factor. Results: Three GLCM textures (variance, sum entropy, difference entropy) were robust to breathing changes. Two GLCM (variance, sum entropy) and 3 Law’s filter textures (S5L5, E5L5, W5L5) were robust to scanner changes. Moreover, the two GLCM textures (variance, sum entropy) were consistent across all 4 scanning conditions. First-order features, especially Hounsfield unit intensity features, presented the most drastic variation up to 39%. Conclusion: Amongst the studied features, GLCM and Law’s filter texture features were more robust than first-order features. However, the majority of the features were modified by either breathing phase or scanner changes, suggesting a need for calibration when retrospectively comparing scans obtained at different conditions. Further investigation is necessary to identify the sensitivity of individual image

  18. Surface reactivity measurements as required for grouping and read-across: An advanced FRAS protocol

    Science.gov (United States)

    Gandon, Arnaud; Werle, Kai; Neubauer, Nicole; Wohlleben, Wendel

    2017-06-01

    Oxidative stress is a widely accepted paradigm associated with different adverse outcomes of particulate matter, including nanomaterials. It has frequently been identified in in vitro and in vivo studies and different assays have been developed for this purpose. Here we describe a newly developed multi-dose protocol of the FRAS assay (Ferric Reduction Ability of Serum). The purpose of this SOP is the measurement of the surface reactivity of nanomaterials under physiological conditions. Antioxidative components as present in human blood serum (HBS) serve as reporter molecules. The assay separates the oxidative damage from the read-out of the reporter molecules. The results show significantly enhanced repeatability with better sensitivity towards low reactivity, enabling application of FRAS both to a rough grouping by reactive vs. passive nanomaterials and further to substantiation of read-across by enhanced resolution of the similarity between different nanoforms of the same substance.

  19. Surface reactivity measurements as required for grouping and read-across: An advanced FRAS protocol

    International Nuclear Information System (INIS)

    Gandon, Arnaud; Werle, Kai; Neubauer, Nicole; Wohlleben, Wendel

    2017-01-01

    Oxidative stress is a widely accepted paradigm associated with different adverse outcomes of particulate matter, including nanomaterials. It has frequently been identified in in vitro and in vivo studies and different assays have been developed for this purpose. Here we describe a newly developed multi-dose protocol of the FRAS assay (Ferric Reduction Ability of Serum). The purpose of this SOP is the measurement of the surface reactivity of nanomaterials under physiological conditions. Antioxidative components as present in human blood serum (HBS) serve as reporter molecules. The assay separates the oxidative damage from the read-out of the reporter molecules. The results show significantly enhanced repeatability with better sensitivity towards low reactivity, enabling application of FRAS both to a rough grouping by reactive vs. passive nanomaterials and further to substantiation of read-across by enhanced resolution of the similarity between different nanoforms of the same substance. (paper)

  20. Varied Search Protocols Lead to Clinically Relevant Results. A review of: Patel, Manesh R., Connie M. Schardt, Linda L. Sanders, and Sheri A. Keitz. “Randomized Trial for Answers to Clinical Questions: Evaluating a Pre‐Appraised Versus a MEDLINE Search Protocol.” Journal of the Medical Library Association 94.4 (2006: 382‐6.

    Directory of Open Access Journals (Sweden)

    Marcy L. Brown

    2008-03-01

    Full Text Available Objective – To determine the success rate of electronic resources for answering clinical questions by comparing speed, validity, and applicability of two different protocols for searching the medical literature.Design – Randomized trial with results judged by blinded panel.Setting – Duke University Medical Center in Durham, North Carolina, United States ofAmerica.Subjects – Thirty‐two 2nd and 3rd year internal medicine residents on an eight week general medicine rotation at the Duke University Medical Center.Methods – Two search protocols were developed:Protocol A: Participants searched MEDLINE first, and then searched pre‐appraised resources if needed.Protocol B: Participants searched pre‐appraised resources first, which included UpToDate, ACP JournalClub, Cochrane Database of Systematic Reviews, and DARE. The residents then searched MEDLINE if an answer could not be found in the 66 initial group of pre‐appraised resources. Residents were randomised by computer-assisted block order into four blocks of eight residents each. Two blocks were assigned to Protocol A, and two to Protocol B. Each day, residents developed at least one clinical question related to caring for patients. The questions were transcribed onto pocket-sized cards, with the answer sought later using the assigned protocol. If answers weren’t found using either protocol, searches were permitted in other available resources. When an article that answered a question was found, the resident recorded basic information about the question and the answer as well as the time required to find the answer (less than five minutes; between five and ten minutes; or more than ten minutes. Residents were to select answers that were “methodologically sound and clinically important” (384. Ten faculty members formally trained in evidence‐based medicine (EBM reviewed a subset of therapy‐related questions and answers. The reviewers, who were blinded to the search protocols

  1. Varied overground walking-task practice versus body-weight-supported treadmill training in ambulatory adults within one year of stroke: a randomized controlled trial protocol

    Directory of Open Access Journals (Sweden)

    DePaul Vincent G

    2011-10-01

    Full Text Available Abstract Background Although task-oriented training has been shown to improve walking outcomes after stroke, it is not yet clear whether one task-oriented approach is superior to another. The purpose of this study is to compare the effectiveness of the Motor Learning Walking Program (MLWP, a varied overground walking task program consistent with key motor learning principles, to body-weight-supported treadmill training (BWSTT in community-dwelling, ambulatory, adults within 1 year of stroke. Methods/Design A parallel, randomized controlled trial with stratification by baseline gait speed will be conducted. Allocation will be controlled by a central randomization service and participants will be allocated to the two active intervention groups (1:1 using a permuted block randomization process. Seventy participants will be assigned to one of two 15-session training programs. In MLWP, one physiotherapist will supervise practice of various overground walking tasks. Instructions, feedback, and guidance will be provided in a manner that facilitates self-evaluation and problem solving. In BWSTT, training will emphasize repetition of the normal gait cycle while supported over a treadmill, assisted by up to three physiotherapists. Outcomes will be assessed by a blinded assessor at baseline, post-intervention and at 2-month follow-up. The primary outcome will be post-intervention comfortable gait speed. Secondary outcomes include fast gait speed, walking endurance, balance self-efficacy, participation in community mobility, health-related quality of life, and goal attainment. Groups will be compared using analysis of covariance with baseline gait speed strata as the single covariate. Intention-to-treat analysis will be used. Discussion In order to direct clinicians, patients, and other health decision-makers, there is a need for a head-to-head comparison of different approaches to active, task-related walking training after stroke. We hypothesize that

  2. Varied overground walking-task practice versus body-weight-supported treadmill training in ambulatory adults within one year of stroke: a randomized controlled trial protocol.

    Science.gov (United States)

    DePaul, Vincent G; Wishart, Laurie R; Richardson, Julie; Lee, Timothy D; Thabane, Lehana

    2011-10-21

    Although task-oriented training has been shown to improve walking outcomes after stroke, it is not yet clear whether one task-oriented approach is superior to another. The purpose of this study is to compare the effectiveness of the Motor Learning Walking Program (MLWP), a varied overground walking task program consistent with key motor learning principles, to body-weight-supported treadmill training (BWSTT) in community-dwelling, ambulatory, adults within 1 year of stroke. A parallel, randomized controlled trial with stratification by baseline gait speed will be conducted. Allocation will be controlled by a central randomization service and participants will be allocated to the two active intervention groups (1:1) using a permuted block randomization process. Seventy participants will be assigned to one of two 15-session training programs. In MLWP, one physiotherapist will supervise practice of various overground walking tasks. Instructions, feedback, and guidance will be provided in a manner that facilitates self-evaluation and problem solving. In BWSTT, training will emphasize repetition of the normal gait cycle while supported over a treadmill, assisted by up to three physiotherapists. Outcomes will be assessed by a blinded assessor at baseline, post-intervention and at 2-month follow-up. The primary outcome will be post-intervention comfortable gait speed. Secondary outcomes include fast gait speed, walking endurance, balance self-efficacy, participation in community mobility, health-related quality of life, and goal attainment. Groups will be compared using analysis of covariance with baseline gait speed strata as the single covariate. Intention-to-treat analysis will be used. In order to direct clinicians, patients, and other health decision-makers, there is a need for a head-to-head comparison of different approaches to active, task-related walking training after stroke. We hypothesize that outcomes will be optimized through the application of a task

  3. Reducing the sampling periods required in protocols for establishing ammonia emissions from pig fattening buildings using measurements and modelling

    NARCIS (Netherlands)

    Mosquera Losada, J.; Ogink, N.W.M.

    2011-01-01

    Ammonia (NH(3)) emission factors for animal housing systems in the Netherlands are based on measurements using standardised measurement protocols. Both the original Green Label (GL) protocol and the newly developed multi-site sampling protocol are based on year-round sampling periods. The objective

  4. Caloric, but not macronutrient, compensation by humans for required-eating occasions with meals and snack varying in fat and carbohydrate.

    Science.gov (United States)

    Foltin, R W; Rolls, B J; Moran, T H; Kelly, T H; McNelis, A L; Fischman, M W

    1992-02-01

    Six subjects participated in a residential study assessing the effects of covert macronutrient and energy manipulations during three required-eating occasions (breakfast, lunch, and afternoon snack) on total macronutrient and energy intakes. Overall, energy content of the occasions varied between approximately 3000 and approximately 7000 kJ (approximately 700 and approximately 1700 kcal) with the majority of the differential derived from either fat or carbohydrate (CHO). Each condition (high, medium, and low fat; high, medium, and low CHO; and no required eating) was examined for 2 d. Subjects compensated for the energy content of the required occasions such that only under the low-CHO condition (11,297 +/- 3314 kJ) was total daily energy intake lower than that observed in the absence of required occasions (13,297 +/- 1356 kJ). Only total energy intake under the high-fat condition (12,326 +/- 2548 kJ) was significantly different from its matched CHO condition (high-CHO condition: 14,665 +/- 2686 kJ). In contrast to the clear evidence for caloric compensation, there were no differential effects of condition on macronutrient intake, ie, there was no macronutrient compensation.

  5. Comparative estimation of inevitable endogenous ileal flow of amino acids in Pekin ducks under varying dietary or physiological conditions and their significance to nutritional requirements for amino acids.

    Science.gov (United States)

    Akinde, D O

    2017-10-01

    In 2 experiments in Pekin ducks the inevitable endogenous ileal flow (IEIF) of AA was estimated at changing intake and source of crude fiber (CF) or soybean oil (SO) level. Also the roles of dry matter intake (DMI) and BW or age as well as the proportion of IEIF in the dietary requirement for AA were studied. In experiment 1 three basal CP (20, 60, or 100 g/kg) diets were formulated containing a low CF (LCF, 30 g/kg) or high (HCF, 80 g/kg) level; achieved with cellulose supplementation. All diets were similar in every other respect including having SO content of 40 g/kg. Four floor pens of eight 85-day-old ducks were randomly allocated to each diet. Similar diets were mixed in experiment 2 but corn cob meal replaced cellulose as the fiber source. A high SO (HSO) series was also formed by increasing the SO level from 40 g/kg in the basal series to 100 g/kg. Thus the LCF series was concurrently classified as low SO (LSO) series to control SO effect. Each of the eventual 9 diets were fed to 5 floor pens of ten 65-day-old ducks. Ileal AA flow was measured after a 5 day feeding period in both experiments. Linear regression was calculated between ileal flow and dietary intake of individual AA. The IEIF interpreted as the y-intercept of each linear function responded neither to elevated ingestion of each CF type nor to SO level. Age and DMI had no effect on IEIF computed in relation to BW, but wide discrepancies resulted when related to DMI. Overall IEIF of AA varied between 14.3 to 129.8 mg/kg BW d-1. These flows were established in model computations to account for 10 to 64% of the recommended intake of limiting AA. In conclusion the ileal inevitable flow is constant within the dietary/age conditions investigated. However it is modulated by feed intake and accounts for a significant portion of total amino acid requirement. © 2017 Poultry Science Association Inc.

  6. A Microfluidic Device for Preparing Next Generation DNA Sequencing Libraries and for Automating Other Laboratory Protocols That Require One or More Column Chromatography Steps

    Science.gov (United States)

    Tan, Swee Jin; Phan, Huan; Gerry, Benjamin Michael; Kuhn, Alexandre; Hong, Lewis Zuocheng; Min Ong, Yao; Poon, Polly Suk Yean; Unger, Marc Alexander; Jones, Robert C.; Quake, Stephen R.; Burkholder, William F.

    2013-01-01

    Library preparation for next-generation DNA sequencing (NGS) remains a key bottleneck in the sequencing process which can be relieved through improved automation and miniaturization. We describe a microfluidic device for automating laboratory protocols that require one or more column chromatography steps and demonstrate its utility for preparing Next Generation sequencing libraries for the Illumina and Ion Torrent platforms. Sixteen different libraries can be generated simultaneously with significantly reduced reagent cost and hands-on time compared to manual library preparation. Using an appropriate column matrix and buffers, size selection can be performed on-chip following end-repair, dA tailing, and linker ligation, so that the libraries eluted from the chip are ready for sequencing. The core architecture of the device ensures uniform, reproducible column packing without user supervision and accommodates multiple routine protocol steps in any sequence, such as reagent mixing and incubation; column packing, loading, washing, elution, and regeneration; capture of eluted material for use as a substrate in a later step of the protocol; and removal of one column matrix so that two or more column matrices with different functional properties can be used in the same protocol. The microfluidic device is mounted on a plastic carrier so that reagents and products can be aliquoted and recovered using standard pipettors and liquid handling robots. The carrier-mounted device is operated using a benchtop controller that seals and operates the device with programmable temperature control, eliminating any requirement for the user to manually attach tubing or connectors. In addition to NGS library preparation, the device and controller are suitable for automating other time-consuming and error-prone laboratory protocols requiring column chromatography steps, such as chromatin immunoprecipitation. PMID:23894273

  7. A microfluidic device for preparing next generation DNA sequencing libraries and for automating other laboratory protocols that require one or more column chromatography steps.

    Directory of Open Access Journals (Sweden)

    Swee Jin Tan

    Full Text Available Library preparation for next-generation DNA sequencing (NGS remains a key bottleneck in the sequencing process which can be relieved through improved automation and miniaturization. We describe a microfluidic device for automating laboratory protocols that require one or more column chromatography steps and demonstrate its utility for preparing Next Generation sequencing libraries for the Illumina and Ion Torrent platforms. Sixteen different libraries can be generated simultaneously with significantly reduced reagent cost and hands-on time compared to manual library preparation. Using an appropriate column matrix and buffers, size selection can be performed on-chip following end-repair, dA tailing, and linker ligation, so that the libraries eluted from the chip are ready for sequencing. The core architecture of the device ensures uniform, reproducible column packing without user supervision and accommodates multiple routine protocol steps in any sequence, such as reagent mixing and incubation; column packing, loading, washing, elution, and regeneration; capture of eluted material for use as a substrate in a later step of the protocol; and removal of one column matrix so that two or more column matrices with different functional properties can be used in the same protocol. The microfluidic device is mounted on a plastic carrier so that reagents and products can be aliquoted and recovered using standard pipettors and liquid handling robots. The carrier-mounted device is operated using a benchtop controller that seals and operates the device with programmable temperature control, eliminating any requirement for the user to manually attach tubing or connectors. In addition to NGS library preparation, the device and controller are suitable for automating other time-consuming and error-prone laboratory protocols requiring column chromatography steps, such as chromatin immunoprecipitation.

  8. Clinical protocol levels are required in laboratory animal surgery when using medical devices: experiences with ureteral replacement surgery in goats.

    Science.gov (United States)

    de Jonge, Paul K J D; Sloff, Marije; Janke, Heinz P; Kortmann, Barbara B M; de Gier, Robert P E; Geutjes, Paul J; Oosterwijk, Egbert; Feitz, Wout F J

    2017-10-01

    It is common to test medical devices in large animal studies that are or could also be used in humans. In this short report we describe the use of a ureteral J-stent for the evaluation of biodegradable tubular constructs for tissue reconstruction, and the regeneration of ureters in Saanen goats. Similarly to a previous study in pigs, the ureteral J-stent was blindly inserted until some resistance was met. During evaluation of the goats after three months, perforation of the renal cortex by the stent was observed in four out of seven animals. These results indicated that blind stent placement was not possible in goats. In four new goats, clinical protocols were followed using X-ray and iodinated contrast fluids to visualize the kidney and stent during stent placement. With this adaptation the stents were successfully placed in the kidneys of these four new goats with minimal additional effort. It is likely that other groups in other fields ran into similar problems that could have been avoided by following clinical protocols. Therefore, we would like to stress the importance of following clinical protocols when using medical devices in animals to prevent unnecessary suffering and to reduce the number of animals needed.

  9. Postreinforcement Pause Duration Varies within a Session and with a Variable Response Requirement but Not as a Function of Prior Revolutions

    Science.gov (United States)

    Belke, Terry W.

    2011-01-01

    The current study examined the variables that influence postreinforcement pause (PRP) duration in rats when wheel running serves as the reinforcing consequence. The relationship between revolutions and PRP duration when revolutions were manipulated within a session and the effect of changing the response requirement from fixed to variable on PRP…

  10. Efeito da suplementação de glutamina sobre variáveis hematológicas e do estado nutricional de ratas desnutridas Glutamine supplementation effect in hematological parameters and nutritional status of rats submitted to malnutrition protocol

    Directory of Open Access Journals (Sweden)

    Natália Cristina Lima Rodrigues

    2007-12-01

    Full Text Available RACIONAL: A glutamina é o aminoácido mais abundante no sangue, por desempenhar importante papel no sistema imune. É considerado aminoácido condicionalmente essencial em situações como desnutrição protéico-calórica. OBJETIVO: Verificar o efeito da dieta suplementada com glutamina sobre variáveis bioquímicas e hematológicas de ratas submetidas a protocolo de desnutrição, induzido por dieta rica em lactose. MÉTODOS: Ratas Wistar fêmeas (n=20 e com 21 dias de idade, foram submetidas ou não à desnutrição calórico-protéica induzida por diarréia, através da administração de dieta rica em lactose 60% durante 15 dias. Após o período de desnutrição, animais eutróficos ou desnutridos permaneceram durante 30 dias com oferta de diferentes dietas (padrão e experimentais. De acordo com estado e tratamento nutricionais, os animais foram distribuídos aleatoriamente em quatro grupos distintos: 1 GC: animais eutróficos + dieta padrão, 2 GD: animais desnutridos + dieta rica em lactose (60%, 3 GDGLN: animais desnutridos + dieta rica em glutamina (2%; e 4 GDP: animais desnutridos + dieta padrão. Após os 30 dias de tratamento nutricional, amostras de sangue foram obtidas por punção cardíaca para avaliação de variáveis bioquímicas (proteínas totais, albumina, uréia e hematológicas (quantificação da série vermelha e branca. RESULTADOS: Após 15 dias do início do experimento o ganho de peso dos grupos GD (46,4 ± 2,60g, GDGLN (39,2 ± 8,9g e GDP (33,2 ± 11,5g foi menor em relação ao controle (64 ± 4,24g, PBACKGROUND: Glutamine is the most abundant amino acid in blood stream, playing an important role in the immune system. It is conditionally considered an essential amino acid to certain state conditions such as protein-energy malnutrition. AIM: To verify the effect of glutamine diet supplemented on hematological and biochemical variables in rats subjected to protocol of malnutrition, induced by an enriched lactose

  11. Validation of a novel protocol for calculating estimated energy requirements and average daily physical activity ratio for the US population: 2005-2006.

    Science.gov (United States)

    Archer, Edward; Hand, Gregory A; Hébert, James R; Lau, Erica Y; Wang, Xuewen; Shook, Robin P; Fayad, Raja; Lavie, Carl J; Blair, Steven N

    2013-12-01

    To validate the PAR protocol, a novel method for calculating population-level estimated energy requirements (EERs) and average physical activity ratio (APAR), in a nationally representative sample of US adults. Estimates of EER and APAR values were calculated via a factorial equation from a nationally representative sample of 2597 adults aged 20 and 74 years (US National Health and Nutrition Examination Survey; data collected between January 1, 2005, and December 31, 2006). Validation of the PAR protocol-derived EER (EER(PAR)) values was performed via comparison with values from the Institute of Medicine EER equations (EER(IOM)). The correlation between EER(PAR) and EER(IOM) was high (0.98; Pmen to 148 kcal/d (5.7% higher) in obese women. The 2005-2006 EERs for the US population were 2940 kcal/d for men and 2275 kcal/d for women and ranged from 3230 kcal/d in obese (BMI ≥30) men to 2026 kcal/d in normal weight (BMI women. There were significant inverse relationships between APAR and both obesity and age. For men and women, the APAR values were 1.53 and 1.52, respectively. Obese men and women had lower APAR values than normal weight individuals (P¼.023 and P¼.015, respectively) [corrected], and younger individuals had higher APAR values than older individuals (Pphysical activity and health. Copyright © 2013 Mayo Foundation for Medical Education and Research. Published by Elsevier Inc. All rights reserved.

  12. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  13. ComOn Coaching: Study protocol of a randomized controlled trial to assess the effect of a varied number of coaching sessions on transfer into clinical practice following communication skills training.

    Science.gov (United States)

    Niglio de Figueiredo, Marcelo; Rudolph, Bärbel; Rodolph, Bärbel; Bylund, Carma L; Goelz, Tanja; Heußner, Pia; Sattel, Heribert; Fritzsche, Kurt; Wuensch, Alexander

    2015-07-07

    Communication skills training has proven to be an effective means to enhance communication of health care professionals in oncology. These effects are well studied in standardized settings. The question of transferring these skills into clinical consultations remains open. We build up on a previous developed training concept consisting of a workshop and coaching. This training achieved a medium effect size in two studies with standardized patients. In the current study, we expanded and manualized the coaching concept, and we will evaluate effects of a varied number of coaching sessions on real clinical consultations. Our aim is to determine how much coaching oncologists need to transfer communication skills into clinical practice. Physicians of two German medical centers will participate in a workshop for communication skills and will be randomized to either a group with one coaching session or a group with four coaching sessions following the workshop. The participation is voluntary and the physicians will receive medical education points. Consultations held by the participating physicians with actual patients who gave their informed consent will be filmed at three time points. These consultations will be evaluated by blinded raters using a checklist based on the training content (primary outcome). Secondary outcomes will be the self-evaluated communication competence by physicians and an evaluation of the consultations by both physicians and patients. We will evaluate our communication training concept on three levels - rater, physician and patient - and concentrate on the transfer of communication skills into real life situations. As we emphasize the external validity in this study design, limitations will be expected due to heterogeneity of data. With this study we aim to gain data on how to improve communication skills training that will result in better patient outcomes. German Clinical Trials Register DRKS00004385 .

  14. National measures required by the implementation of the climate convention and the Kyoto Protocol in Finland. Report by the Committee on National Climate Policy Measures

    International Nuclear Information System (INIS)

    2002-12-01

    The task of the Committee was to develop the administrative framework for the national measures that the UN Climate Convention and the implementation of the Kyoto Protocol require in Finland. The Committee proposes that a ministerial working group should continue to act in the Government to draft and implement the climate policy, assisted by a contact network representing the central ministries. The Committee recommends that Finland should have a national climate strategy that would be updated at two or three year's intervals. The drafting, implementation and monitoring of the Climate Strategy should be under the steering of the ministerial working group. In drafting and implementation of the strategy, the responsible ministry would be the one whose minister is the Chairman of the ministerial working group. The evaluation reports on the impacts of policy measures reducing greenhouse gases would be drawn up as part of the strategy's implementation. The Ministry of Trade and Industry would coordinate the scenarios that examine greenhouse gas emissions and that are required by the climate policy in practice. The drafting of the scenarios would be steered by the ministerial working group assisted by a contact network Expert institutions would participate both in the drafting and implementation of the strategy and in the follow-up of the implementation by producing the necessary surveys. In the Committee's opinion, international climate negotiations should still be under the drafting responsibility of the Ministry of the Environment. The Committee suggests that Statistics Finland should be appointed as the inventory entity of greenhouse gases and that a temporary steering group chaired by the Ministry of the Environment, representing all the central ministries and expert institutes, should be set up to assist and steer the national system calculating greenhouse gas emissions. The initial distribution according to the proposal for an EC Directive on emissions trading

  15. varying elastic parameters distributions

    KAUST Repository

    Moussawi, Ali

    2014-12-01

    The experimental identication of mechanical properties is crucial in mechanics for understanding material behavior and for the development of numerical models. Classical identi cation procedures employ standard shaped specimens, assume that the mechanical elds in the object are homogeneous, and recover global properties. Thus, multiple tests are required for full characterization of a heterogeneous object, leading to a time consuming and costly process. The development of non-contact, full- eld measurement techniques from which complex kinematic elds can be recorded has opened the door to a new way of thinking. From the identi cation point of view, suitable methods can be used to process these complex kinematic elds in order to recover multiple spatially varying parameters through one test or a few tests. The requirement is the development of identi cation techniques that can process these complex experimental data. This thesis introduces a novel identi cation technique called the constitutive compatibility method. The key idea is to de ne stresses as compatible with the observed kinematic eld through the chosen class of constitutive equation, making possible the uncoupling of the identi cation of stress from the identi cation of the material parameters. This uncoupling leads to parametrized solutions in cases where 5 the solution is non-unique (due to unknown traction boundary conditions) as demonstrated on 2D numerical examples. First the theory is outlined and the method is demonstrated in 2D applications. Second, the method is implemented within a domain decomposition framework in order to reduce the cost for processing very large problems. Finally, it is extended to 3D numerical examples. Promising results are shown for 2D and 3D problems.

  16. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  17. Where to deliver baits for deworming urban red foxes for Echinococcus multilocularis control: new protocol for micro-habitat modeling of fox denning requirements.

    Science.gov (United States)

    Ikeda, Takako; Yoshimura, Masashi; Onoyama, Keiichi; Oku, Yuzaburo; Nonaka, Nariaki; Katakura, Ken

    2014-08-06

    Deworming wild foxes by baiting with the anthelmintic praziquantel is being established as a preventive technique against environmental contamination with Echinococcus multilocularis eggs. Improvement of the cost-benefit performance of baiting treatment is required urgently to raise and maintain the efficacy of deworming. We established a spatial model of den site selection by urban red foxes, the definitive host, to specify the optimal micro-habitats for delivering baits in a new modeling approach modified for urban fox populations. The model was established for two cities (Obihiro and Sapporo) in Hokkaido, Japan, in which a sylvatic cycle of E. multilocularis is maintained. The two cities have different degrees of urbanization. The modeling process was designed to detect the best combination of key environmental factors and spatial scale that foxes pay attention to most (here named 'heeding range') when they select den sites. All possible models were generated using logistic regression analysis, with "presence" or "absence" of fox den as the objective variable, and nine landscape categories customized for urban environments as predictor variables to detect the best subset of predictors. This procedure was conducted for each of ten sizes of concentric circles from dens and control points to detect the best circle size. Out of all models generated, the most parsimonious model was selected using Akaike's Information Criterion (AIC) inspection. Our models suggest that fox dens in Obihiro are located at the center of a circle with 500 m radius including low percentages of wide roads, narrow roads, and occupied buildings, but high percentages of green covered areas; the dens in Sapporo within 300 m radius with low percentages of wide roads, occupied buildings, but high percentages of riverbeds and green covered areas. The variation of the models suggests the necessity of accumulating models for various types of cities in order to reveal the patterns of the model. Our

  18. A multidisciplinary protocol for planned skin-preserving delayed breast reconstruction for patients with locally advanced breast cancer requiring postmastectomy radiation therapy: 3-year follow-up.

    Science.gov (United States)

    Kronowitz, Steven J; Lam, Candace; Terefe, Welela; Hunt, Kelly K; Kuerer, Henry M; Valero, Vicente; Lance, Samuel; Robb, Geoffrey L; Feng, Lei; Buchholz, Thomas A

    2011-06-01

    The authors examined the safety of a protocol for planned skin-preserving delayed breast reconstruction after postmastectomy radiotherapy with placement of a tissue expander for patients with locally advanced breast cancer (stages IIB and III). The authors compared 47 patients treated according to the protocol between December 2003 and May 2008 with 47 disease-stage-matched control patients who underwent standard delayed reconstruction after postmastectomy radiotherapy (no skin preservation or tissue expander) during the same period. Protocol-group complication rates were 21 percent for skin-preserving mastectomy and placement of the expander (stage 1), 5 percent for postmastectomy radiotherapy, 25 percent for expander reinflation after radiotherapy, and 24 percent for skin-preserving delayed reconstruction. The complication rate for standard delayed reconstruction was 38 percent. Tissue-expander loss rates were 32 percent overall, 9 percent for stage 1, 5 percent for postmastectomy radiotherapy, and 22 percent for reinflation. Wound-healing complications after reconstruction occurred in 3 percent of protocol-group and 10 percent of control-group patients. The median follow-up time for patients still alive at last follow-up was 40 months (range, 8.5 to 85.3 months). Three-year recurrence-free survival rates were 92 percent (95 percent CI, 83 to 100 percent) and 86 percent (95 percent CI, 76 to 98 percent) for the protocol and control groups, respectively (p = 0.87). In patients with locally advanced breast cancer, skin-preserving mastectomy with a deflated tissue expander on the chest wall during postmastectomy radiotherapy does not increase locoregional recurrence risk and is associated with lower complication rates of definitive reconstruction.

  19. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  20. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  1. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  2. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  3. Time-varying BRDFs.

    Science.gov (United States)

    Sun, Bo; Sunkavalli, Kalyan; Ramamoorthi, Ravi; Belhumeur, Peter N; Nayar, Shree K

    2007-01-01

    The properties of virtually all real-world materials change with time, causing their bidirectional reflectance distribution functions (BRDFs) to be time varying. However, none of the existing BRDF models and databases take time variation into consideration; they represent the appearance of a material at a single time instance. In this paper, we address the acquisition, analysis, modeling, and rendering of a wide range of time-varying BRDFs (TVBRDFs). We have developed an acquisition system that is capable of sampling a material's BRDF at multiple time instances, with each time sample acquired within 36 sec. We have used this acquisition system to measure the BRDFs of a wide range of time-varying phenomena, which include the drying of various types of paints (watercolor, spray, and oil), the drying of wet rough surfaces (cement, plaster, and fabrics), the accumulation of dusts (household and joint compound) on surfaces, and the melting of materials (chocolate). Analytic BRDF functions are fit to these measurements and the model parameters' variations with time are analyzed. Each category exhibits interesting and sometimes nonintuitive parameter trends. These parameter trends are then used to develop analytic TVBRDF models. The analytic TVBRDF models enable us to apply effects such as paint drying and dust accumulation to arbitrary surfaces and novel materials.

  4. Use of a combined oxygen/nitrous oxide/morphine chlorydrate protocol for analgesia in burned children requiring painful local care.

    Science.gov (United States)

    Ozil, Camille; Vialle, Raphaël; Thevenin-Lemoine, Camille; Conti, Elvira; Annequin, Daniel

    2010-03-01

    We present the results of the use of a protocol of inhalational oxygen/nitrous oxide mixtures associated with oral opioids on a prospective cohort of 33 children undergoing local care for acute but limited burned skin lesions. All the children were orally administered 0.4 mg/kg morphine chlorydrate, and nitrous oxide was administered as an equimolar mixture (50% N2O, 50% O2) via a face mask during the procedure. Pain and comfort of the patient were evaluated by the use of a validated behavioural score. After the end of the procedure, child and parent satisfactions were noted. Mean age was 3 years 6 months (10 months-11 years). A successful detersion procedure was performed in all the cases. Behavioural score was 6 in 15 cases out of 33, comprising between 7 and 9 in 15 patients and 10 in three patients. Subjective satisfaction of pain management was noted in 16 out of 20 patients after the procedure. Subjective satisfaction of the parents was noted in all the cases. Our study demonstrates that the use of a simple protocol of inhalational oxygen/nitrous oxide mixtures associated with oral opioids could be safe and effective. This association was well tolerated without any adverse effect.

  5. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  6. Protocol adherence for continuously titrated interventions in randomized trials: an overview of the current methodology and case study

    Directory of Open Access Journals (Sweden)

    F. Lauzier

    2017-07-01

    Full Text Available Abstract Background The standard definition for protocol adherence is the proportion of all scheduled doses that are delivered. In clinical research, this definition has several limitations when evaluating protocol adherence in trials that study interventions requiring continuous titration. Discussion Building upon a specific case study, we analyzed a recent trial of a continuously titrated intervention to assess the impact of different definitions of protocol deviations on the interpretation of protocol adherence. The OVATION pilot trial was an open-label randomized controlled trial of higher (75–80 mmHg versus lower (60–65 mmHg mean arterial pressure (MAP targets for vasopressor therapy in shock. In this trial, potential protocol deviations were defined as MAP values outside the targeted range for >4 consecutive hours during vasopressor therapy without synchronous and consistent adjustments of vasopressor doses. An adjudication committee reviewed each potential deviation to determine if it was clinically-justified or not. There are four reasons for this contextual measurement and reporting of protocol adherence. First, between-arm separation is a robust measure of adherence to complex protocols. Second, adherence assessed by protocol deviations varies in function of the definition of deviations and the frequency of measurements. Third, distinguishing clinically-justified vs. not clinically-justified protocol deviations acknowledges clinically sensible bedside decision-making and offers a clear terminology before the trial begins. Finally, multiple metrics exist to report protocol deviations, which provides different information but complementary information on protocol adherence. Conclusions In trials of interventions requiring continuous titration, metrics used for defining protocol deviations have a considerable impact on the interpretation of protocol adherence. Definitions for protocol deviations should be prespecified and correlated

  7. Protocol adherence for continuously titrated interventions in randomized trials: an overview of the current methodology and case study.

    Science.gov (United States)

    Lauzier, F; Adhikari, N K; Seely, A; Koo, K K Y; Belley-Côté, E P; Burns, K E A; Cook, D J; D'Aragon, F; Rochwerg, B; Kho, M E; Oczkowksi, S J W; Duan, E H; Meade, M O; Day, A G; Lamontagne, F

    2017-07-17

    The standard definition for protocol adherence is the proportion of all scheduled doses that are delivered. In clinical research, this definition has several limitations when evaluating protocol adherence in trials that study interventions requiring continuous titration. Building upon a specific case study, we analyzed a recent trial of a continuously titrated intervention to assess the impact of different definitions of protocol deviations on the interpretation of protocol adherence. The OVATION pilot trial was an open-label randomized controlled trial of higher (75-80 mmHg) versus lower (60-65 mmHg) mean arterial pressure (MAP) targets for vasopressor therapy in shock. In this trial, potential protocol deviations were defined as MAP values outside the targeted range for >4 consecutive hours during vasopressor therapy without synchronous and consistent adjustments of vasopressor doses. An adjudication committee reviewed each potential deviation to determine if it was clinically-justified or not. There are four reasons for this contextual measurement and reporting of protocol adherence. First, between-arm separation is a robust measure of adherence to complex protocols. Second, adherence assessed by protocol deviations varies in function of the definition of deviations and the frequency of measurements. Third, distinguishing clinically-justified vs. not clinically-justified protocol deviations acknowledges clinically sensible bedside decision-making and offers a clear terminology before the trial begins. Finally, multiple metrics exist to report protocol deviations, which provides different information but complementary information on protocol adherence. In trials of interventions requiring continuous titration, metrics used for defining protocol deviations have a considerable impact on the interpretation of protocol adherence. Definitions for protocol deviations should be prespecified and correlated with between-arm separation, if it can be measured.

  8. Incompatible type A plasma transfusion in patients requiring massive transfusion protocol: Outcomes of an Eastern Association for the Surgery of Trauma multicenter study.

    Science.gov (United States)

    Stevens, W Tait; Morse, Bryan C; Bernard, Andrew; Davenport, Daniel L; Sams, Valerie G; Goodman, Michael D; Dumire, Russell; Carrick, Matthew M; McCarthy, Patrick; Stubbs, James R; Pritts, Timothy A; Dente, Christopher J; Luo-Owen, Xian; Gregory, Jason A; Turay, David; Gomaa, Dina; Quispe, Juan C; Fitzgerald, Caitlin A; Haddad, Nadeem N; Choudhry, Asad; Quesada, Jose F; Zielinski, Martin D

    2017-07-01

    With a relative shortage of type AB plasma, many centers have converted to type A plasma for resuscitation of patients whose blood type is unknown. The goal of this study is to determine outcomes for trauma patients who received incompatible plasma transfusions as part of a massive transfusion protocol (MTP). As part of an Eastern Association for the Surgery of Trauma multi-institutional trial, registry and blood bank data were collected from eight trauma centers for trauma patients (age, ≥ 15 years) receiving emergency release plasma transfusions as part of MTPs from January 2012 to August 2016. Incompatible type A plasma was defined as transfusion to patient blood type B or type AB. Of the 1,536 patients identified, 92% received compatible plasma transfusions and 8% received incompatible type A plasma. Patient characteristics were similar except for greater penetrating injuries (48% vs 36%; p = 0.01) in the incompatible group. In the incompatible group, patients were transfused more plasma units at 4 hours (median, 9 vs. 5; p plasma to patients with blood groups B and AB as part of a MTP does not appear to be associated with significant increases in morbidity or mortality. Therapeutic study, level IV.

  9. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  10. Development of a Real-Time PCR Protocol Requiring Minimal Handling for Detection of Vancomycin-Resistant Enterococci with the Fully Automated BD Max System.

    Science.gov (United States)

    Dalpke, Alexander H; Hofko, Marjeta; Zimmermann, Stefan

    2016-09-01

    Vancomycin-resistant enterococci (VRE) are an important cause of health care-associated infections, resulting in significant mortality and a significant economic burden in hospitals. Active surveillance for at-risk populations contributes to the prevention of infections with VRE. The availability of a combination of automation and molecular detection procedures for rapid screening would be beneficial. Here, we report on the development of a laboratory-developed PCR for detection of VRE which runs on the fully automated Becton Dickinson (BD) Max platform, which combines DNA extraction, PCR setup, and real-time PCR amplification. We evaluated two protocols: one using a liquid master mix and the other employing commercially ordered dry-down reagents. The BD Max VRE PCR was evaluated in two rounds with 86 and 61 rectal elution swab (eSwab) samples, and the results were compared to the culture results. The sensitivities of the different PCR formats were 84 to 100% for vanA and 83.7 to 100% for vanB; specificities were 96.8 to 100% for vanA and 81.8 to 97% for vanB The use of dry-down reagents and the ExK DNA-2 kit for extraction showed that the samples were less inhibited (3.3%) than they were by the use of the liquid master mix (14.8%). Adoption of a cutoff threshold cycle of 35 for discrimination of vanB-positive samples allowed an increase of specificity to 87.9%. The performance of the BD Max VRE assay equaled that of the BD GeneOhm VanR assay, which was run in parallel. The use of dry-down reagents simplifies the assay and omits any need to handle liquid PCR reagents. Copyright © 2016, American Society for Microbiology. All Rights Reserved.

  11. Adaptive security protocol selection for mobile computing

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.

    2010-01-01

    The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for

  12. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  13. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  14. Welfare Reform: With TANF Flexibility, States Vary in How They Implement Work Requirements and Time Limits. Report to the Chairman, Subcommittee on Human Resources, Committee on Ways and Means, House of Representatives.

    Science.gov (United States)

    General Accounting Office, Washington, DC.

    In this report, the General Accounting Office (GAO) examined how different states are implementing the work requirements and time limits called for by the Temporary Assistance for Needy Families (TANF) program. Data were collected from site visits in 4 states, telephone interviews with TANF officials in 8 additional states, and a survey…

  15. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  16. Investigation of continuous effect modifiers in a meta-analysis on higher versus lower PEEP in patients requiring mechanical ventilation--protocol of the ICEM study.

    Science.gov (United States)

    Kasenda, Benjamin; Sauerbrei, Willi; Royston, Patrick; Briel, Matthias

    2014-05-20

    Categorizing an inherently continuous predictor in prognostic analyses raises several critical methodological issues: dependence of the statistical significance on the number and position of the chosen cut-point(s), loss of statistical power, and faulty interpretation of the results if a non-linear association is incorrectly assumed to be linear. This also applies to a therapeutic context where investigators of randomized clinical trials (RCTs) are interested in interactions between treatment assignment and one or more continuous predictors. Our goal is to apply the multivariable fractional polynomial interaction (MFPI) approach to investigate interactions between continuous patient baseline variables and the allocated treatment in an individual patient data meta-analysis of three RCTs (N = 2,299) from the intensive care field. For each study, MFPI will provide a continuous treatment effect function. Functions from each of the three studies will be averaged by a novel meta-analysis approach for functions. We will plot treatment effect functions separately for each study and also the averaged function. The averaged function with a related confidence interval will provide a suitable basis to assess whether a continuous patient characteristic modifies the treatment comparison and may be relevant for clinical decision-making. The compared interventions will be a higher or lower positive end-expiratory pressure (PEEP) ventilation strategy in patients requiring mechanical ventilation. The continuous baseline variables body mass index, PaO2/FiO2, respiratory compliance, and oxygenation index will be the investigated potential effect modifiers. Clinical outcomes for this analysis will be in-hospital mortality, time to death, time to unassisted breathing, and pneumothorax. This project will be the first meta-analysis to combine continuous treatment effect functions derived by the MFPI procedure separately in each of several RCTs. Such an approach requires individual

  17. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  18. Analysis of Issues for Project Scheduling by Multiple, Dispersed Schedulers (distributed Scheduling) and Requirements for Manual Protocols and Computer-based Support

    Science.gov (United States)

    Richards, Stephen F.

    1991-01-01

    Although computerized operations have significant gains realized in many areas, one area, scheduling, has enjoyed few benefits from automation. The traditional methods of industrial engineering and operations research have not proven robust enough to handle the complexities associated with the scheduling of realistic problems. To address this need, NASA has developed the computer-aided scheduling system (COMPASS), a sophisticated, interactive scheduling tool that is in wide-spread use within NASA and the contractor community. Therefore, COMPASS provides no explicit support for the large class of problems in which several people, perhaps at various locations, build separate schedules that share a common pool of resources. This research examines the issue of distributing scheduling, as applied to application domains characterized by the partial ordering of tasks, limited resources, and time restrictions. The focus of this research is on identifying issues related to distributed scheduling, locating applicable problem domains within NASA, and suggesting areas for ongoing research. The issues that this research identifies are goals, rescheduling requirements, database support, the need for communication and coordination among individual schedulers, the potential for expert system support for scheduling, and the possibility of integrating artificially intelligent schedulers into a network of human schedulers.

  19. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  20. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  1. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  2. The Belgian trial with azithromycin for acute COPD exacerbations requiring hospitalization: an investigator-initiated study protocol for a multicenter, randomized, double-blind, placebo-controlled trial

    Directory of Open Access Journals (Sweden)

    Vermeersch K

    2016-03-01

    3 days, followed by a maintenance dose of 250 mg once every 2 days. The primary endpoint is the time-to-treatment failure during the treatment phase (ie, from the moment of randomization until the end of intervention. Treatment failure is a novel composite endpoint defined as either death, the admission to intensive care or the requirement of additional systemic steroids or new antibiotics for respiratory reasons, or the diagnosis of a new AE after discharge.Discussion: We investigate whether azithromycin initiated at the onset of a severe exacerbation, with a limited duration and at a low dose, might be effective and safe in the highest risk period during and immediately after the acute event. If proven effective and safe, this targeted approach may improve the treatment of severe AEs and redirect the preventive use of azithromycin in COPD to a temporary intervention in the subgroup with the highest unmet needs. Keywords: COPD, acute exacerbation, macrolide antibiotics, azithromycin, physical activity, RCT

  3. EVA Human Health and Performance Benchmarking Study Overview and Development of a Microgravity Protocol

    Science.gov (United States)

    Norcross, Jason; Jarvis, Sarah; Bekdash, Omar; Cupples, Scott; Abercromby, Andrew

    2017-01-01

    The primary objective of this study is to develop a protocol to reliably characterize human health and performance metrics for individuals working inside various EVA suits under realistic spaceflight conditions. Expected results and methodologies developed during this study will provide the baseline benchmarking data and protocols with which future EVA suits and suit configurations (e.g., varied pressure, mass, center of gravity [CG]) and different test subject populations (e.g., deconditioned crewmembers) may be reliably assessed and compared. Results may also be used, in conjunction with subsequent testing, to inform fitness-for-duty standards, as well as design requirements and operations concepts for future EVA suits and other exploration systems.

  4. Matching Value Propositions with Varied Customer Needs

    DEFF Research Database (Denmark)

    Heikka, Eija-Liisa; Frandsen, Thomas; Hsuan, Juliana

    2018-01-01

    Organizations seek to manage varied customer segments using varied value propositions. The ability of a knowledge-intensive business service (KIBS) provider to formulate value propositions into attractive offerings to varied customers becomes a competitive advantage. In this specific business based...... on often highly abstract service offerings, this requires the provider to have a clear overview of its knowledge and resources and how these can be configured to obtain the desired customization of services. Hence, the purpose of this paper is to investigate how a KIBS provider can match value propositions...... with varied customer needs utilizing service modularity. To accomplish this purpose, a qualitative multiple case study is organized around 5 projects allowing within-case and cross-case comparisons. Our findings describe how through the configuration of knowledge and resources a sustainable competitive...

  5. A Formal Language for Cryptographic Protocol Requirements

    Science.gov (United States)

    1996-01-01

    L;KAB; AgKBS ; fA; TAgKAB (4) B sends to A: fTA + 1gKAB Here A and B are two principals. By sending the rst message, A requests of the...A: CertB; fAKBgKA ; algchoiceB; fmd (fAKBgKA ; algchoiceB ; NA; alglistA)gK1 B (3) A sends to B: fAKAgKB ; fmd (fAKAgKB ; fAKBgKA)gK1 A CertX is a...alglistA 3. B sends to C: CertB ; fAKBgKC ; algchoiceB; fmd (fAKBgKC ; algchoiceB ; NA; alglistA)gK1 B (intercepted by I) 4. IB sends to A : CertB

  6. Neuroimaging in dementia and Alzheimer's disease: Current protocols and practice in the Republic of Ireland

    International Nuclear Information System (INIS)

    Kelly, I.; Butler, M.-L.; Ciblis, A.; McNulty, J.P.

    2016-01-01

    these varied for MRI and PET. • Standardisation of neuroimaging protocols is required to allow novel biomarkers to be incorporated into clinical practice.

  7. FLIP: An Internetwork Protocol for Supporting Distributed Systems

    NARCIS (Netherlands)

    Kaashoek, M.F.; van Renesse, R.; van Staveren, H.; Tanenbaum, A.S.

    1993-01-01

    Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements 1993. Instead of using ad hoc protocols to meet each of the new requirements, we have designed a new protocol,

  8. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  9. Measurement exercise at the Fort de Vaujours on 25 February 2014. Reading of measurements performed by the ACRO according to the requirements of the IRSN PRP-CRI/SIAR 14-00093 technical protocol

    International Nuclear Information System (INIS)

    Pigree, G.; Josset, M.; Barbey, P.

    2014-01-01

    This document reports radiological measurements performed on the request of the ASN Paris department on some singular points and according to a specific technical protocol elaborated by the IRSN. After a discussion of results, the report presents instruments used for radiological measurements, reference values issued from other sites, reference values at a point of entrance of the site and at the vicinity of singular points, and then measurements on singular points. Additional measurements have been performed on a radioactive fragment at the origin of some offsets. The text of the IRSN technical protocol for this specific study (scope, areas to be controlled, expected radioactive elements, technical protocol, result presentation) is provided in appendix

  10. Distributed Time-Varying Formation Robust Tracking for General Linear Multiagent Systems With Parameter Uncertainties and External Disturbances.

    Science.gov (United States)

    Hua, Yongzhao; Dong, Xiwang; Li, Qingdong; Ren, Zhang

    2017-05-18

    This paper investigates the time-varying formation robust tracking problems for high-order linear multiagent systems with a leader of unknown control input in the presence of heterogeneous parameter uncertainties and external disturbances. The followers need to accomplish an expected time-varying formation in the state space and track the state trajectory produced by the leader simultaneously. First, a time-varying formation robust tracking protocol with a totally distributed form is proposed utilizing the neighborhood state information. With the adaptive updating mechanism, neither any global knowledge about the communication topology nor the upper bounds of the parameter uncertainties, external disturbances and leader's unknown input are required in the proposed protocol. Then, in order to determine the control parameters, an algorithm with four steps is presented, where feasible conditions for the followers to accomplish the expected time-varying formation tracking are provided. Furthermore, based on the Lyapunov-like analysis theory, it is proved that the formation tracking error can converge to zero asymptotically. Finally, the effectiveness of the theoretical results is verified by simulation examples.

  11. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  12. Risk of Acute Kidney Injury in Patients Randomized to a Restrictive Versus Liberal Approach to Red Blood Cell Transfusion in Cardiac Surgery: A Substudy Protocol of the Transfusion Requirements in Cardiac Surgery III Noninferiority Trial.

    Science.gov (United States)

    Garg, Amit X; Shehata, Nadine; McGuinness, Shay; Whitlock, Richard; Fergusson, Dean; Wald, Ron; Parikh, Chirag; Bagshaw, Sean M; Khanykin, Boris; Gregory, Alex; Syed, Summer; Hare, Gregory M T; Cuerden, Meaghan S; Thorpe, Kevin E; Hall, Judith; Verma, Subodh; Roshanov, Pavel S; Sontrop, Jessica M; Mazer, C David

    2018-01-01

    When safe to do so, avoiding blood transfusions in cardiac surgery can avoid the risk of transfusion-related infections and other complications while protecting a scarce resource and reducing costs. This protocol describes a kidney substudy of the Transfusion Requirements in Cardiac Surgery III (TRICS-III) trial, a multinational noninferiority randomized controlled trial to determine whether the risk of major clinical outcomes in patients undergoing planned cardiac surgery with cardiopulmonary bypass is no greater with a restrictive versus liberal approach to red blood cell transfusion. The objective of this substudy is to determine whether the risk of acute kidney injury is no greater with a restrictive versus liberal approach to red blood cell transfusion, and whether this holds true in patients with and without preexisting chronic kidney disease. Multinational noninferiority randomized controlled trial conducted in 73 centers in 19 countries (2014-2017). Patients (~4800) undergoing planned cardiac surgery with cardiopulmonary bypass. The primary outcome of this substudy is perioperative acute kidney injury, defined as an acute rise in serum creatinine from the preoperative value (obtained in the 30-day period before surgery), where an acute rise is defined as ≥26.5 μmol/L in the first 48 hours after surgery or ≥50% in the first 7 days after surgery. We will report the absolute risk difference in acute kidney injury and the 95% confidence interval. We will repeat the primary analysis using alternative definitions of acute kidney injury, including staging definitions, and will examine effect modification by preexisting chronic kidney disease (defined as a preoperative estimated glomerular filtration rate [eGFR] blood cell transfusion in the presence of anemia during cardiac surgery done with cardiopulmonary bypass. www.clinicaltrials.gov; clinical trial registration number NCT 02042898.

  13. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  14. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  15. Time-varying Crash Risk

    DEFF Research Database (Denmark)

    Christoffersen, Peter; Feunoua, Bruno; Jeon, Yoontae

    We estimate a continuous-time model with stochastic volatility and dynamic crash probability for the S&P 500 index and find that market illiquidity dominates other factors in explaining the stock market crash risk. While the crash probability is time-varying, its dynamic depends only weakly on re...

  16. Eestlased Karlovy Varys / J. R.

    Index Scriptorium Estoniae

    J. R.

    2007-01-01

    Ilmar Raagi mängufilm "Klass" osaleb 42. Karlovy Vary rahvusvahelise filmifestivali võistlusprogrammis "East of the West" ja Asko Kase lühimängufilm "Zen läbi prügi" on valitud festivali kõrvalprogrammi "Forum of Independents"

  17. Esmaklassiline Karlovy Vary / Jaanus Noormets

    Index Scriptorium Estoniae

    Noormets, Jaanus

    2007-01-01

    Ilmar Raagi mängufilm "Klass" võitis 42. Karlovy Vary rahvusvahelise filmifestivalil kaks auhinda - ametliku kõrvalvõistlusprogrammi "East of the West" eripreemia "Special mention" ja Euroopa väärtfilmikinode keti Europa Cinemas preemia. Ka Asko Kase lühifilmi "Zen läbi prügi linastumisest ning teistest auhinnasaajatest ning osalejatest

  18. Optimistlik Karlovy Vary / Jaan Ruus

    Index Scriptorium Estoniae

    Ruus, Jaan, 1938-2017

    2007-01-01

    42. Karlovy Vary rahvusvahelise filmifestivali auhinnatud filmidest (žürii esimees Peter Bart). Kristallgloobuse sai Islandi-Saksamaa "Katseklaasilinn" (režii Baltasar Kormakur), parimaks režissööriks tunnistati norralane Bard Breien ("Negatiivse mõtlemise kunst"). Austraallase Michael James Rowlandi "Hea õnne teekond" sai žürii eripreemia

  19. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  20. Distributed fault-tolerant time-varying formation control for high-order linear multi-agent systems with actuator failures.

    Science.gov (United States)

    Hua, Yongzhao; Dong, Xiwang; Li, Qingdong; Ren, Zhang

    2017-11-01

    This paper investigates the fault-tolerant time-varying formation control problems for high-order linear multi-agent systems in the presence of actuator failures. Firstly, a fully distributed formation control protocol is presented to compensate for the influences of both bias fault and loss of effectiveness fault. Using the adaptive online updating strategies, no global knowledge about the communication topology is required and the bounds of actuator failures can be unknown. Then an algorithm is proposed to determine the control parameters of the fault-tolerant formation protocol, where the time-varying formation feasible conditions and an approach to expand the feasible formation set are given. Furthermore, the stability of the proposed algorithm is proven based on the Lyapunov-like theory. Finally, two simulation examples are given to demonstrate the effectiveness of the theoretical results. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  1. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  2. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  3. Genetic polymorphisms in varied environments.

    Science.gov (United States)

    Powell, J R

    1971-12-03

    Thirteen experimenital populationis of Drosophila willistoni were maintained in cages, in some of which the environments were relatively constant and in others varied. After 45 weeks, the populations were assayed by gel electrophoresis for polymorphisms at 22 protein loci. The average heterozygosity per individual and the average unmber of alleles per locus were higher in populations maintained in heterogeneous environments than in populations in more constant enviroments.

  4. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  5. Risk of Acute Kidney Injury in Patients Randomized to a Restrictive Versus Liberal Approach to Red Blood Cell Transfusion in Cardiac Surgery: A Substudy Protocol of the Transfusion Requirements in Cardiac Surgery III Noninferiority Trial

    Directory of Open Access Journals (Sweden)

    Amit X. Garg

    2018-01-01

    Full Text Available Background: When safe to do so, avoiding blood transfusions in cardiac surgery can avoid the risk of transfusion-related infections and other complications while protecting a scarce resource and reducing costs. This protocol describes a kidney substudy of the Transfusion Requirements in Cardiac Surgery III (TRICS-III trial, a multinational noninferiority randomized controlled trial to determine whether the risk of major clinical outcomes in patients undergoing planned cardiac surgery with cardiopulmonary bypass is no greater with a restrictive versus liberal approach to red blood cell transfusion. Objective: The objective of this substudy is to determine whether the risk of acute kidney injury is no greater with a restrictive versus liberal approach to red blood cell transfusion, and whether this holds true in patients with and without preexisting chronic kidney disease. Design and Setting: Multinational noninferiority randomized controlled trial conducted in 73 centers in 19 countries (2014-2017. Patients: Patients (~4800 undergoing planned cardiac surgery with cardiopulmonary bypass. Measurements: The primary outcome of this substudy is perioperative acute kidney injury, defined as an acute rise in serum creatinine from the preoperative value (obtained in the 30-day period before surgery, where an acute rise is defined as ≥26.5 μmol/L in the first 48 hours after surgery or ≥50% in the first 7 days after surgery. Methods: We will report the absolute risk difference in acute kidney injury and the 95% confidence interval. We will repeat the primary analysis using alternative definitions of acute kidney injury, including staging definitions, and will examine effect modification by preexisting chronic kidney disease (defined as a preoperative estimated glomerular filtration rate [eGFR] <60 mL/min/1.73 m 2 . Limitations: It is not possible to blind patients or providers to the intervention; however, objective measures will be used to assess

  6. The Thermal Collector With Varied Glass Covers

    International Nuclear Information System (INIS)

    Luminosu, I.; Pop, N.

    2010-01-01

    The thermal collector with varied glass covers represents an innovation realized in order to build a collector able to reach the desired temperature by collecting the solar radiation from the smallest surface, with the highest efficiency. In the case of the thermal collector with variable cover glasses, the number of the glass plates covering the absorber increases together with the length of the circulation pipe for the working fluid. The thermal collector with varied glass covers compared to the conventional collector better meet user requirements because: for the same temperature increase, has the collecting area smaller; for the same collection area, realizes the highest temperature increase and has the highest efficiency. This works is addressed to researchers in the solar energy and to engineers responsible with air-conditioning systems design or industrial and agricultural products drying.

  7. Service Characteristics Based High Speed Multimedia Transport Protocol

    National Research Council Canada - National Science Library

    Chen, C

    1997-01-01

    .... This multimedia protocol will automatically extract service requirements from multimedia applications by selecting certain sets of parameters from user applications to optimally drive the lower level physical network...

  8. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  9. Conceptual Modeling of Time-Varying Information

    DEFF Research Database (Denmark)

    Gregersen, Heidi; Jensen, Christian S.

    2004-01-01

    A wide range of database applications manage information that varies over time. Many of the underlying database schemas of these were designed using the Entity-Relationship (ER) model. In the research community as well as in industry, it is common knowledge that the temporal aspects of the mini......-world are important, but difficult to capture using the ER model. Several enhancements to the ER model have been proposed in an attempt to support the modeling of temporal aspects of information. Common to the existing temporally extended ER models, few or no specific requirements to the models were given...

  10. A time-varying magnetic flux concentrator

    International Nuclear Information System (INIS)

    Kibret, B; Premaratne, M; Lewis, P M; Thomson, R; Fitzgerald, P B

    2016-01-01

    It is known that diverse technological applications require the use of focused magnetic fields. This has driven the quest for controlling the magnetic field. Recently, the principles in transformation optics and metamaterials have allowed the realization of practical static magnetic flux concentrators. Extending such progress, here, we propose a time-varying magnetic flux concentrator cylindrical shell that uses electric conductors and ferromagnetic materials to guide magnetic flux to its center. Its performance is discussed based on finite-element simulation results. Our proposed design has potential applications in magnetic sensors, medical devices, wireless power transfer, and near-field wireless communications. (paper)

  11. Varying Constants, Gravitation and Cosmology

    Directory of Open Access Journals (Sweden)

    Jean-Philippe Uzan

    2011-03-01

    Full Text Available Fundamental constants are a cornerstone of our physical laws. Any constant varying in space and/or time would reflect the existence of an almost massless field that couples to matter. This will induce a violation of the universality of free fall. Thus, it is of utmost importance for our understanding of gravity and of the domain of validity of general relativity to test for their constancy. We detail the relations between the constants, the tests of the local position invariance and of the universality of free fall. We then review the main experimental and observational constraints that have been obtained from atomic clocks, the Oklo phenomenon, solar system observations, meteorite dating, quasar absorption spectra, stellar physics, pulsar timing, the cosmic microwave background and big bang nucleosynthesis. At each step we describe the basics of each system, its dependence with respect to the constants, the known systematic effects and the most recent constraints that have been obtained. We then describe the main theoretical frameworks in which the low-energy constants may actually be varying and we focus on the unification mechanisms and the relations between the variation of different constants. To finish, we discuss the more speculative possibility of understanding their numerical values and the apparent fine-tuning that they confront us with.

  12. Comparison of diagnostic protocols and the equivalent effective dose in renal cancer and herniated lumbar disc

    International Nuclear Information System (INIS)

    Ruiz Perez de Villar, M.J.; Vano Carruana, E.; Lanzos Gonbzalez, E.; Perez Torrubia, A.

    1994-01-01

    Renal cancer (RC) and herniated lumbar disc (HLD) were the two pathologies selected for the study of the diagnostic protocols applied in different centers to determine how their variability is reflected in the effective equivalent dose (EED) and establish the optimal radiological protocol for diagnostic purposes, while using the lowest possible dose. On the basis of 222 case histories, it was observed that the EED resulting from the diagnosis of HLD can vary as much as a factor of 3(6.2-18.9 mSv). Likewise, the EED related to the diagnosis of RC can be modified by a factor of 1.5(32.6-48.3 mSv), depending on the diagnostic protocol employed. It can be considered that the optimal protocol to reach a diagnosis of HLD includes chest x-ray, lumbar spine x-ray and lumbar CT scan, while that required for the diagnosis of RC involves chest x-ray, IVU, abdominal CT scan and digital subtraction angiography. The optimization of the study protocols-especially the reduction of the number of exposures, modernization and quality control of the equipment, among other aspects, can reduce the EED by a factor of 2. (Author)

  13. Weighted approximation with varying weight

    CERN Document Server

    Totik, Vilmos

    1994-01-01

    A new construction is given for approximating a logarithmic potential by a discrete one. This yields a new approach to approximation with weighted polynomials of the form w"n"(" "= uppercase)P"n"(" "= uppercase). The new technique settles several open problems, and it leads to a simple proof for the strong asymptotics on some L p(uppercase) extremal problems on the real line with exponential weights, which, for the case p=2, are equivalent to power- type asymptotics for the leading coefficients of the corresponding orthogonal polynomials. The method is also modified toyield (in a sense) uniformly good approximation on the whole support. This allows one to deduce strong asymptotics in some L p(uppercase) extremal problems with varying weights. Applications are given, relating to fast decreasing polynomials, asymptotic behavior of orthogonal polynomials and multipoint Pade approximation. The approach is potential-theoretic, but the text is self-contained.

  14. Estrelas variáveis

    OpenAIRE

    Viana, Sérgio Manuel de Oliveira

    2001-01-01

    A observação do céu nocturno é uma prática que vem da Antiguidade. Desde então e durante muito tempo pensou-se que as estrelas mantinham o brilho constante. Assim foi até ao século XVI, quando David Fabricius observou uma estrela cujo brilho variava periodicamente. Dois séculos mais tarde, Jonh Goodricke descobriu uma segunda estrela e com o desenvolvimento de instrumentos de observação este conjunto foi muito alargado e hoje inclui o Sol.A variação do brilho das estrelas variáveis permite d...

  15. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  16. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  17. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  18. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  19. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  20. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  1. Validation of the OMRON M7 (HEM-780-E) blood pressure measuring device in a population requiring large cuff use according to the International Protocol of the European Society of Hypertension.

    Science.gov (United States)

    El Feghali, Ramzi N; Topouchian, Jirar A; Pannier, Bruno M; El Assaad, Hiba A; Asmar, Roland G

    2007-06-01

    A high percentage of hypertensive patients present an arm circumference of over 32 cm; the use of a large cuff is therefore recommended. Validation studies are usually performed in the general population using a standard-size cuff. The aim of this study was to assess the accuracy of the Omron M7 device in a population with an arm circumference ranging from 32 to 42 cm. A validation study was performed according to the International Protocol of the European Society of Hypertension. This protocol is divided into two phases: the first phase is performed on 15 selected participants (45 pairs of blood-pressure measurements); if the device passes this phase, 18 supplementary participants are included (54 pairs of blood-pressure measurements), making a total number of 33 participants (99 pairs of blood-pressure measurements), on whom the analysis is performed. For each participant, four blood-pressure measurements were performed simultaneously by two trained observers, using mercury sphygmomanometers fitted with a Y tube; the measurements alternated with three by the test device. The difference between the blood-pressure value given by the device and that obtained by the two observers (mean of the two observations) was calculated for each measure. The 99 pairs of blood-pressure differences were classified into three categories (Society of Hypertension protocol. The Omron M7 device passed the first and the second phases of the validation process. The average differences between the two observers were 1.5+/-3.2 and -0.5+/-2.2 mmHg for systolic blood pressure and diastolic blood pressure, and those between the device and the mercury sphygmomanometer were -1.6+/-6.7 for systolic blood pressure and -0.12+/-4.0 mmHg for diastolic blood pressure Readings that differ by less than 5, 10 and 15 mmHg for systolic blood-pressure and diastolic blood-pressure values fulfill the recommendation criteria of the European Society of Hypertension protocol. The Omron M7 (HEM-780-E) device

  2. Analysis of limiting information characteristics of quantum-cryptography protocols

    International Nuclear Information System (INIS)

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-01

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  3. Variability in donation after cardiac death protocols: a national survey.

    Science.gov (United States)

    Fugate, Jennifer E; Stadtler, Maria; Rabinstein, Alejandro A; Wijdicks, Eelco F M

    2011-02-27

    As donation after cardiac death practices expand, the number of institutional policies is increasing. We contacted organ procurement organizations throughout the United States and requested protocols in hospitals in their donor service areas. Sixty-four protocols were obtained with representation from 16 different states. The terminology and recommended practices varied substantially. The methods for death determination were not specified in 28 (44%) protocols. Most adhered to a 2- to 5-min observation time between circulatory arrest and organ procurement, but 10 (16%) provided no information. This variability reveals a need to define a uniform standard in donation after cardiac death protocols and death determination practices.

  4. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  5. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  6. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  7. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  8. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  9. Progress on MEVVA source VARIS at GSI

    Science.gov (United States)

    Adonin, A.; Hollinger, R.

    2018-05-01

    For the last few years, the development of the VARIS (vacuum arc ion source) was concentrated on several aspects. One of them was the production of high current ion beams of heavy metals such as Au, Pb, and Bi. The requested ion charge state for these ion species is 4+. This is quite challenging to produce in vacuum arc driven sources for reasonable beam pulse length (>120 µs) due to the physical properties of these elements. However, the situation can be dramatically improved by using the composite materials or alloys with enhanced physical properties of the cathodes. Another aspect is an increase of the beam brilliance for intense U4+ beams by the optimization of the geometry of the extraction system. A new 7-hole triode extraction system allows an increase of the extraction voltage from 30 kV to 40 kV and also reduces the outer aperture of the extracted ion beam. Thus, a record beam brilliance for the U4+ beam in front of the RFQ (Radio-Frequency Quadrupole) has been achieved, exceeding the RFQ space charge limit for an ion current of 15 mA. Several new projectiles in the middle-heavy region have been successfully developed from VARIS to fulfill the requirements of the future FAIR (Facility for Antiproton and Ion Research) programs. An influence of an auxiliary gas on the production performance of certain ion charge states as well as on operation stability has been investigated. The optimization of the ion source parameters for a maximum production efficiency and highest particle current in front of the RFQ has been performed. The next important aspect of the development will be the increase of the operation repetition rate of VARIS for all elements especially for uranium to 2.7 Hz in order to provide the maximum availability of high current ion beams for future FAIR experiments.

  10. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  11. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  12. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  13. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  14. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  15. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  16. SAMP, the Simple Application Messaging Protocol: Letting applications talk to each other

    Science.gov (United States)

    Taylor, M. B.; Boch, T.; Taylor, J.

    2015-06-01

    SAMP, the Simple Application Messaging Protocol, is a hub-based communication standard for the exchange of data and control between participating client applications. It has been developed within the context of the Virtual Observatory with the aim of enabling specialised data analysis tools to cooperate as a loosely integrated suite, and is now in use by many and varied desktop and web-based applications dealing with astronomical data. This paper reviews the requirements and design principles that led to SAMP's specification, provides a high-level description of the protocol, and discusses some of its common and possible future usage patterns, with particular attention to those factors that have aided its success in practice.

  17. Role of humidity and other correction factors in the AAPM TG-21 dosimetry protocol

    International Nuclear Information System (INIS)

    Rogers, D.W.; Ross, C.K.

    1988-01-01

    A detailed derivation is presented of the formulas required to determine Ngas and Dmed in the AAPM TG-21 dosimetry protocol. This protocol specifies how to determine the absorbed dose in an electron or photon beam when using exposure or absorbed dose calibrated ion chambers. It is shown that the expression given in TG-21's recent letter of clarification is incorrect. Accounting for humidity correctly increases, by 0.4%, all absorbed dose determinations using an exposure calibrated ion chamber. Taking into account other correction factors in the equation for exposure could also have varying, but significant effects (possibly over 1%). These are the stem scatter correction, the axial nonuniformity correction and the electrode correction for electrodes made of different materials from the wall. Attention is drawn to differences in the definitions of the exposure and absorbed dose calibration factors, Nx and ND, respectively, as supplied by the NBS and the NRCC

  18. Bouncing Ball with a Uniformly Varying Velocity in a Metronome Synchronization Task.

    Science.gov (United States)

    Huang, Yingyu; Gu, Li; Yang, Junkai; Wu, Xiang

    2017-09-21

    Sensorimotor synchronization (SMS), a fundamental human ability to coordinate movements with external rhythms, has long been thought to be modality specific. In the canonical metronome synchronization task that requires tapping a finger along with an isochronous sequence, a well-established finding is that synchronization is much more stable to an auditory sequence consisting of auditory tones than to a visual sequence consisting of visual flashes. However, recent studies have shown that periodically moving visual stimuli can substantially improve synchronization compared with visual flashes. In particular, synchronization of a visual bouncing ball that has a uniformly varying velocity was found to be not less stable than synchronization of auditory tones. Here, the current protocol describes the application of the bouncing ball with a uniformly varying velocity in a metronome synchronization task. The usage of the bouncing ball in sequences with different inter-onset intervals (IOI) is included. The representative results illustrate synchronization performance of the bouncing ball, as compared with the performances of auditory tones and visual flashes. Given its comparable synchronization performance to that of auditory tones, the bouncing ball is of particular importance for addressing the current research topic of whether modality-specific mechanisms underlay SMS.

  19. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  20. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  1. The development of standard operating protocols for paediatric radiology

    International Nuclear Information System (INIS)

    Hardwick, J.; Mencik, C.; McLaren, C.; Young, C.; Scadden, S.; Mashford, P.; McHugh, K.; Beckett, M.; Calvert, M.; Marsden, P.J.

    2001-01-01

    This paper describes how the requirement for operating protocols for standard radiological practice was expanded to provide a comprehensive aide to the operator conducting a medical exposure. The protocols adopted now include justification criteria, patient preparation, radiographic technique, standard exposure charts, diagnostic reference levels and image quality criteria. In total, the protocols have been welcomed as a tool for ensuring that medical exposures are properly optimised. (author)

  2. Transitions of Care from Child and Adolescent Mental Health Services to Adult Mental Health Services (TRACK Study: A study of protocols in Greater London

    Directory of Open Access Journals (Sweden)

    Ford Tamsin

    2008-06-01

    Full Text Available Abstract Background Although young people's transition from Child and Adolescent Mental Health Services (CAMHS to Adult Mental Health Services (AMHS in England is a significant health issue for service users, commissioners and providers, there is little evidence available to guide service development. The TRACK study aims to identify factors which facilitate or impede effective transition from CAHMS to AMHS. This paper presents findings from a survey of transition protocols in Greater London. Methods A questionnaire survey (Jan-April 2005 of Greater London CAMHS to identify transition protocols and collect data on team size, structure, transition protocols, population served and referral rates to AMHS. Identified transition protocols were subjected to content analysis. Results Forty two of the 65 teams contacted (65% responded to the survey. Teams varied in type (generic/targeted/in-patient, catchment area (locality-based, wider or national and transition boundaries with AMHS. Estimated annual average number of cases considered suitable for transfer to AMHS, per CAMHS team (mean 12.3, range 0–70, SD 14.5, n = 37 was greater than the annual average number of cases actually accepted by AMHS (mean 8.3, range 0–50, SD 9.5, n = 33. In April 2005, there were 13 active and 2 draft protocols in Greater London. Protocols were largely similar in stated aims and policies, but differed in key procedural details, such as joint working between CAHMS and AMHS and whether protocols were shared at Trust or locality level. While the centrality of service users' involvement in the transition process was identified, no protocol specified how users should be prepared for transition. A major omission from protocols was procedures to ensure continuity of care for patients not accepted by AMHS. Conclusion At least 13 transition protocols were in operation in Greater London in April 2005. Not all protocols meet all requirements set by government policy. Variation in

  3. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  4. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  5. A varying-α brane world cosmology

    International Nuclear Information System (INIS)

    Youm, Donam

    2001-08-01

    We study the brane world cosmology in the RS2 model where the electric charge varies with time in the manner described by the varying fine-structure constant theory of Bekenstein. We map such varying electric charge cosmology to the dual variable-speed-of-light cosmology by changing system of units. We comment on cosmological implications for such cosmological models. (author)

  6. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  7. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  8. Radiotherapy QA of the DAHANCA 19 protocol

    DEFF Research Database (Denmark)

    Samsøe, E.; Andersen, E.; Hansen, C. R.

    2015-01-01

    Purpose/Objective: It has been demonstrated that nonadherence to protocol-specified radiotherapy (RT) requirements is associated with reduced survival, local control and potentially increased toxicity [1]. Thus, quality assurance (QA) of RT is important when evaluating the results of clinical...

  9. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  10. Performance Analysis of TDMA Protocol in a Femtocell Network

    Directory of Open Access Journals (Sweden)

    Wanod Kumar

    2014-07-01

    Full Text Available In this paper, we evaluate the performance of TDMA (Time Division Multiple Access protocol using queuing theory in a femtocell network. The fair use of wireless channel among the users of network is carried out using TDMA protocol. The arrival of data packets from M communicating nodes becomes multiple Poisson process. The time slots of TDMA protocol represent c servers to communicate data packets coming from communicating nodes to the input of FAP (Femtocell Access Point. The service time of each server (time slot is exponentially distributed. This complete communication scenario using TDMA protocol is modeled using M/M/c queue. The performance of the protocol is evaluated in terms of mean number in system, average system delay and utilization for varying traffic intensity

  11. Constant round group key agreement protocols: A comparative study

    NARCIS (Netherlands)

    Makri, E.; Konstantinou, Elisavet

    2011-01-01

    The scope of this paper is to review and evaluate all constant round Group Key Agreement (GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that require 1,2,3,4 and 5 rounds and examined their efficiency. In particular, we calculated each protocol’s computation and

  12. Protocol for Quantification of Defects in Natural Fibres for Composites

    DEFF Research Database (Denmark)

    Mortensen, Ulrich Andreas; Madsen, Bo

    2014-01-01

    Natural bast-type plant fibres are attracting increasing interest for being used for structural composite applications where high quality fibres with good mechanical properties are required. A protocol for the quantification of defects in natural fibres is presented. The protocol is based...

  13. Australian high-dose-rate brachytherapy protocols for gynaecological malignancy

    International Nuclear Information System (INIS)

    MacLeod, C.; Dally, M.; Stevens, M.; Thornton, D.; Carruthers, S.; Jeal, P.

    2001-01-01

    There is no consensus over the optimal dose fractionation schedules for high-dose-rate (HDR) brachytherapy used for gynaecological malignancy. In Australian public hospital departments of radiation oncology, HDR brachytherapy for gynaecological cancer is being more commonly used. A survey of public departments that are using this technology, or that plan to introduce this technology, was performed. Their current protocols are presented. In general, protocols are similar biologically; however, the practical aspects such as the number of fractions given do vary and may reflect resource restrictions or, alternatively, differences in interpretations of the literature and of the best protocols by clinicians. Copyright (2001) Blackwell Science Pty Ltd

  14. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  15. Protocols for second-generation business satellites systems

    Science.gov (United States)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  16. The micro-habitat methodology. Application protocols

    Energy Technology Data Exchange (ETDEWEB)

    Sabaton, C; Valentin, S; Souchon, Y

    1995-06-01

    A strong need has been felt for guidelines to help various entities in applying the micro-habitat methodology, particularly in impact studies on hydroelectric installations. CEMAGREF and Electricite de France have developed separately two protocols with five major steps: reconnaissance of the river, selection of representative units to be studied in greater depth, morpho-dynamic measurements at one or more rates of discharge and hydraulic modeling, coupling of hydraulic and biological models, calculation of habitat-quality scores for fish, analysis of results. The two approaches give very comparable results and are essentially differentiated by the hydraulic model used. CEMAGREF uses a one-dimensional model requiring measurements at only one discharge rate. Electricite de France uses a simplified model based on measurements at several rates of discharge. This approach is possible when discharge can be controlled in the study area during data acquisition, as is generally the case downstream of hydroelectric installations. The micro-habitat methodology is now a fully operational tool with which to study changes in fish habitat quality in relation to varying discharge. It provides an element of assessment pertinent to the choice of instreaming flow to be maintained downstream of a hydroelectric installation; this information is essential when the flow characteristics (velocity, depth) and the nature of the river bed are the preponderant factors governing habitat suitability for trout or salmon. The ultimate decision must nonetheless take into account any other potentially limiting factors for the biocenoses on the one hand, and the target water use objectives on the other. In many cases, compromises must be found among different uses, different species and different stages in the fish development cycle. (Abstract Truncated)

  17. Evolution of a C2 protocol gateway

    CSIR Research Space (South Africa)

    Duvenhage, A

    2008-06-01

    Full Text Available real-time or slower than real-time, depending on the type of link and the data source: The gateway normally reads logged raw protocol data much faster than real-time; a simulation could also start running slower than real-time if it requires too... inherent support for logging and playback of the raw protocol data. From a software architecture perspective, each link has a corresponding link component that is responsible for opening and closing the connection, as well as reading and writing...

  18. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  19. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  20. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  1. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  2. Computation of gradually varied flow in compound open channel ...

    Indian Academy of Sciences (India)

    The flow of water in an open channel can be treated as steady, gradually varied flow for ... channel between two nodes is treated as a single reach to calculate the loss ... dition at control points and (iii) critical depth is also required to verify the ...

  3. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  4. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  5. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  6. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  7. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  8. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  9. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  10. Spacetime-varying couplings and Lorentz violation

    International Nuclear Information System (INIS)

    Kostelecky, V. Alan; Lehnert, Ralf; Perry, Malcolm J.

    2003-01-01

    Spacetime-varying coupling constants can be associated with violations of local Lorentz invariance and CPT symmetry. An analytical supergravity cosmology with a time-varying fine-structure constant provides an explicit example. Estimates are made for some experimental constraints

  11. Detection of dynamically varying interaural time differences

    DEFF Research Database (Denmark)

    Kohlrausch, Armin; Le Goff, Nicolas; Breebaart, Jeroen

    2010-01-01

    of fringes surrounding the probe is equal to the addition of the effects of the individual fringes. In this contribution, we present behavioral data for the same experimental condition, called dynamically varying ITD detection, but for a wider range of probe and fringe durations. Probe durations varied...

  12. Renormalization group theory for percolation in time-varying networks.

    Science.gov (United States)

    Karschau, Jens; Zimmerling, Marco; Friedrich, Benjamin M

    2018-05-22

    Motivated by multi-hop communication in unreliable wireless networks, we present a percolation theory for time-varying networks. We develop a renormalization group theory for a prototypical network on a regular grid, where individual links switch stochastically between active and inactive states. The question whether a given source node can communicate with a destination node along paths of active links is equivalent to a percolation problem. Our theory maps the temporal existence of multi-hop paths on an effective two-state Markov process. We show analytically how this Markov process converges towards a memoryless Bernoulli process as the hop distance between source and destination node increases. Our work extends classical percolation theory to the dynamic case and elucidates temporal correlations of message losses. Quantification of temporal correlations has implications for the design of wireless communication and control protocols, e.g. in cyber-physical systems such as self-organized swarms of drones or smart traffic networks.

  13. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    Prayer, Daniela; Brugger, Peter Christian; Prayer, Lucas

    2004-01-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  14. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  15. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  16. IP- -: A Reduced Internet Protocol for Optical Packet Networking

    Science.gov (United States)

    Ohta, Masataka; Fujikawa, Kenji

    IP- - is proposed as an Internet Protocol suitable for optical packet networking. As optical routers require much faster control than electric ones and lack of optical buffers other than those by fiber delay lines requires fixed time control, Internet Protocols must be at least as simple as IPv4 and much simpler than IPv6. IP- - also addresses issues of IP address space exhaustion and IP routing table explosion.

  17. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  18. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  19. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  20. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  1. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  2. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  3. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Beckers, Catherine; Hustinx, Roland

    2014-01-01

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  4. Design of 2D Time-Varying Vector Fields

    KAUST Repository

    Chen, Guoning; Kwatra, Vivek; Wei, Li-Yi; Hansen, Charles D.; Zhang, Eugene

    2012-01-01

    Design of time-varying vector fields, i.e., vector fields that can change over time, has a wide variety of important applications in computer graphics. Existing vector field design techniques do not address time-varying vector fields. In this paper, we present a framework for the design of time-varying vector fields, both for planar domains as well as manifold surfaces. Our system supports the creation and modification of various time-varying vector fields with desired spatial and temporal characteristics through several design metaphors, including streamlines, pathlines, singularity paths, and bifurcations. These design metaphors are integrated into an element-based design to generate the time-varying vector fields via a sequence of basis field summations or spatial constrained optimizations at the sampled times. The key-frame design and field deformation are also introduced to support other user design scenarios. Accordingly, a spatial-temporal constrained optimization and the time-varying transformation are employed to generate the desired fields for these two design scenarios, respectively. We apply the time-varying vector fields generated using our design system to a number of important computer graphics applications that require controllable dynamic effects, such as evolving surface appearance, dynamic scene design, steerable crowd movement, and painterly animation. Many of these are difficult or impossible to achieve via prior simulation-based methods. In these applications, the time-varying vector fields have been applied as either orientation fields or advection fields to control the instantaneous appearance or evolving trajectories of the dynamic effects. © 1995-2012 IEEE.

  5. Design of 2D time-varying vector fields.

    Science.gov (United States)

    Chen, Guoning; Kwatra, Vivek; Wei, Li-Yi; Hansen, Charles D; Zhang, Eugene

    2012-10-01

    Design of time-varying vector fields, i.e., vector fields that can change over time, has a wide variety of important applications in computer graphics. Existing vector field design techniques do not address time-varying vector fields. In this paper, we present a framework for the design of time-varying vector fields, both for planar domains as well as manifold surfaces. Our system supports the creation and modification of various time-varying vector fields with desired spatial and temporal characteristics through several design metaphors, including streamlines, pathlines, singularity paths, and bifurcations. These design metaphors are integrated into an element-based design to generate the time-varying vector fields via a sequence of basis field summations or spatial constrained optimizations at the sampled times. The key-frame design and field deformation are also introduced to support other user design scenarios. Accordingly, a spatial-temporal constrained optimization and the time-varying transformation are employed to generate the desired fields for these two design scenarios, respectively. We apply the time-varying vector fields generated using our design system to a number of important computer graphics applications that require controllable dynamic effects, such as evolving surface appearance, dynamic scene design, steerable crowd movement, and painterly animation. Many of these are difficult or impossible to achieve via prior simulation-based methods. In these applications, the time-varying vector fields have been applied as either orientation fields or advection fields to control the instantaneous appearance or evolving trajectories of the dynamic effects.

  6. Design of 2D Time-Varying Vector Fields

    KAUST Repository

    Chen, Guoning

    2012-10-01

    Design of time-varying vector fields, i.e., vector fields that can change over time, has a wide variety of important applications in computer graphics. Existing vector field design techniques do not address time-varying vector fields. In this paper, we present a framework for the design of time-varying vector fields, both for planar domains as well as manifold surfaces. Our system supports the creation and modification of various time-varying vector fields with desired spatial and temporal characteristics through several design metaphors, including streamlines, pathlines, singularity paths, and bifurcations. These design metaphors are integrated into an element-based design to generate the time-varying vector fields via a sequence of basis field summations or spatial constrained optimizations at the sampled times. The key-frame design and field deformation are also introduced to support other user design scenarios. Accordingly, a spatial-temporal constrained optimization and the time-varying transformation are employed to generate the desired fields for these two design scenarios, respectively. We apply the time-varying vector fields generated using our design system to a number of important computer graphics applications that require controllable dynamic effects, such as evolving surface appearance, dynamic scene design, steerable crowd movement, and painterly animation. Many of these are difficult or impossible to achieve via prior simulation-based methods. In these applications, the time-varying vector fields have been applied as either orientation fields or advection fields to control the instantaneous appearance or evolving trajectories of the dynamic effects. © 1995-2012 IEEE.

  7. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  8. Bounding the per-protocol effect in randomized trials: An application to colorectal cancer screening

    NARCIS (Netherlands)

    S.A. Swanson (Sonja); Holme (Øyvind); M. Løberg (Magnus); M. Kalager (Mette); M. Bretthauer (Michael); G. Hoff (G.); E. Aas (Eline); M.A. Hernán (M.)

    2015-01-01

    textabstractBackground: The per-protocol effect is the effect that would have been observed in a randomized trial had everybody followed the protocol. Though obtaining a valid point estimate for the per-protocol effect requires assumptions that are unverifiable and often implausible, lower and upper

  9. Safety of a DVT chemoprophylaxis protocol following traumatic brain injury: a single center quality improvement initiative.

    Science.gov (United States)

    Nickele, Christopher M; Kamps, Timothy K; Medow, Joshua E

    2013-04-01

    Venous thromboembolism (VTE) is a complication that affects approximately 30 % of moderate and severe traumatic brain injury (TBI) patients when pharmacologic prophylaxis is not used. Following TBI, specifically in the case of contusions, the safety and efficacy of pharmacologic thromboembolism prophylaxis (PTP) has been studied only in small sample sizes. In this study, we attempt to assess the safety and efficacy of a PTP protocol for TBI patients, as a quality improvement (QI) initiative, in the neuroscience intensive care unit (NSICU). Between January 1st and December 31st, 2009, consecutive patients discharged from the University of Wisconsin NSICU after >a 48 h minimum stay were evaluated as part of a QI project. A protocol for the initiation of PTP was designed and implemented for NSICU patients. The protocol did not vary based on type of intracranial injury. The rate of VTE was reported as was heparin-induced thrombocytopenia and PTP-related expansion of intracranial hemorrhage (IH) requiring reoperation. The number of patients receiving PTP and the timing of therapy were tracked. Patients were excluded for persistent coagulopathy, other organ system bleeding (such as the gastrointestinal tract), or pregnancy. Faculty could opt out of the protocol without reason. Using the same criteria, patients discharged during the preceding 6 months, from July 1st to December 31st, 2008, were evaluated as controls as the PTP protocol was not in effect during this time. During the control period, there were 48 head trauma admissions who met the inclusion criteria. In 22 patients (45.8 %), PTP was initiated at an average of 4.9 ± 5.4 days after admission. During the protocol period, there were 87 head trauma admissions taken from 1,143 total NSICU stays who met criteria. In 63 patients (72.4 %), the care team in the NSICU successfully initiated PTP, at an average of 3.4 ± 2.8 days after admission. All 87 trauma patients were analyzed, and the rate of clinically

  10. Eesti film võistleb Karlovy Varys

    Index Scriptorium Estoniae

    2008-01-01

    8. juulil esilinastub Karlovy Vary filmifestivalil Rene Vilbre noortefilm "Mina olin siin", mille aluseks on Sass Henno romaan "Mina olin siin. Esimene arest", stsenaariumi kirjutas Ilmar Raag. Film võistleb võistlusprogrammis "East of the West"

  11. Compilation of Instantaneous Source Functions for Varying ...

    African Journals Online (AJOL)

    Compilation of Instantaneous Source Functions for Varying Architecture of a Layered Reservoir with Mixed Boundaries and Horizontal Well Completion Part III: B-Shaped Architecture with Vertical Well in the Upper Layer.

  12. Compilation of Instantaneous Source Functions for Varying ...

    African Journals Online (AJOL)

    Compilation of Instantaneous Source Functions for Varying Architecture of a Layered Reservoir with Mixed Boundaries and Horizontal Well Completion Part IV: Normal and Inverted Letter 'h' and 'H' Architecture.

  13. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  14. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  15. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  16. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  17. Evaluation of storage and filtration protocols for alpine/subalpine lake water quality samples

    Science.gov (United States)

    John L. Korfmacher; Robert C. Musselman

    2007-01-01

    Many government agencies and other organizations sample natural alpine and subalpine surface waters using varying protocols for sample storage and filtration. Simplification of protocols would be beneficial if it could be shown that sample quality is unaffected. In this study, samples collected from low ionic strength waters in alpine and subalpine lake inlets...

  18. Early functional outcome of two surgical protocols used in the repair ...

    African Journals Online (AJOL)

    Background and objective The outcome of different treatment protocols for primary management of patients with complete unilateral cleft lip palate (UCLP) may vary considerably. This study aimed to compare the results of quality of speech and velopharyngeal sphincter mechanism between two surgical protocols used in ...

  19. A multigear protocol for sampling crayfish assemblages in Gulf of Mexico coastal streams

    Science.gov (United States)

    William R. Budnick; William E. Kelso; Susan B. Adams; Michael D. Kaller

    2018-01-01

    Identifying an effective protocol for sampling crayfish in streams that vary in habitat and physical/chemical characteristics has proven problematic. We evaluated an active, combined-gear (backpack electrofishing and dipnetting) sampling protocol in 20 Coastal Plain streams in Louisiana. Using generalized linear models and rarefaction curves, we evaluated environmental...

  20. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    Science.gov (United States)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  1. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  2. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  3. Domo arigato Kyoto: Four key lessons from the Kyoto Protocol for a new agreement in Paris 2015. Climate Brief no. 35

    International Nuclear Information System (INIS)

    Morel, Romain; Shishlov, Igor; Bellassen, Valentin

    2014-05-01

    The results from the first commitment period of the Kyoto Protocol (KP) show that developed countries fulfilled their commitments through varied strategies. However, the Kyoto protocol did not manage to stabilize global GHG concentrations; furthermore its direct impact on domestic emissions reductions is unclear. Nevertheless, the KP has likely paved the way for a low-carbon transition by establishing international standards on emissions monitoring and on emission reductions projects. Yet, domestic policies - especially the EU ETS - are the main driver of emissions reductions and the principal catalyzers of private finance flows. A new, more effective, agreement would therefore need to expand its coverage, and take down the specter of 'internationally binding' emission reductions commitments in order to focus on MRV requirements. Similar to Kyoto, a Paris outcome could take the form of a framework agreement setting up requirements and mechanisms with subsequent implementing agreements expected by 2020. (authors)

  4. Monitoring System with Two Central Facilities Protocol

    Directory of Open Access Journals (Sweden)

    Caesar Firdaus

    2017-03-01

    Full Text Available The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and implementing security protocol. In this research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could fulfill two of four cryptography objectives, consist of authentication and non-repudiation. The solid collaboration between central legitimization agency (CLA, central tabulating facility (CTF, and client is the main idea in two central facilities protocol. The utilization of AES algorithm could defend the data on transmission from man in the middle attack scenario. On the other hand, whitespace manipulation algorithm provided data integrity aspect of the document that is uploaded to the system itself. Both of the algorithm fulfill confidentiality, data integrity, and authentication.

  5. Varying constants, black holes, and quantum gravity

    International Nuclear Information System (INIS)

    Carlip, S.

    2003-01-01

    Tentative observations and theoretical considerations have recently led to renewed interest in models of fundamental physics in which certain 'constants' vary in time. Assuming fixed black hole mass and the standard form of the Bekenstein-Hawking entropy, Davies, Davis and Lineweaver have argued that the laws of black hole thermodynamics disfavor models in which the fundamental electric charge e changes. I show that with these assumptions, similar considerations severely constrain 'varying speed of light' models, unless we are prepared to abandon cherished assumptions about quantum gravity. Relaxation of these assumptions permits sensible theories of quantum gravity with ''varying constants,'' but also eliminates the thermodynamic constraints, though the black hole mass spectrum may still provide some restrictions on the range of allowable models

  6. IAEA to implement Safeguards Additional Protocols in the EU

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  7. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  8. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  9. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  10. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  11. IVOA Credential Delegation Protocol Version 1.0

    Science.gov (United States)

    Plante, Raymond; Graham, Matthew; Rixon, Guy; Taffoni, Giuliano; Plante, Raymond; Graham, Matthew

    2010-02-01

    The credential delegation protocol allows a client program to delegate a user's credentials to a service such that that service may make requests of other services in the name of that user. The protocol defines a REST service that works alongside other IVO services to enable such a delegation in a secure manner. In addition to defining the specifics of the service protocol, this document describes how a delegation service is registered in an IVOA registry along with the services it supports. The specification also explains how one can determine from a service registration that it requires the use of a supporting delegation service.

  12. "Mina olin siin" esilinastub Karlovy Varys

    Index Scriptorium Estoniae

    2008-01-01

    Karlovy Vary filmifestivalil esilinastub Rene Vilbre noortefilm "Mina olin siin", mille aluseks on Sass Henno romaan "Mina olin siin. Esimene arest", stsenaariumi kirjutas Ilmar Raag. Film võistleb võistlusprogrammis "East of the West". Esitlema sõidavad R. Vilbre, R. Sildos, R. Kaljujärv, T. Tuisk

  13. Tracking time-varying coefficient-functions

    DEFF Research Database (Denmark)

    Nielsen, Henrik Aalborg; Nielsen, Torben Skov; Joensen, Alfred K.

    2000-01-01

    is a combination of recursive least squares with exponential forgetting and local polynomial regression. It is argued, that it is appropriate to let the forgetting factor vary with the value of the external signal which is the argument of the coefficient functions. Some of the key properties of the modified method...... are studied by simulation...

  14. Filmihullu eluvesi voolab Karlovy Varys / Margit Tõnson

    Index Scriptorium Estoniae

    Tõnson, Margit, 1978-

    2010-01-01

    Karlovy Vary rahvusvahelisest filmifestivalist. Filmidest "Mr. Nobody" (rež. Jaco Van Dormaeli), "Kasside ema Teresa" (rež. Pawel Sala) ja "The Arbor" (rež. Clio Barnardi). Nimekiri võitnud töödest ja viimastel aastatel festivalil näidatud Eesti mängufilmidest

  15. Ellipsometry with randomly varying polarization states

    NARCIS (Netherlands)

    Liu, F.; Lee, C. J.; Chen, J. Q.; E. Louis,; van der Slot, P. J. M.; Boller, K. J.; F. Bijkerk,

    2012-01-01

    We show that, under the right conditions, one can make highly accurate polarization-based measurements without knowing the absolute polarization state of the probing light field. It is shown that light, passed through a randomly varying birefringent material has a well-defined orbit on the Poincar

  16. Õunpuu Karlovy Varys edukas

    Index Scriptorium Estoniae

    2010-01-01

    45. Karlovy Vary filmifestivali võistlusprogrammis "East of the West" märgiti ära Veiko Õunpuu film "Püha Tõnu kiusamine". Peaauhind läks rumeenlase Cristi Puiu filmile "Aurora". Grand prix´sai Augustĺ Vila film "La mosquitera". Teisi preemiasaajaid

  17. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  18. Radiologic procedures, policies and protocols for pediatric emergency medicine

    International Nuclear Information System (INIS)

    Woodward, George A.

    2008-01-01

    Protocol development between radiology and pediatric emergency medicine requires a multidisciplinary approach to manage straightforward as well as complex and time-sensitive needs for emergency department patients. Imaging evaluation requires coordination of radiologic technologists, radiologists, transporters, nurses and coordinators, among others, and might require accelerated routines or occur at sub-optimal times. Standardized protocol development enables providers to design a best practice in all of these situations and should be predicated on evidence, mission, and service expectations. As in any new process, constructive feedback channels are imperative for evaluation and modification. (orig.)

  19. Analysis of Security Protocols for Mobile Healthcare.

    Science.gov (United States)

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  20. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  1. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  2. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  3. Gamma camera performance: technical assessment protocol

    International Nuclear Information System (INIS)

    Bolster, A.A.; Waddington, W.A.

    1996-01-01

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera's computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author)

  4. Protocol for the verification of minimum criteria

    International Nuclear Information System (INIS)

    Gaggiano, M.; Spiccia, P.; Gaetano Arnetta, P.

    2014-01-01

    This Protocol has been prepared with reference to the provisions of article 8 of the Legislative Decree of May 26, 2000 No. 187. Quality controls of radiological equipment fit within the larger 'quality assurance Program' and are intended to ensure the correct operation of the same and the maintenance of that State. The pursuit of this objective guarantees that the radiological equipment subjected to those controls also meets the minimum criteria of acceptability set out in annex V of the aforementioned legislative decree establishing the conditions necessary to allow the functions to which each radiological equipment was designed, built and for which it is used. The Protocol is established for the purpose of quality control of radiological equipment of Cone Beam Computer Tomography type and reference document, in the sense that compliance with stated tolerances also ensures the subsistence minimum acceptability requirements, where applicable.

  5. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.......e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful...... in this direction is to extend saturation-based techniques so that enough state information can be modelled and analysed. Finally, we present a methodology for proving the same security properties in the computational model, by means of typing protocol implementations....

  6. Gamma camera performance: technical assessment protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bolster, A.A. [West Glasgow Hospitals NHS Trust, London (United Kingdom). Dept. of Clinical Physics; Waddington, W.A. [University College London Hospitals NHS Trust, London (United Kingdom). Inst. of Nuclear Medicine

    1996-12-31

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera`s computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author).

  7. Shape and Spatially-Varying Reflectance Estimation from Virtual Exemplars.

    Science.gov (United States)

    Hui, Zhuo; Sankaranarayanan, Aswin C

    2017-10-01

    This paper addresses the problem of estimating the shape of objects that exhibit spatially-varying reflectance. We assume that multiple images of the object are obtained under a fixed view-point and varying illumination, i.e., the setting of photometric stereo. At the core of our techniques is the assumption that the BRDF at each pixel lies in the non-negative span of a known BRDF dictionary. This assumption enables a per-pixel surface normal and BRDF estimation framework that is computationally tractable and requires no initialization in spite of the underlying problem being non-convex. Our estimation framework first solves for the surface normal at each pixel using a variant of example-based photometric stereo. We design an efficient multi-scale search strategy for estimating the surface normal and subsequently, refine this estimate using a gradient descent procedure. Given the surface normal estimate, we solve for the spatially-varying BRDF by constraining the BRDF at each pixel to be in the span of the BRDF dictionary; here, we use additional priors to further regularize the solution. A hallmark of our approach is that it does not require iterative optimization techniques nor the need for careful initialization, both of which are endemic to most state-of-the-art techniques. We showcase the performance of our technique on a wide range of simulated and real scenes where we outperform competing methods.

  8. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  9. Trading sulphur emissions under the Second Sulphur Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Foersund, Finn R.; Naevdal, Eric

    1997-07-01

    Emission trading is a potent policy instrument in theoretical analyses of environmental policy. However, trading in emission quotas of non-uniformly dispersed pollutants requires that the offsetting quantities vary with location of sources. Such a system is not yet in use. The Second Sulphur Protocol for Europe makes it possible to try out a system of ``exchange rates`` through a clause allowing ``joint implementation`` of emission reductions. In this report, the authors investigate some properties of a system with exogenous exchange rates within a simultaneous trade model based on cost efficiency. Incorporation of constraints on depositions in third party countries may be necessary in order to get third party country cooperation. It is demonstrated that imposition of constraints is feasible, but it is also revealed what demands such incorporation places on the design of the institutional setting. Constraints on trade should only be introduced when the concern for the environment of the various receptors fail to be captured adequately by the calibration of the exchange rates. 16 refs., 2 figs., 3 tabs.

  10. Varied line-space gratings and applications

    International Nuclear Information System (INIS)

    McKinney, W.R.

    1991-01-01

    This paper presents a straightforward analytical and numerical method for the design of a specific type of varied line-space grating system. The mathematical development will assume plane or nearly-plane spherical gratings which are illuminated by convergent light, which covers many interesting cases for synchrotron radiation. The gratings discussed will have straight grooves whose spacing varies across the principal plane of the grating. Focal relationships and formulae for the optical grating-pole-to-exist-slit distance and grating radius previously presented by other authors will be derived with a symbolic algebra system. It is intended to provide the optical designer with the tools necessary to design such a system properly. Finally, some possible advantages and disadvantages for application to synchrotron to synchrotron radiation beamlines will be discussed

  11. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  12. Spatially varying dispersion to model breakthrough curves.

    Science.gov (United States)

    Li, Guangquan

    2011-01-01

    Often the water flowing in a karst conduit is a combination of contaminated water entering at a sinkhole and cleaner water released from the limestone matrix. Transport processes in the conduit are controlled by advection, mixing (dilution and dispersion), and retention-release. In this article, a karst transport model considering advection, spatially varying dispersion, and dilution (from matrix seepage) is developed. Two approximate Green's functions are obtained using transformation of variables, respectively, for the initial-value problem and for the boundary-value problem. A numerical example illustrates that mixing associated with strong spatially varying conduit dispersion can cause strong skewness and long tailing in spring breakthrough curves. Comparison of the predicted breakthrough curve against that measured from a dye-tracing experiment between Ames Sink and Indian Spring, Northwest Florida, shows that the conduit dispersivity can be as large as 400 m. Such a large number is believed to imply strong solute interaction between the conduit and the matrix and/or multiple flow paths in a conduit network. It is concluded that Taylor dispersion is not dominant in transport in a karst conduit, and the complicated retention-release process between mobile- and immobile waters may be described by strong spatially varying conduit dispersion. Copyright © 2010 The Author(s). Journal compilation © 2010 National Ground Water Association.

  13. New varying speed of light theories

    CERN Document Server

    Magueijo, J

    2003-01-01

    We review recent work on the possibility of a varying speed of light (VSL). We start by discussing the physical meaning of a varying $c$, dispelling the myth that the constancy of $c$ is a matter of logical consistency. We then summarize the main VSL mechanisms proposed so far: hard breaking of Lorentz invariance; bimetric theories (where the speeds of gravity and light are not the same); locally Lorentz invariant VSL theories; theories exhibiting a color dependent speed of light; varying $c$ induced by extra dimensions (e.g. in the brane-world scenario); and field theories where VSL results from vacuum polarization or CPT violation. We show how VSL scenarios may solve the cosmological problems usually tackled by inflation, and also how they may produce a scale-invariant spectrum of Gaussian fluctuations, capable of explaining the WMAP data. We then review the connection between VSL and theories of quantum gravity, showing how ``doubly special'' relativity has emerged as a VSL effective model of quantum space...

  14. Telemetry Standards, IRIG Standard 106-17, Chapter 22, Network Based Protocol Suite

    Science.gov (United States)

    2017-07-01

    requirements. 22.2 Network Access Layer 22.2.1 Physical Layer Connectors and cable media should meet the electrical or optical properties required by the...Telemetry Standards, IRIG Standard 106-17 Chapter 22, July 2017 i CHAPTER 22 Network -Based Protocol Suite Acronyms...iii Chapter 22. Network -Based Protocol Suite

  15. Anistropically varying conductivity in irreversible electroporation simulations.

    Science.gov (United States)

    Labarbera, Nicholas; Drapaca, Corina

    2017-11-01

    One recent area of cancer research is irreversible electroporation (IRE). Irreversible electroporation is a minimally invasive procedure where needle electrodes are inserted into the body to ablate tumor cells with electricity. The aim of this paper is to propose a mathematical model that incorporates a tissue's conductivity increasing more in the direction of the electrical field as this has been shown to occur in experiments. It was necessary to mathematically derive a valid form of the conductivity tensor such that it is dependent on the electrical field direction and can be easily implemented into numerical software. The derivation of a conductivity tensor that can take arbitrary functions for the conductivity in the directions tangent and normal to the electrical field is the main contribution of this paper. Numerical simulations were performed for isotropic-varying and anisotropic-varying conductivities to evaluate the importance of including the electrical field's direction in the formulation for conductivity. By starting from previously published experimental results, this paper derived a general formulation for an anistropic-varying tensor for implementation into irreversible electroporation modeling software. The anistropic-varying tensor formulation allows the conductivity to take into consideration both electrical field direction and magnitude, as opposed to previous published works that only took into account electrical field magnitude. The anisotropic formulation predicts roughly a five percent decrease in ablation size for the monopolar simulation and approximately a ten percent decrease in ablation size for the bipolar simulations. This is a positive result as previously reported results found the isotropic formulation to overpredict ablation size for both monopolar and bipolar simulations. Furthermore, it was also reported that the isotropic formulation overpredicts the ablation size more for the bipolar case than the monopolar case. Thus, our

  16. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  17. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  18. New varying speed of light theories

    International Nuclear Information System (INIS)

    Magueijo, Joao

    2003-01-01

    We review recent work on the possibility of a varying speed of light (VSL). We start by discussing the physical meaning of a varying-c, dispelling the myth that the constancy of c is a matter of logical consistency. We then summarize the main VSL mechanisms proposed so far: hard breaking of Lorentz invariance; bimetric theories (where the speeds of gravity and light are not the same); locally Lorentz invariant VSL theories; theories exhibiting a colour-dependent speed of light; varying-c induced by extra dimensions (e.g. in the brane-world scenario); and field theories where VSL results from vacuum polarization or CPT violation. We show how VSL scenarios may solve the cosmological problems usually tackled by inflation, and also how they may produce a scale-invariant spectrum of Gaussian fluctuations, capable of explaining the WMAP data. We then review the connection between VSL and theories of quantum gravity, showing how 'doubly special' relativity has emerged as a VSL effective model of quantum space-time, with observational implications for ultra-high energy cosmic rays (UHECRs) and gamma ray bursts. Some recent work on the physics of 'black' holes and other compact objects in VSL theories is also described, highlighting phenomena associated with spatial (as opposed to temporal) variations in c. Finally, we describe the observational status of the theory. The evidence is currently slim-redshift dependence in the atomic fine structure, anomalies with UHECRs, and (to a much lesser extent) the acceleration of the universe and the WMAP data. The constraints (e.g. those arising from nucleosynthesis or geological bounds) are tight but not insurmountable. We conclude with the observational predictions of the theory and the prospects for its refutation or vindication

  19. Linear Parameter Varying Control of Induction Motors

    DEFF Research Database (Denmark)

    Trangbæk, Klaus

    The subject of this thesis is the development of linear parameter varying (LPV) controllers and observers for control of induction motors. The induction motor is one of the most common machines in industrial applications. Being a highly nonlinear system, it poses challenging control problems...... for high performance applications. This thesis demonstrates how LPV control theory provides a systematic way to achieve good performance for these problems. The main contributions of this thesis are the application of the LPV control theory to induction motor control as well as various contributions...

  20. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  1. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  2. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  3. Structured Linear Parameter Varying Control of Wind Turbines

    DEFF Research Database (Denmark)

    Adegas, Fabiano Daher; Sloth, Christoffer; Stoustrup, Jakob

    2012-01-01

    High performance and reliability are required for wind turbines to be competitive within the energy market. To capture their nonlinear behavior, wind turbines are often modeled using parameter-varying models. In this chapter, a framework for modelling and controller design of wind turbines is pre...... in the controller synthesis are solved by an iterative LMI-based algorithm. The resulting controllers can also be easily implemented in practice due to low data storage and simple math operations. The performance of the LPV controllers is assessed by nonlinear simulations results....

  4. Measurement of periodically varying ECE spectra using a Michelson interferometer

    International Nuclear Information System (INIS)

    Laurent, L.; Rodriguez, L.; Talvard, M.

    1987-01-01

    In some tokamak experiments the ECE spectrum is periodically varying. If the modulation frequency is small enough (less than 10 Hz) the plasma can be considered as quasi-stationary during the typical scan time of most of the Michelson interferometers. It is possible to measure simply ECE spectra at different times of the oscillation. We present here a technique which allows to measure smaller fluctuations at larger frequencies. However the analysis requires a large number of periods of oscillation at constant frequency and a scanning mirror moving at constant velocity

  5. Data transmission protocol for Pi-of-the-Sky cameras

    Science.gov (United States)

    Uzycki, J.; Kasprowicz, G.; Mankiewicz, M.; Nawrocki, K.; Sitek, P.; Sokolowski, M.; Sulej, R.; Tlaczala, W.

    2006-10-01

    The large amount of data collected by the automatic astronomical cameras has to be transferred to the fast computers in a reliable way. The method chosen should ensure data streaming in both directions but in nonsymmetrical way. The Ethernet interface is very good choice because of its popularity and proven performance. However it requires TCP/IP stack implementation in devices like cameras for full compliance with existing network and operating systems. This paper describes NUDP protocol, which was made as supplement to standard UDP protocol and can be used as a simple-network protocol. The NUDP does not need TCP protocol implementation and makes it possible to run the Ethernet network with simple devices based on microcontroller and/or FPGA chips. The data transmission idea was created especially for the "Pi of the Sky" project.

  6. Varying prior information in Bayesian inversion

    International Nuclear Information System (INIS)

    Walker, Matthew; Curtis, Andrew

    2014-01-01

    Bayes' rule is used to combine likelihood and prior probability distributions. The former represents knowledge derived from new data, the latter represents pre-existing knowledge; the Bayesian combination is the so-called posterior distribution, representing the resultant new state of knowledge. While varying the likelihood due to differing data observations is common, there are also situations where the prior distribution must be changed or replaced repeatedly. For example, in mixture density neural network (MDN) inversion, using current methods the neural network employed for inversion needs to be retrained every time prior information changes. We develop a method of prior replacement to vary the prior without re-training the network. Thus the efficiency of MDN inversions can be increased, typically by orders of magnitude when applied to geophysical problems. We demonstrate this for the inversion of seismic attributes in a synthetic subsurface geological reservoir model. We also present results which suggest that prior replacement can be used to control the statistical properties (such as variance) of the final estimate of the posterior in more general (e.g., Monte Carlo based) inverse problem solutions. (paper)

  7. Brown Dwarf Variability: What's Varying and Why?

    Science.gov (United States)

    Marley, Mark Scott

    2014-01-01

    Surveys by ground based telescopes, HST, and Spitzer have revealed that brown dwarfs of most spectral classes exhibit variability. The spectral and temporal signatures of the variability are complex and apparently defy simplistic classification which complicates efforts to model the changes. Important questions include understanding if clearings are forming in an otherwise uniform cloud deck or if thermal perturbations, perhaps associated with breaking gravity waves, are responsible. If clouds are responsible how long does it take for the atmospheric thermal profile to relax from a hot cloudy to a cooler cloudless state? If thermal perturbations are responsible then what atmospheric layers are varying? How do the observed variability timescales compare to atmospheric radiative, chemical, and dynamical timescales? I will address such questions by presenting modeling results for time-varying partly cloudy atmospheres and explore the importance of various atmospheric processes over the relevant timescales for brown dwarfs of a range of effective temperatures. Regardless of the origin of the observed variability, the complexity seen in the atmospheres of the field dwarfs hints at the variability that we may encounter in the next few years in directly imaged young Jupiters. Thus understanding the nature of variability in the field dwarfs, including sensitivity to gravity and metallicity, is of particular importance for exoplanet characterization.

  8. Audit protocol of compliance test on x-ray and interventional radiodiagnostic

    International Nuclear Information System (INIS)

    Endang Kunarsih; Fitria Sandra

    2011-01-01

    Testing protocol is a document that defined and implemented by the testing agency in conducting compliance testing to ensure that quality of testing implementation is planned and controlled in accordance with applicable regulations and standards. Testing protocol is required in filing an application to be a qualified testing agency. Auditors will review the testing protocol document to assess adequacy of the acceptance criteria before proceed to the next process. This paper presents the acceptance criteria required in an audit of the testing protocol document from the applicant of testing agency. (author)

  9. Flow cytometry protocols

    National Research Council Canada - National Science Library

    Jaroszeski, Mark J; Heller, Richard

    1998-01-01

    ... are individually analyzed, and it is typical for flow cytometers to quantitatively process thousands of individual particles in a matter of seconds. This a powerful analytic feat particularly if one relates it to the time required to examine several thousand individual cells using a microscope. This leaves little doubt regarding why the field of flow cytometry has...

  10. Seed dormancy and germination vary within and among species of milkweeds

    Science.gov (United States)

    Kaye, Thomas N; Sandlin, Isaac J; Bahm, Matt A

    2018-01-01

    Abstract Pollinators in general and monarch butterflies in particular are in decline due to habitat loss. Efforts to restore habitats for insects that rely on specific plant groups as larvae or adults depend on the ability of practitioners to grow and produce these plants. Monarch larvae feed exclusively on milkweed species, primarily in the genus Asclepias, making propagation and restoration of these plants crucial for habitat restoration. Seed germination protocols for milkweeds are not well established, in part due to the large number of milkweed species and conflicting reports of seed dormancy in the genus. We tested for seed dormancy and the optimum period of cold stratification in 15 populations of A. speciosa and 1–2 populations of five additional species, including A. asperula, A. fascicularis, A. subulata, A. subverticillata and A. syriaca. We exposed seeds to cold (5 °C) moist conditions for 0, 2, 4, 6 and 8 weeks and then moved them to 15 °C/25 °C alternating temperatures. In A. speciosa, dormancy was detected in eight populations, and this dormancy was broken by 2–4 weeks of cold stratification. The remaining seven populations showed no dormancy. Seed dormancy was also detected in two populations of A. fascicularis (broken by 4–6 weeks of cold stratification) and a single population of A. syriaca (broken by 2 weeks of cold stratification). No dormancy was detected in A. asperula, A. subulata or A. subverticillata. Seed dormancy appears to be widespread in the genus (confirmed in 15 species) but can vary between populations even within the same species. Variation in seed dormancy and cold stratification requirements within and among Asclepias species suggests local adaptation and maternal environments may drive seedling ecology, and that growers should watch for low germination and use cold stratification as needed to maximize seed germination and retain genetic variability in restored populations. PMID:29593856

  11. Robust and Fault-Tolerant Linear Parameter-Varying Control of Wind Turbines

    DEFF Research Database (Denmark)

    Sloth, Christoffer; Esbensen, Thomas; Stoustrup, Jakob

    2011-01-01

    High performance and reliability are required for wind turbines to be competitive within the energy market. To capture their nonlinear behavior, wind turbines are often modeled using parameter-varying models. In this paper we design and compare multiple linear parameter-varying (LPV) controllers,...

  12. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  13. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  14. Hospital Casemix Protocol - Medibank Private Perspective.

    Science.gov (United States)

    Szakiel, John

    2010-06-01

    Hospital Casemix Protocol data provide a brief summary outlining morbidity data and costs associated with an episode of care. Federal government legislation requires that hospitals report this information to private health insurers who, in turn, merge these data with benefit outlays and report their findings to the Department of Health and Ageing (DoHA). This article gives a brief outline of the collection, cleansing and processing of these data and subsequent reporting to DoHA by Medibank Private, which accounts for approximately 30% of collected data.

  15. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  16. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  17. Quantifying requirements volatility effects

    NARCIS (Netherlands)

    Kulk, G.P.; Verhoef, C.

    2008-01-01

    In an organization operating in the bancassurance sector we identified a low-risk IT subportfolio of 84 IT projects comprising together 16,500 function points, each project varying in size and duration, for which we were able to quantify its requirements volatility. This representative portfolio

  18. Multi-party quantum key agreement protocol secure against collusion attacks

    Science.gov (United States)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  19. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    Science.gov (United States)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  20. Time-Varying Periodicity in Intraday Volatility

    DEFF Research Database (Denmark)

    Andersen, Torben Gustav; Thyrsgaard, Martin; Todorov, Viktor

    We develop a nonparametric test for deciding whether return volatility exhibits time-varying intraday periodicity using a long time-series of high-frequency data. Our null hypothesis, commonly adopted in work on volatility modeling, is that volatility follows a stationary process combined...... with a constant time-of-day periodic component. We first construct time-of-day volatility estimates and studentize the high-frequency returns with these periodic components. If the intraday volatility periodicity is invariant over time, then the distribution of the studentized returns should be identical across...... with estimating volatility moments through their sample counterparts. Critical values are computed via easy-to-implement simulation. In an empirical application to S&P 500 index returns, we find strong evidence for variation in the intraday volatility pattern driven in part by the current level of volatility...

  1. Flexible time-varying filter banks

    Science.gov (United States)

    Tuncer, Temel E.; Nguyen, Truong Q.

    1993-09-01

    Linear phase maximally flat FIR Butterworth filter approximations are discussed and a new filter design method is introduced. This variable cutoff filter design method uses the cosine modulated versions of a prototype filter. The design procedure is simple and different variants of this procedure can be used to obtain close to optimum linear phase filters. Using this method, flexible time-varying filter banks with good reconstruction error are introduced. These types of oversampled filter banks have small magnitude error which can be easily controlled by the appropriate choice of modulation frequency. This error can be further decreased by magnitude equalization without increasing the computational complexity considerably. Two dimensional design examples are also given.

  2. Behavior of varying-alpha cosmologies

    International Nuclear Information System (INIS)

    Barrow, John D.; Sandvik, Haavard Bunes; Magueijo, Joao

    2002-01-01

    We determine the behavior of a time-varying fine structure 'constant' α(t) during the early and late phases of universes dominated by the kinetic energy of changing α(t), radiation, dust, curvature, and lambda, respectively. We show that after leaving an initial vacuum-dominated phase during which α increases, α remains constant in universes such as our own during the radiation era, and then increases slowly, proportional to a logarithm of cosmic time, during the dust era. If the universe becomes dominated by a negative curvature or a positive cosmological constant then α tends rapidly to a constant value. The effect of an early period of de Sitter or power-law inflation is to drive α to a constant value. Various cosmological consequences of these results are discussed with reference to recent observational studies of the value of α from quasar absorption spectra and to the existence of life in expanding universes

  3. Emergence of epidemics in rapidly varying networks

    International Nuclear Information System (INIS)

    Kohar, Vivek; Sinha, Sudeshna

    2013-01-01

    We describe a simple model mimicking disease spreading on a network with dynamically varying connections, and investigate the dynamical consequences of switching links in the network. Our central observation is that the disease cycles get more synchronized, indicating the onset of epidemics, as the underlying network changes more rapidly. This behavior is found for periodically switched links, as well as links that switch randomly in time. We find that the influence of changing links is more pronounced in networks where the nodes have lower degree, and the disease cycle has a longer infective stage. Further, when the switching of links is periodic we observe finer dynamical features, such as beating patterns in the emergent oscillations and resonant enhancement of synchronization, arising from the interplay between the time-scales of the connectivity changes and that of the epidemic outbreaks

  4. Time varying, multivariate volume data reduction

    Energy Technology Data Exchange (ETDEWEB)

    Ahrens, James P [Los Alamos National Laboratory; Fout, Nathaniel [UC DAVIS; Ma, Kwan - Liu [UC DAVIS

    2010-01-01

    Large-scale supercomputing is revolutionizing the way science is conducted. A growing challenge, however, is understanding the massive quantities of data produced by large-scale simulations. The data, typically time-varying, multivariate, and volumetric, can occupy from hundreds of gigabytes to several terabytes of storage space. Transferring and processing volume data of such sizes is prohibitively expensive and resource intensive. Although it may not be possible to entirely alleviate these problems, data compression should be considered as part of a viable solution, especially when the primary means of data analysis is volume rendering. In this paper we present our study of multivariate compression, which exploits correlations among related variables, for volume rendering. Two configurations for multidimensional compression based on vector quantization are examined. We emphasize quality reconstruction and interactive rendering, which leads us to a solution using graphics hardware to perform on-the-fly decompression during rendering. In this paper we present a solution which addresses the need for data reduction in large supercomputing environments where data resulting from simulations occupies tremendous amounts of storage. Our solution employs a lossy encoding scheme to acrueve data reduction with several options in terms of rate-distortion behavior. We focus on encoding of multiple variables together, with optional compression in space and time. The compressed volumes can be rendered directly with commodity graphics cards at interactive frame rates and rendering quality similar to that of static volume renderers. Compression results using a multivariate time-varying data set indicate that encoding multiple variables results in acceptable performance in the case of spatial and temporal encoding as compared to independent compression of variables. The relative performance of spatial vs. temporal compression is data dependent, although temporal compression has the

  5. Network Authentication Protocol Studies

    Science.gov (United States)

    2009-04-01

    usually require compliance with development standards such as ISO 12207 or IEEE / IEC 12207 . Those standards mandate traceability as a property of a...standards have been proposed to deal with non-repudiation. ISO /IEC 10181-4 [19] and ISO /IEC 13888 [20, 22, 21]. While ISO /IEC 10181-4 provides a...framework for developing and employing these services, ISO /IEC 13888 consists of three parts. They propose a general model of non-repudiation and a set of

  6. Congestion control for vehicular delay tolerant network routing protocols

    OpenAIRE

    Oham, Chuka Finbars

    2014-01-01

    The Vehicular Delay Tolerant Network (VDTN) is a special and challenging type of the Delay Tolerant Network because of its high mobility, frequent disconnections and nodal congestion features. These challenging features make it prone to congestion which leads to a considerable amount of message drops in the network. To minimize the impact of congestion in the network, we designed and implemented the Congestion Aware Spray and Wait (CASaW) routing protocol. We varied the buffer sizes of the no...

  7. Fast space-varying convolution using matrix source coding with applications to camera stray light reduction.

    Science.gov (United States)

    Wei, Jianing; Bouman, Charles A; Allebach, Jan P

    2014-05-01

    Many imaging applications require the implementation of space-varying convolution for accurate restoration and reconstruction of images. Here, we use the term space-varying convolution to refer to linear operators whose impulse response has slow spatial variation. In addition, these space-varying convolution operators are often dense, so direct implementation of the convolution operator is typically computationally impractical. One such example is the problem of stray light reduction in digital cameras, which requires the implementation of a dense space-varying deconvolution operator. However, other inverse problems, such as iterative tomographic reconstruction, can also depend on the implementation of dense space-varying convolution. While space-invariant convolution can be efficiently implemented with the fast Fourier transform, this approach does not work for space-varying operators. So direct convolution is often the only option for implementing space-varying convolution. In this paper, we develop a general approach to the efficient implementation of space-varying convolution, and demonstrate its use in the application of stray light reduction. Our approach, which we call matrix source coding, is based on lossy source coding of the dense space-varying convolution matrix. Importantly, by coding the transformation matrix, we not only reduce the memory required to store it; we also dramatically reduce the computation required to implement matrix-vector products. Our algorithm is able to reduce computation by approximately factoring the dense space-varying convolution operator into a product of sparse transforms. Experimental results show that our method can dramatically reduce the computation required for stray light reduction while maintaining high accuracy.

  8. QoS-aware self-adaptation of communication protocols in a pervasive service middleware

    DEFF Research Database (Denmark)

    Zhang, Weishan; Hansen, Klaus Marius; Fernandes, João

    2010-01-01

    Pervasive computing is characterized by heterogeneous devices that usually have scarce resources requiring optimized usage. These devices may use different communication protocols which can be switched at runtime. As different communication protocols have different quality of service (Qo......S) properties, this motivates optimized self-adaption of protocols for devices, e.g., considering power consumption and other QoS requirements, e.g. round trip time (RTT) for service invocations, throughput, and reliability. In this paper, we present an extensible approach for self-adaptation of communication...... protocols for pervasive web services, where protocols are designed as reusable connectors and our middleware infrastructure can hide the complexity of using different communication protocols to upper layers. We also propose to use Genetic Algorithms (GAs) to find optimized configurations at runtime...

  9. Protocol-based care: the standardisation of decision-making?

    Science.gov (United States)

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  10. Energy Reduction Multipath Routing Protocol for MANET Using Recoil Technique

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Sahu

    2018-04-01

    Full Text Available In Mobile Ad-hoc networks (MANET, power conservation and utilization is an acute problem and has received significant attention from academics and industry in recent years. Nodes in MANET function on battery power, which is a rare and limited energy resource. Hence, its conservation and utilization should be done judiciously for the effective functioning of the network. In this paper, a novel protocol namely Energy Reduction Multipath Routing Protocol for MANET using Recoil Technique (AOMDV-ER is proposed, which conserves the energy along with optimal network lifetime, routing overhead, packet delivery ratio and throughput. It performs better than any other AODV based algorithms, as in AOMDV-ER the nodes transmit packets to their destination smartly by using a varying recoil off time technique based on their geographical location. This concept reduces the number of transmissions, which results in the improvement of network lifetime. In addition, the local level route maintenance reduces the additional routing overhead. Lastly, the prediction based link lifetime of each node is estimated which helps in reducing the packet loss in the network. This protocol has three subparts: an optimal route discovery algorithm amalgamation with the residual energy and distance mechanism; a coordinated recoiled nodes algorithm which eliminates the number of transmissions in order to reduces the data redundancy, traffic redundant, routing overhead, end to end delay and enhance the network lifetime; and a last link reckoning and route maintenance algorithm to improve the packet delivery ratio and link stability in the network. The experimental results show that the AOMDV-ER protocol save at least 16% energy consumption, 12% reduction in routing overhead, significant achievement in network lifetime and packet delivery ratio than Ad hoc on demand multipath distance vector routing protocol (AOMDV, Ad hoc on demand multipath distance vector routing protocol life

  11. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  12. Criteria for Evaluating Alternative Network and Link Layer Protocols for the NASA Constellation Program Communication Architecture

    Science.gov (United States)

    Benbenek, Daniel; Soloff, Jason; Lieb, Erica

    2010-01-01

    Selecting a communications and network architecture for future manned space flight requires an evaluation of the varying goals and objectives of the program, development of communications and network architecture evaluation criteria, and assessment of critical architecture trades. This paper uses Cx Program proposed exploration activities as a guideline; lunar sortie, outpost, Mars, and flexible path options are described. A set of proposed communications network architecture criteria are proposed and described. They include: interoperability, security, reliability, and ease of automating topology changes. Finally a key set of architecture options are traded including (1) multiplexing data at a common network layer vs. at the data link layer, (2) implementing multiple network layers vs. a single network layer, and (3) the use of a particular network layer protocol, primarily IPv6 vs. Delay Tolerant Networking (DTN). In summary, the protocol options are evaluated against the proposed exploration activities and their relative performance with respect to the criteria are assessed. An architectural approach which includes (a) the capability of multiplexing at both the network layer and the data link layer and (b) a single network layer for operations at each program phase, as these solutions are best suited to respond to the widest array of program needs and meet each of the evaluation criteria.

  13. Robust regeneration protocol for the Agrobacterium tumefaciens mediated transformation of Solanum tuberosum

    International Nuclear Information System (INIS)

    Abbasi, A.; Bilal, M.; Hussain, J.; Shah, M. M.; Hassan, A.

    2016-01-01

    Plant genetic transformation requires robust regeneration system. Plant growth regulators (PGRs) such as cytokinins (CKs) play a pivotal role in organogenesis; however, CKs are the most expensive PGRs. In the current study, an efficient yet economical protocol for regeneration of potato plant was developed. Stem inter-nodal and leaf explants were cultured on different regeneration media supplemented with varying concentration of different CKs such as kinetin and zeatin. Murashige- Skoog media added with zeatin (1, 1.5 mg/L) was designated as RZ1, RZ1.5, respectively or kinetin (1.5, 2 mg/L) was designated as RK1.5 and RK2, respectively, however, concentrations of other hormones such as NAA (1-Naphthaleneacetic acid) and GA3 (Gibberellic acid A3) were kept same. RZ1 and RZ1.5 gave significantly better Results as compared to RK-type media in all aspects studied such as callus initiation, days to first shoot emergence, number of shoots per explants. RZ1 medium was then selected as regeneration media for Agrobacterium-mediated transformation of potato plants with cyanobacterial phosphoenol pyruvate carboxylase gene, which provided multiple putative transformants on selection media. The transformants were further confirmed through PCR. The current protocol is found to be cost effective and efficient for the regeneration of Solanum tuberosum and can be successfully implied for the Agrobacterium-mediated transformation. (author)

  14. Cost effectiveness of a protocol using palivizumab in preterm infants

    Directory of Open Access Journals (Sweden)

    Yolanda Hernández-Gago

    2017-03-01

    risk, while many of them have associated risk factors you vary as have school-age siblings, rural residence, parental smoking, poor educational background of parents, lack of artificial feeding and family history of allergy. Conclusions: The consensus protocol has not been a significant increase in hospitalization rates in preterm infants <32 weeks gestational age patients. In those <35 has been observed a higher rate of hospitalization, with a very unfavorable cost-effectiveness for all clinical scenarios valued relationship.

  15. Behavior of cosmological models with varying G

    International Nuclear Information System (INIS)

    Barrow, J.D.; Parsons, P.

    1997-01-01

    We provide a detailed analysis of Friedmann-Robertson-Walker universes in a wide range of scalar-tensor theories of gravity. We apply solution-generating methods to three parametrized classes of scalar-tensor theory which lead naturally to general relativity in the weak-field limit. We restrict the parameters which specify these theories by the requirements imposed by the weak-field tests of gravitation theories in the solar system and by the requirement that viable cosmological solutions be obtained. We construct a range of exact solutions for open, closed, and flat isotropic universes containing matter with equation of state p≤(1)/(3)ρ and in vacuum. We study the range of early- and late-time behaviors displayed, examine when there is a open-quotes bounceclose quotes at early times, and expansion maxima in closed models. copyright 1997 The American Physical Society

  16. BioBlocks: Programming Protocols in Biology Made Easier.

    Science.gov (United States)

    Gupta, Vishal; Irimia, Jesús; Pau, Iván; Rodríguez-Patón, Alfonso

    2017-07-21

    The methods to execute biological experiments are evolving. Affordable fluid handling robots and on-demand biology enterprises are making automating entire experiments a reality. Automation offers the benefit of high-throughput experimentation, rapid prototyping, and improved reproducibility of results. However, learning to automate and codify experiments is a difficult task as it requires programming expertise. Here, we present a web-based visual development environment called BioBlocks for describing experimental protocols in biology. It is based on Google's Blockly and Scratch, and requires little or no experience in computer programming to automate the execution of experiments. The experiments can be specified, saved, modified, and shared between multiple users in an easy manner. BioBlocks is open-source and can be customized to execute protocols on local robotic platforms or remotely, that is, in the cloud. It aims to serve as a de facto open standard for programming protocols in Biology.

  17. A comprehensive protocol to evaluate the use of blood and its components in Latin America and the Caribbean

    Directory of Open Access Journals (Sweden)

    Ana E. del Pozo

    2015-06-01

    Full Text Available Blood transfusion safety is a critical part of appropriate health care. Considering the limited information available on the use of blood and its components in Latin America and the Caribbean, the Grupo Cooperativo iberoamericano de Medicina Transfusional (Ibero-American Cooperative Group for Transfusion Medicine; GCIAMT, through its Research and International Affairs committees, carried out a project to develop a protocol that would facilitate the evaluation of blood usage at the country, jurisdiction, and institutional levels in varied country contexts. Experts in blood safety from the Pan American Health Organization (Washington, DC, United States, the University of São Paulo (São Paulo, Brazil, the Hemocentro of São Paulo (São Paulo, Brazil, and GCIAMT designed a 2-step comprehensive blood-use evaluation protocol: step 1 collects data from blood requests, and step 2, from medical charts. At a minimum, 1 000 analyzed requests are necessary; as such, study periods vary depending on the number of transfusion requests issued. An Internet-based application, the Modular Research System-Study Management System (MRS-SMS, houses the data and produces reports on how hospitals request blood, how blood is issued, who requires blood and blood components, and as an added benefit, how many blood units are wasted and what the real demand for blood is.

  18. Chapter 18: Variable Frequency Drive Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Energy Technology Data Exchange (ETDEWEB)

    Romberger, Jeff [SBW Consulting, Inc., Bellevue, WA (United States)

    2017-06-21

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol.

  19. Modelling tourists arrival using time varying parameter

    Science.gov (United States)

    Suciptawati, P.; Sukarsa, K. G.; Kencana, Eka N.

    2017-06-01

    The importance of tourism and its related sectors to support economic development and poverty reduction in many countries increase researchers’ attentions to study and model tourists’ arrival. This work is aimed to demonstrate time varying parameter (TVP) technique to model the arrival of Korean’s tourists to Bali. The number of Korean tourists whom visiting Bali for period January 2010 to December 2015 were used to model the number of Korean’s tourists to Bali (KOR) as dependent variable. The predictors are the exchange rate of Won to IDR (WON), the inflation rate in Korea (INFKR), and the inflation rate in Indonesia (INFID). Observing tourists visit to Bali tend to fluctuate by their nationality, then the model was built by applying TVP and its parameters were approximated using Kalman Filter algorithm. The results showed all of predictor variables (WON, INFKR, INFID) significantly affect KOR. For in-sample and out-of-sample forecast with ARIMA’s forecasted values for the predictors, TVP model gave mean absolute percentage error (MAPE) as much as 11.24 percent and 12.86 percent, respectively.

  20. Microsatellites in varied arenas of research

    Directory of Open Access Journals (Sweden)

    K S Remya

    2010-01-01

    Full Text Available Microsatellites known as simple-sequence repeats (SSRs or short-tandem repeats (STRs, represent specific sequences of DNA consisting of tandemly repeated units of one to six nucleotides. The repetitive nature of microsatellites makes them particularly prone to grow or shrink in length and these changes can have both good and bad consequences for the organisms that possess them. They are responsible for various neurological diseases and hence the same cause is now utilized for the early detection of various diseases, such as, Schizophrenia and Bipolar Disorder, Congenital generalized Hypertrichosis, Asthma, and Bronchial Hyperresponsiveness. These agents are widely used for forensic identification and relatedness testing, and are predominant genetic markers in this area of application. The application of microsatellites is an extending web and covers the varied scenarios of science, such as, conservation biology, plant genetics, and population studies. At present, researches are progressing round the globe to extend the use of these genetic repeaters to unmask the hidden genetic secrets behind the creation of the world.

  1. Varying coefficients model with measurement error.

    Science.gov (United States)

    Li, Liang; Greene, Tom

    2008-06-01

    We propose a semiparametric partially varying coefficient model to study the relationship between serum creatinine concentration and the glomerular filtration rate (GFR) among kidney donors and patients with chronic kidney disease. A regression model is used to relate serum creatinine to GFR and demographic factors in which coefficient of GFR is expressed as a function of age to allow its effect to be age dependent. GFR measurements obtained from the clearance of a radioactively labeled isotope are assumed to be a surrogate for the true GFR, with the relationship between measured and true GFR expressed using an additive error model. We use locally corrected score equations to estimate parameters and coefficient functions, and propose an expected generalized cross-validation (EGCV) method to select the kernel bandwidth. The performance of the proposed methods, which avoid distributional assumptions on the true GFR and residuals, is investigated by simulation. Accounting for measurement error using the proposed model reduced apparent inconsistencies in the relationship between serum creatinine and GFR among different clinical data sets derived from kidney donor and chronic kidney disease source populations.

  2. Stratospheric Impact of Varying Sea Surface Temperatures

    Science.gov (United States)

    Newman, Paul A.; Nash, Eric R.; Nielsen, Jon E.; Waugh, Darryn; Pawson, Steven

    2004-01-01

    The Finite-Volume General Circulation Model (FVGCM) has been run in 50 year simulations with the: 1) 1949-1999 Hadley Centre sea surface temperatures (SST), and 2) a fixed annual cycle of SSTs. In this presentation we first show that the 1949-1999 FVGCM simulation produces a very credible stratosphere in comparison to an NCEP/NCAR reanalysis climatology. In particular, the northern hemisphere has numerous major and minor stratospheric warming, while the southern hemisphere has only a few over the 50-year simulation. During the northern hemisphere winter, temperatures are both warmer in the lower stratosphere and the polar vortex is weaker than is found in the mid-winter southern hemisphere. Mean temperature differences in the lower stratosphere are shown to be small (less than 2 K), and planetary wave forcing is found to be very consistent with the climatology. We then will show the differences between our varying SST simulation and the fixed SST simulation in both the dynamics and in two parameterized trace gases (ozone and methane). In general, differences are found to be small, with subtle changes in planetary wave forcing that lead to reduced temperatures in the SH and increased temperatures in the NH.

  3. TIME-VARYING DYNAMICAL STAR FORMATION RATE

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Eve J.; Chang, Philip; Murray, Norman, E-mail: evelee@berkeley.edu [Canadian Institute for Theoretical Astrophysics, 60 St. George Street, University of Toronto, Toronto, ON M5S 3H8 (Canada)

    2015-02-10

    We present numerical evidence of dynamic star formation in which the accreted stellar mass grows superlinearly with time, roughly as t {sup 2}. We perform simulations of star formation in self-gravitating hydrodynamic and magnetohydrodynamic turbulence that is continuously driven. By turning the self-gravity of the gas in the simulations on or off, we demonstrate that self-gravity is the dominant physical effect setting the mass accretion rate at early times before feedback effects take over, contrary to theories of turbulence-regulated star formation. We find that gravitational collapse steepens the density profile around stars, generating the power-law tail on what is otherwise a lognormal density probability distribution function. Furthermore, we find turbulent velocity profiles to flatten inside collapsing regions, altering the size-line width relation. This local flattening reflects enhancements of turbulent velocity on small scales, as verified by changes to the velocity power spectra. Our results indicate that gas self-gravity dynamically alters both density and velocity structures in clouds, giving rise to a time-varying star formation rate. We find that a substantial fraction of the gas that forms stars arrives via low-density flows, as opposed to accreting through high-density filaments.

  4. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Che

    2015-11-01

    Full Text Available Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN. However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  5. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  6. Identification of a research protocol to study orthodontic tooth movement

    Directory of Open Access Journals (Sweden)

    Annalisa Dichicco

    2014-06-01

    Full Text Available Aim: The orthodontic movement is associated with a process of tissue remodeling together with the release of several chemical mediators in periodontal tissues. Each mediator is a potential marker of tooth movement and expresses biological processes as: tissue inflammation and bone remodeling. Different amounts of every mediator are present in several tissues and fluids of the oral cavity. Therefore, there are different methods that allow sampling with several degrees of invasiveness. Chemical mediators are also substances of different molecular nature, and multiple kind of analysis methods allow detection. The purpose of this study was to draft the best research protocol for an optimal study on orthodontic movement efficiency. Methods: An analysis of the international literature have been made, to identify the gold standard of each aspect of the protocol: type of mediator, source and method of sampling and analysis method. Results: From the analysis of the international literature was created an original research protocol for the study and the assessment of the orthodontic movement, by using the biomarkers of the tooth movement. Conclusions: The protocol created is based on the choice of the gold standard of every aspect already analyzed in the literature and in existing protocols for the monitoring of orthodontic tooth movement through the markers of tooth movement. Clinical trials re required for the evaluation and validation of the protocol created.

  7. Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol

    International Nuclear Information System (INIS)

    Chen, I-C; Hwang Tzonelih; Li C-M

    2008-01-01

    On the basis of the modified four-coherent-state post-selection quantum key distribution protocol (Namiki and Hirano 2006 Preprint quant-ph/0608144v1), two 1-out-of-2 quantum oblivious transfer (QOT 2 1 ) protocols are proposed. The first proposed protocol (called the receiver-based QOT 2 1 protocol) requires the coherent states to be prepared by the receiver, whereas the second protocol (called the sender-based QOT 2 1 protocol) allows the coherent states to be generated by the sender. The main advantages of the proposed protocols are that (i) no quantum bit commitment schemes and the assumption of quantum memory are needed; (ii) less communication cost between participants is required, i.e. the receiver-based QOT 2 1 protocol requires only one quantum communication and one classical communication and the sender-based QOT 2 1 protocol requires only one quantum communication between participants during protocol execution; and (iii) the utilization of quantum states is very efficient, wherein the receiver-based and the sender-based QOT 2 1 protocols use only two coherent pulses and one coherent pulse respectively for sending the sender's two messages

  8. Varying hemin concentrations affect Porphyromonas gingivalis strains differently.

    Science.gov (United States)

    Ohya, Manabu; Cueno, Marni E; Tamura, Muneaki; Ochiai, Kuniyasu

    2016-05-01

    Porphyromonas gingivalis requires heme to grow, however, heme availability and concentration in the periodontal pockets vary. Fluctuations in heme concentration may affect each P. gingivalis strain differently, however, this was never fully demonstrated. Here, we elucidated the effects of varying hemin concentrations in representative P. gingivalis strains. Throughout this study, representative P. gingivalis strains [FDC381 (type I), MPWIb-01 (type Ib), TDC60 (type II), ATCC49417 (type III), W83 (type IV), and HNA99 (type V)] were used and grown for 24 h in growth media under varying hemin concentrations (5 × , 1 × , 0.5 × , 0.1 × ). Samples were lysed and protein standardized. Arg-gingipain (Rgp), H2O2, and superoxide dismutase (SOD) levels were subsequently measured. We focused our study on 24 h-grown strains which excluded MPWIb-01 and HNA99. Rgp activity among the 4 remaining strains varied with Rgp peaking at: 1 × for FDC381, 5 × for TDC60, 0.5 × for ATCC49417, 5 × and 0.5 × for W83. With regards to H2O2 and SOD amounts: FDC381 had similar H2O2 amounts in all hemin concentrations while SOD levels varied; TDC60 had the lowest H2O2 amount at 1 × while SOD levels became higher in relation to hemin concentration; ATCC49417 also had similar H2O2 amounts in all hemin concentrations while SOD levels were higher at 1 × and 0.5 × ; and W83 had statistically similar H2O2 and SOD amounts regardless of hemin concentration. Our results show that variations in hemin concentration affect each P. gingivalis strain differently. Published by Elsevier Ltd.

  9. Acceptance of spent fuel of varying characteristics

    International Nuclear Information System (INIS)

    Short, S.M.

    1990-03-01

    This paper is a preliminary overview of a study with the primary objective of establishing a set of acceptance selection criteria and corresponding spent fuel characteristics to be incorporated as a component of requirements for the Federal Waste Management System (FWMS). A number of alternative acceptance allocations and selection rules were analyzed to determine the operational sensitivity of each element of the FWMS to the resultant spent fuel characteristics. Preliminary recommendations of the study include three different sets of selection rules to be included in the FWMS design basis. 2 refs., 4 figs., 4 tabs

  10. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  11. Elder Abuse Identification in the Prehospital Setting: An Examination of State Emergency Medical Services Protocols.

    Science.gov (United States)

    Namboodri, Brooke L; Rosen, Tony; Dayaa, Joseph A; Bischof, Jason J; Ramadan, Nadeem; Patel, Mehul D; Grover, Joseph; Brice, Jane H; Platts-Mills, Timothy F

    2018-03-22

    To describe statewide emergency medical service (EMS) protocols relating to identification, management, and reporting of elder abuse in the prehospital setting. Cross-sectional analysis. Statewide EMS protocols in the United States. Publicly available statewide EMS protocols identified from published literature, http://EMSprotocols.org, and each state's public health website. Protocols were reviewed to determine whether elder abuse was mentioned, elder abuse was defined, potential indicators of elder abuse were listed, management of older adults experiencing abuse was described, and instructions regarding reporting were provided. EMS protocols for child abuse were reviewed in the same manner for the purpose of comparison. Of the 35 publicly available statewide EMS protocols, only 14 (40.0%) mention elder abuse. Of protocols that mention elder abuse, 6 (42.9%) define elder abuse, 10 (71.4%) describe indicators of elder abuse, 8 (57.1%) provide instruction regarding management, and 12 (85.7%) provide instruction regarding reporting. Almost twice as many states met each of these metrics for child abuse. Statewide EMS protocols for elder abuse vary in regard to identification, management, and reporting, with the majority of states having no content on this subject. Expansion and standardization of protocols may increase the identification of elder abuse. © 2018, Copyright the Authors Journal compilation © 2018, The American Geriatrics Society.

  12. A protocol for a systematic review for perioperative pregabalin use

    Directory of Open Access Journals (Sweden)

    Eipe Naveen

    2012-09-01

    Full Text Available Abstract Background Perioperative pain management has recently been revolutionized with the recognition of novel mechanisms and introduction of newer drugs. Many randomized trials have studied the use of the gabapentinoid anti-epileptic, pregabalin, in acute pain. Published systematic reviews suggest that using pregabalin for perioperative pain management may decrease analgesic requirements and pain scores, at the expense of troublesome side effects. A major limitation of the extant reviews is the lack of rigorous investigation of clinical characteristics that would maximize the benefit harms ratio in favor of surgical patients. We posit that effects of pregabalin for perioperative pain management vary by the type of surgical pain model and propose this systematic review protocol to update previous systematic reviews and investigate the heterogeneity in findings across subgroups of surgical pain models. Methods/Design Using a peer-reviewed search strategy, we will search key databases for clinical trials on perioperative pregabalin use in adults. The electronic searches will be supplemented by scanning the reference lists of included studies. No limits of language, country or year will be imposed. Outcomes will include pain; use of co-analgesia, particularly opioids; enhanced recovery; and drug-related harms. We will focus on the identification of surgical models and patient characteristics that have shown benefit and adverse effects from pregabalin. Two clinical experts will independently screen the studies for inclusion using eligibility criteria established a priori. Data extracted by the reviewers will then be verified. Publication bias will be assessed, as will risk of bias using the Cochrane Risk of Bias tool. Meta-analysis and meta-regression are planned if the studies are deemed statistically, methodologically and clinically homogenous. Evidence will be graded for its strength for a select number of outcomes. Discussion We will explore

  13. Energy Aware GPSR Routing Protocol in a Wireless Sensor Network ...

    African Journals Online (AJOL)

    Energy is the scarce resource in wireless sensor networks (WSNs), and it determines the lifetime of WSNs. For this reason, WSN algorithms and routing protocols should be selected in a manner which fulfills these energy requirements. This paper presents a solution to increase the lifetime of WSNs by decreasing their ...

  14. A quick DNA extraction protocol: Without liquid nitrogen in ambient ...

    African Journals Online (AJOL)

    Marker assisted selection is an effective technique for quality traits selection in breeding program which are impossible by visual observation. Marker assisted selection in early generation requires rapid DNA extraction protocol for large number of samples in a low cost approach. A rapid and inexpensive DNA extraction ...

  15. A communication protocol for interactively controlling software tools

    NARCIS (Netherlands)

    Wulp, van der J.

    2008-01-01

    We present a protocol for interactively using software tools in a loosely coupled tool environment. Such an environment can assist the user in doing tasks that require the use of multiple tools. For example, it can invoke tools on certain input, set processing parameters, await task completion and

  16. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  17. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  18. Automated Planning Enables Complex Protocols on Liquid-Handling Robots.

    Science.gov (United States)

    Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg

    2018-03-16

    Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.

  19. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  20. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  1. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  2. Electrothermally Actuated Microbeams With Varying Stiffness

    KAUST Repository

    Tella, Sherif Adekunle

    2017-11-03

    We present axially loaded clamped-guided microbeams that can be used as resonators and actuators of variable stiffness, actuation, and anchor conditions. The applied axial load is implemented by U-shaped electrothermal actuators stacked at one of the beams edges. These can be configured and wired in various ways, which serve as mechanical stiffness elements that control the operating resonance frequency of the structures and their static displacement. The experimental results have shown considerable increase in the resonance frequency and mid-point deflection of the microbeam upon changing the end conditions of the beam. These results can be promising for applications requiring large deflection and high frequency tunability, such as filters, memory devices, and switches. The experimental results are compared to multi-physics finite-element simulations showing good agreement among them.

  3. Panorama 2011: Refining: varying conditions by region

    International Nuclear Information System (INIS)

    Silva, C.

    2011-01-01

    The economic crisis has further weakened a sector that was already facing difficulties, if we look beyond the flush period (2005-2008) when, buoyed by strong demand, margins remained high and refiners could generate profits while maintaining a healthy level of activity. Falling demand and increased over-capacity in some regions - the immediate consequences of the deteriorating economic conditions over the past two years - have led to declining margins and to financial accounts being in the red. The adoption of increasingly stringent emissions standards and product specifications, burdensome regulatory requirements for refineries (for combating local pollution and reducing greenhouse gas emissions), stiffer competition from new fuels: all of these structural factors are weakening the sector, especially in industrialized nations with their more rigorous regulatory compliance. In this generally gloomy climate, numerous new projects are still being envisaged - although many have recently been postponed and tend to be concentrated in developing countries. (author)

  4. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  5. Optimization and Verification of the TR-MAC Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    Morshed, S.; Heijenk, Geert

    2015-01-01

    Energy-efficiency is an important requirement in the design of communication protocols for wireless sensor networks (WSN). TR-MAC is an energy-efficient medium access control (MAC) layer protocol for low power WSN that exploits transmitted-reference (TR) modulation in the physical layer. The

  6. Investigating a reduced size real-time transport protocol for low-bandwidth networks

    CSIR Research Space (South Africa)

    Kakande, JN

    2011-09-01

    Full Text Available in this work as RTP-Lite, requires investigation. A cyclical approach to compression of the RTP headers was used with different compression cycle patterns for Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) transport. Measurements over...

  7. [Effect of a multidisciplinar protocol on the clinical results obtained after bariatric surgery].

    Science.gov (United States)

    Cánovas Gaillemin, B; Sastre Martos, J; Moreno Segura, G; Llamazares Iglesias, O; Familiar Casado, C; Abad de Castro, S; López Pardo, R; Sánchez-Cabezudo Muñoz, M A

    2011-01-01

    Bariatric surgery has been shown to be an effective therapy for weight loss in patients with severe obesity, and the implementation of a multidisciplinar management protocol is recommended. To assess the usefulness of the implementation of a management protocol in obesity surgery based on the Spanish Consensus Document of the SEEDO. Retrospective comparative study of the outcomes in patients previously operated (51 patients) and after the implementation of the protocol (66 patients). The following data were gathered: anthropometry, pre-and post-surgery comorbidities, post-surgical nutritional and surgical complications, validated Quality of Life questionnaire, and dietary habits. Withdrawals (l7.6%) and alcoholism (5.8%) were higher in patients pre- versus post-implementation of the protocol (4.5% vs. 3%, respectively), the differences being statistically significant. The mortality rate was 2% in the pre-protocol group and 0% in the postprotocol group. The dietary habits were better in the post-protocol group, the pre-protocol group presenting a higher percentage of feeding-behavior disorders (5.1%) although not reaching a statistical significance. The improvement in quality of life was higher in the post-protocol group for all items, but only reaching statistical significance in sexual activity (p = 0.004). In the pre-protocol group, 70.5% of the patients had more than one nutritional complication vs. 32.8% in the post-protocol group (p 50% in 81.3% in the pre-protocol group vs. 74.8% in the pos-protocol group) or the comorbidities. Bariatric surgery achieves excellent outcomes in weight loss, comorbidities, and quality of life, but presents nutritional, surgical, and psychiatric complications that require a protocol-based and multidisciplinary approach. Our protocol improves the outcomes regarding the withdrawal rates, feeding-behavior disorders, dietary habits, nutritional complications, and quality of life.

  8. The optimal number of surveys when detectability varies.

    Directory of Open Access Journals (Sweden)

    Alana L Moore

    Full Text Available The survey of plant and animal populations is central to undertaking field ecology. However, detection is imperfect, so the absence of a species cannot be determined with certainty. Methods developed to account for imperfect detectability during surveys do not yet account for stochastic variation in detectability over time or space. When each survey entails a fixed cost that is not spent searching (e.g., time required to travel to the site, stochastic detection rates result in a trade-off between the number of surveys and the length of each survey when surveying a single site. We present a model that addresses this trade-off and use it to determine the number of surveys that: 1 maximizes the expected probability of detection over the entire survey period; and 2 is most likely to achieve a minimally-acceptable probability of detection. We illustrate the applicability of our approach using three practical examples (minimum survey effort protocols, number of frog surveys per season, and number of quadrats per site to detect a plant species and test our model's predictions using data from experimental plant surveys. We find that when maximizing the expected probability of detection, the optimal survey design is most sensitive to the coefficient of variation in the rate of detection and the ratio of the search budget to the travel cost. When maximizing the likelihood of achieving a particular probability of detection, the optimal survey design is most sensitive to the required probability of detection, the expected number of detections if the budget were spent only on searching, and the expected number of detections that are missed due to travel costs. We find that accounting for stochasticity in detection rates is likely to be particularly important for designing surveys when detection rates are low. Our model provides a framework to do this.

  9. Tolerable Time-Varying Overflow on Grass-Covered Slopes

    Directory of Open Access Journals (Sweden)

    Steven A. Hughes

    2015-03-01

    Full Text Available Engineers require estimates of tolerable overtopping limits for grass-covered levees, dikes, and embankments that might experience steady overflow. Realistic tolerance estimates can be used for both resilient design and risk assessment. A simple framework is developed for estimating tolerable overtopping on grass-covered slopes caused by slowly-varying (in time overtopping discharge (e.g., events like storm surges or river flood waves. The framework adapts the well-known Hewlett curves of tolerable limiting velocity as a function of overflow duration. It has been hypothesized that the form of the Hewlett curves suggests that the grass erosion process is governed by the flow work on the slope above a critical threshold velocity (referred to as excess work, and the tolerable erosional limit is reached when the cumulative excess work exceeds a given value determined from the time-dependent Hewlett curves. The cumulative excess work is expressed in terms of overflow discharge above a critical discharge that slowly varies in time, similar to a discharge hydrograph. The methodology is easily applied using forecast storm surge hydrographs at specific locations where wave action is minimal. For preliminary planning purposes, when storm surge hydrographs are unavailable, hypothetical equations for the water level and overflow discharge hydrographs are proposed in terms of the values at maximum overflow and the total duration of overflow. An example application is given to illustrate use of the methodology.

  10. Selection application for platforms and security protocols suitable for wireless sensor networks

    International Nuclear Information System (INIS)

    Moeller, S; Newe, T; Lochmann, S

    2009-01-01

    There is a great number of platforms and security protocols which can be used for wireless sensor networks (WSN). All these platforms and protocols have different properties with certain advantages and disadvantages. For a good choice of platform and an associated protocol, these advantages and disadvantages should be compared and the best for the appropriate WSN chosen. To select a Security protocol and a wireless platform suitable for a specific application a software tool will be developed. That tool will enable wireless network deployment engineers to easily select a suitable wireless platform for their application based on their network needs and application security requirements.

  11. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA)

    DEFF Research Database (Denmark)

    Muharemovic, O; Troelsen, A; Thomsen, M G

    2018-01-01

    INTRODUCTION: Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time...... imaging. Radiographers in the control group used a standard RSA protocol. RESULTS: At three months, radiographers in the case group significantly reduced (p .... No significant improvements were found in the control group at any time point. CONCLUSION: There is strong evidence that personalized RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute...

  12. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    Science.gov (United States)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  13. Secure and Efficient Protocol for Vehicular Ad Hoc Network with Privacy Preservation

    Directory of Open Access Journals (Sweden)

    Choi Hyoung-Kee

    2011-01-01

    Full Text Available Security is a fundamental issue for promising applications in a VANET. Designing a secure protocol for a VANET that accommodates efficiency, privacy, and traceability is difficult because of the contradictions between these qualities. In this paper, we present a secure yet efficient protocol for a VANET that satisfies these security requirements. Although much research has attempted to address similar issues, we contend that our proposed protocol outperforms other proposals that have been advanced. This claim is based on observations that show that the proposed protocol has such strengths as light computational load, efficient storage management, and dependability.

  14. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  15. A Study on IP Network Recovery through Routing Protocols

    Directory of Open Access Journals (Sweden)

    K. Karthik

    2016-09-01

    Full Text Available Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.

  16. Spall behavior of cast iron with varying microstructures

    International Nuclear Information System (INIS)

    Plume, Gifford; Rousseau, Carl-Ernst

    2014-01-01

    The spall strength of cast iron with varying microstructures has been investigated using plate impact at moderate speed. Stress history measurements were made with manganin stress gauges embedded between the back face of the specimen and a low impedance polycarbonate backing. Five separate cast irons were tested. Four of these consisted of gray cast iron with graphite in flake form, with three classified as Type VII A2 and the fourth containing a bimodal distribution of Types VII A4 and VII D8. The fifth casting consisted of ductile cast iron with graphite in nodular form, classified as Type I, size class 5. The spall strength for the Type VII A2 gray cast irons varied between 40 and 370 MPa, and that of the additional gray cast iron, between 410 and 490 MPa. The spall strength of the ductile cast iron fell within the range of 0.94–1.2 GPa. It is shown that the spall strength is linked to the damage level at the spall plane, where an increased level of tensile stress is required to generate higher levels of damage. Post mortem analysis was performed on the recovered samples, revealing the graphite phase to be the primary factor governing the spall fracture of cast irons, where crack nucleation is directly correlated to the debonding of graphite from the metal matrix. The average length of graphite found within a casting is linked to the material's strength, where strength increases as a function of decreasing length. The morphology and mean free path of graphite precipitates further govern the subsequent coalescence of initiated cracks to form a complete fracture plane. In cases where graphite spacing is large, increased energy level is required to complete the fracture process. A secondary factor governing the spall fracture of cast irons has also been linked to the microstructure of the metal matrix, with pearlite yielding higher spall strengths than free ferrite.

  17. Spall behavior of cast iron with varying microstructures

    Energy Technology Data Exchange (ETDEWEB)

    Plume, Gifford; Rousseau, Carl-Ernst, E-mail: rousseau@uri.edu [Mechanical Engineering, University of Rhode Island, 92 Upper College Rd., Kingston, Rhode Island 02881 (United States)

    2014-07-21

    The spall strength of cast iron with varying microstructures has been investigated using plate impact at moderate speed. Stress history measurements were made with manganin stress gauges embedded between the back face of the specimen and a low impedance polycarbonate backing. Five separate cast irons were tested. Four of these consisted of gray cast iron with graphite in flake form, with three classified as Type VII A2 and the fourth containing a bimodal distribution of Types VII A4 and VII D8. The fifth casting consisted of ductile cast iron with graphite in nodular form, classified as Type I, size class 5. The spall strength for the Type VII A2 gray cast irons varied between 40 and 370 MPa, and that of the additional gray cast iron, between 410 and 490 MPa. The spall strength of the ductile cast iron fell within the range of 0.94–1.2 GPa. It is shown that the spall strength is linked to the damage level at the spall plane, where an increased level of tensile stress is required to generate higher levels of damage. Post mortem analysis was performed on the recovered samples, revealing the graphite phase to be the primary factor governing the spall fracture of cast irons, where crack nucleation is directly correlated to the debonding of graphite from the metal matrix. The average length of graphite found within a casting is linked to the material's strength, where strength increases as a function of decreasing length. The morphology and mean free path of graphite precipitates further govern the subsequent coalescence of initiated cracks to form a complete fracture plane. In cases where graphite spacing is large, increased energy level is required to complete the fracture process. A secondary factor governing the spall fracture of cast irons has also been linked to the microstructure of the metal matrix, with pearlite yielding higher spall strengths than free ferrite.

  18. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  19. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  20. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  1. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  2. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  3. High Entropy Random Selection Protocols

    NARCIS (Netherlands)

    H. Buhrman (Harry); M. Christandl (Matthias); M. Koucky (Michal); Z. Lotker (Zvi); B. Patt-Shamir; M. Charikar; K. Jansen; O. Reingold; J. Rolim

    2007-01-01

    textabstractIn this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome.

  4. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  5. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  6. Report of the Federal Internetworking Requirements Panel

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-05-31

    The Federal Internetworking Requirements Panel (FIRP) was established by the National Institute of Standards and Technology (NIST) to reassess Federal requirements for open systems networks and to recommend policy on the Government`s use of networking standards. The Panel was chartered to recommend actions which the Federal Government can take to address the short and long-term issues of interworking and convergence of networking protocols--particularly the Internet Protocol Suite (IPS) and Open Systems Interconnection (OSI) protocol suite and, when appropriate, proprietary protocols. The Panel was created at the request of the Office of Management and Budget in collaboration with the Federal Networking Council and the Federal Information Resources Management Policy Council. The Panel`s membership and charter are contained in an appendix to this report.

  7. Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol

    DEFF Research Database (Denmark)

    Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele

    2017-01-01

    We introduce the notion of privacy-preserving verifiability for security protocols. It holds when a protocol admits a verifiability test that does not reveal, to the verifier that runs it, more pieces of information about the protocol’s execution than those required to run the test. Our definition...... of privacy-preserving verifiability is general and applies to cryptographic protocols as well as to human security protocols. In this paper we exemplify it in the domain of e-exams. We prove that the notion is meaningful by studying an existing exam protocol that is verifiable but whose verifiability tests...... are not privacy-preserving. We prove that the notion is applicable: we review the protocol using functional encryption so that it admits a verifiability test that preserves privacy according to our definition. We analyse, in ProVerif, that the verifiability holds despite malicious parties and that the new...

  8. A Hierarchical Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Prabhudutta Mohanty

    2014-12-01

    Full Text Available The two important requirements for many Wireless Senor Networks (WSNs are prolonged network lifetime and end-to-end reliability. The sensor nodes consume more energy during data transmission than the data sensing. In WSN, the redundant data increase the energy consumption, latency and reduce reliability during data transmission. Therefore, it is important to support energy efficient reliable data transport in WSNs. In this paper, we present a Hierarchical Energy Efficient Reliable Transport Protocol (HEERTP for the data transmission within the WSN. This protocol maximises the network lifetime by controlling the redundant data transmission with the co-ordination of Base Station (BS. The proposed protocol also achieves end-to-end reliability using a hop-by-hop acknowledgement scheme. We evaluate the performance of the proposed protocol through simulation. The simulation results reveal that our proposed protocol achieves better performance in terms of energy efficiency, latency and reliability than the existing protocols.

  9. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  10. WE-E-304-00: Implementing SBRT Protocols

    International Nuclear Information System (INIS)

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  11. WE-E-304-00: Implementing SBRT Protocols

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  12. Hyperbaric oxygen therapy for wound healing in diabetic rats: Varying efficacy after a clinically-based protocol

    NARCIS (Netherlands)

    J.W. van Neck (Han); B. Tuk (Bastiaan); E.M.G. Fijneman (Esther ); Redeker, J.J. (Jonathan J.); Talahatu, E.M. (Edwin M.); M. Tong (Miao)

    2017-01-01

    textabstractHyperbaric oxygen therapy (HBOT) is a clinical treatment in which a patient breathes pure oxygen for a limited period of time at an increased pressure. Although this therapy has been used for decades to assist wound healing, its efficacy for many conditions is unproven and its mechanism

  13. Portable abdomen radiography. Moving to thickness-based protocols

    International Nuclear Information System (INIS)

    Sanchez, Adrian A.; Reiser, Ingrid; Baxter, Tina; Zhang, Yue; Finkle, Joshua H.; Lu, Zheng Feng; Feinstein, Kate A.

    2018-01-01

    Default pediatric protocols on many digital radiography systems are configured based on patient age. However, age does not adequately characterize patient size, which is the principal determinant of proper imaging technique. Use of default pediatric protocols by inexperienced technologists can result in patient overexposure, inadequate image quality, or repeated examinations. To ensure diagnostic image quality at a well-managed patient radiation exposure by transitioning to thickness-based protocols for pediatric portable abdomen radiography. We aggregated patient thickness data, milliamperes (mAs), kilovoltage peak (kVp), exposure index (EI), source-to-detector distance, and grid use for all portable abdomen radiographs performed in our pediatric hospital in a database with a combination of automated and manual data collection techniques. We then analyzed the database and used it as the basis to construct thickness-based protocols with consistent image quality across varying patient thicknesses, as determined by the EI. Retrospective analysis of pediatric portable exams performed at our adult-focused hospitals demonstrated substantial variability in EI relative to our pediatric hospital. Data collection at our pediatric hospital over 4 months accumulated roughly 800 portable abdomen exams, which we used to develop a thickness-based technique chart. Through automated retrieval of data in our systems' digital radiography exposure logs and recording of patient abdomen thickness, we successfully developed thickness-based techniques for portable abdomen radiography. (orig.)

  14. A proposed protocol for remote control of automated assessment devices

    International Nuclear Information System (INIS)

    Kissock, P.S.; Pritchard, D.A.

    1996-01-01

    Systems and devices that are controlled remotely are becoming more common in security systems in the US Air Force and other government agencies to provide protection of valuable assets. These systems reduce the number of needed personnel while still providing a high level of protection. However, each remotely controlled device usually has its own communication protocol. This limits the ability to change devices without changing the system that provides the communications control to the device. Sandia is pursuing a standard protocol that can be used to communicate with the different devices currently in use, or may be used in the future, in the US Air Force and other government agencies throughout the security community. Devices to be controlled include intelligent pan/tilt mounts, day/night video cameras, thermal imaging cameras, and remote data processors. Important features of this protocol include the ability to send messages of varying length, identify the sender, and more importantly, control remote data processors. This paper describes the proposed public domain protocol, features, and examples of use. The authors hope to elicit comments from security technology developers regarding format and use of remotely controlled automated assessment devices

  15. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  16. Portable abdomen radiography. Moving to thickness-based protocols

    Energy Technology Data Exchange (ETDEWEB)

    Sanchez, Adrian A.; Reiser, Ingrid; Baxter, Tina; Zhang, Yue; Finkle, Joshua H.; Lu, Zheng Feng; Feinstein, Kate A. [University of Chicago Medical Center, Department of Radiology, Chicago, IL (United States)

    2018-02-15

    Default pediatric protocols on many digital radiography systems are configured based on patient age. However, age does not adequately characterize patient size, which is the principal determinant of proper imaging technique. Use of default pediatric protocols by inexperienced technologists can result in patient overexposure, inadequate image quality, or repeated examinations. To ensure diagnostic image quality at a well-managed patient radiation exposure by transitioning to thickness-based protocols for pediatric portable abdomen radiography. We aggregated patient thickness data, milliamperes (mAs), kilovoltage peak (kVp), exposure index (EI), source-to-detector distance, and grid use for all portable abdomen radiographs performed in our pediatric hospital in a database with a combination of automated and manual data collection techniques. We then analyzed the database and used it as the basis to construct thickness-based protocols with consistent image quality across varying patient thicknesses, as determined by the EI. Retrospective analysis of pediatric portable exams performed at our adult-focused hospitals demonstrated substantial variability in EI relative to our pediatric hospital. Data collection at our pediatric hospital over 4 months accumulated roughly 800 portable abdomen exams, which we used to develop a thickness-based technique chart. Through automated retrieval of data in our systems' digital radiography exposure logs and recording of patient abdomen thickness, we successfully developed thickness-based techniques for portable abdomen radiography. (orig.)

  17. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  18. National protocol framework for the inventory and monitoring of bees

    Science.gov (United States)

    Droege, Sam; Engler, Joseph D.; Sellers, Elizabeth A.; Lee O'Brien,

    2016-01-01

    This national protocol framework is a standardized tool for the inventory and monitoring of the approximately 4,200 species of native and non-native bee species that may be found within the National Wildlife Refuge System (NWRS) administered by the U.S. Fish and Wildlife Service (USFWS). However, this protocol framework may also be used by other organizations and individuals to monitor bees in any given habitat or location. Our goal is to provide USFWS stations within the NWRS (NWRS stations are land units managed by the USFWS such as national wildlife refuges, national fish hatcheries, wetland management districts, conservation areas, leased lands, etc.) with techniques for developing an initial baseline inventory of what bee species are present on their lands and to provide an inexpensive, simple technique for monitoring bees continuously and for monitoring and evaluating long-term population trends and management impacts. The latter long-term monitoring technique requires a minimal time burden for the individual station, yet can provide a good statistical sample of changing populations that can be investigated at the station, regional, and national levels within the USFWS’ jurisdiction, and compared to other sites within the United States and Canada. This protocol framework was developed in cooperation with the United States Geological Survey (USGS), the USFWS, and a worldwide network of bee researchers who have investigated the techniques and methods for capturing bees and tracking population changes. The protocol framework evolved from field and lab-based investigations at the USGS Bee Inventory and Monitoring Laboratory at the Patuxent Wildlife Research Center in Beltsville, Maryland starting in 2002 and was refined by a large number of USFWS, academic, and state groups. It includes a Protocol Introduction and a set of 8 Standard Operating Procedures or SOPs and adheres to national standards of protocol content and organization. The Protocol Narrative

  19. The Nagoya Protocol – Justice in the Making?- Comment

    Directory of Open Access Journals (Sweden)

    Doris Schroeder

    2013-09-01

    Full Text Available Ratification of the Nagoya Protocol seems to be a long drawn out process for many parties to the Convention on Biological Diversity, delaying the Protocol's entering into force. This short paper suggests that four innovative elements of the Protocol may require time-consuming consideration prior to implementation: the Global Multilateral Benefit-Sharing Mechanism and the encouragement of Transboundary Co-operation; the reference to human pathogens, the reference to food security and affordable access to treatments and finally the demand to accommodate customary laws of indigenous peoples. At the same time, these four elements are essential to achieving global justice in access and benefit sharing regulations and therefore highly welcome.

  20. An Evaluation of Protocols for UAV Science Applications

    Science.gov (United States)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  1. Assistance protocol for venous ulcers patients: validation of contents

    Directory of Open Access Journals (Sweden)

    Daniele Vieira Dantas

    2013-07-01

    Full Text Available Venous ulcers require complex treatment and are responsible for significant morbidity and mortality rates. This study aims at identifying aspects validated by the jury for the preparation of an assistance protocol for venous ulcer sufferers. It is a descriptive and quantitative research, with 39 professionals (30 nurses, 7 doctors and two physiotherapists, held at the Onofre Lopes University Hospital, between April and July/2010. Data collection began through a questionnaire checklist. Analysis was performed through Statistical Package for Social Science 15.0, assessing compliance with guidelines. Results were the compositional aspects of the protocol: assessment of patient and lesion history/documentation, wound care/perilesional skin, dressing suggestion, use of antibiotics and pain treatment, surgical treatment/medication, improving venous return and relapse prevention, patient referral, professional training and referral/counter-referral. It was concluded that to compose the protocol, aspects related to diagnosis, treatment and injury prevention must be considered.

  2. Validation of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-12-01

    The communication network designed to transmit control and processing signals in digital Instrument and Control (I and C) systems in Nuclear Power Plant (NPP), should provide a high level of safety and reliability. There are different features between the communication networks of NPPs and other commercial communication networks. Safety and reliability are the most important factors in the communication networks of an NPP rather than efficiency which are important factors of a commercial communication network design. To develop Data Communication Protocol for Nuclear Power Plant, We analyze the design criteria and performance requirements of existing commercial communication protocols based on Information Technology(IT). And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol(Nuclear power plant Safety Communication Protocol : NSCP) for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications. NSCP is the communication protocol designed for a safety-grade control network in the nuclear power plant. In this report, we had specified NSCP protocol by FDT(Formal Description Technique) and established validation procedures based on the validation methodology. It was confirmed specification error, major function's validity and reachability of NSCP by performing simulation and the validation process using Telelogic Tau tool

  3. Software requirements

    CERN Document Server

    Wiegers, Karl E

    2003-01-01

    Without formal, verifiable software requirements-and an effective system for managing them-the programs that developers think they've agreed to build often will not be the same products their customers are expecting. In SOFTWARE REQUIREMENTS, Second Edition, requirements engineering authority Karl Wiegers amplifies the best practices presented in his original award-winning text?now a mainstay for anyone participating in the software development process. In this book, you'll discover effective techniques for managing the requirements engineering process all the way through the development cy

  4. Identification of time-varying nonlinear systems using differential evolution algorithm

    DEFF Research Database (Denmark)

    Perisic, Nevena; Green, Peter L; Worden, Keith

    2013-01-01

    (DE) algorithm for the identification of time-varying systems. DE is an evolutionary optimisation method developed to perform direct search in a continuous space without requiring any derivative estimation. DE is modified so that the objective function changes with time to account for the continuing......, thus identification of time-varying systems with nonlinearities can be a very challenging task. In order to avoid conventional least squares and gradient identification methods which require uni-modal and double differentiable objective functions, this work proposes a modified differential evolution...... inclusion of new data within an error metric. This paper presents results of identification of a time-varying SDOF system with Coulomb friction using simulated noise-free and noisy data for the case of time-varying friction coefficient, stiffness and damping. The obtained results are promising and the focus...

  5. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  6. A Performance Study of LEACH and Direct Diffusion Routing Protocols in Wireless Sensor Network

    International Nuclear Information System (INIS)

    Fakher, S.; Sharshar, K.; Moawad, M.I.; Shokair, M.

    2016-01-01

    The Wireless Sensor Network (WSN) is composed of a large number of sensor nodes with limited computation communication, and battery facilities. One of the common applications of this network is environment monitoring through sensing motion, measuring temperature, humidity and radiation. One of the basic activities in WSN is data gathering which represents a great challenge. Many routing protocols are proposed for that network to collect and aggregate the data. The most popular ones are hierarchy and data centric routing protocols. The main goal of this study is to identify the most preferable routing protocol, to be used in each mobility model. This paper studies the performance of LEACH (Low Energy Adaptive Clustering Hierarchy) from hierarchy routing protocol and direct diffusion from data centric routing protocol which is not clarified until now. Moreover, a comparison between LEACH and direct diffusion protocol using NS2 simulator will be made, and an analysis of these protocols will be conducted. The comparison includes packet delivery ratio, throughput, average energy ratio, average delay, network lifetime, and routing overhead. The performance is evaluated by varying the number of sensor nodes under three mobility models Reference Point Group Mobility Model (RPGM), Manhattan and random waypoint mobility model. Simulation results show that LEACH routing protocol has a good performance in RPGM and Manhattan than random waypoint mobility model. Direct diffusion has a good performance in random waypoint mobility model than in RPGM and Manhattan mobility model

  7. Remote Sensing and the Kyoto Protocol: A Workshop Summary

    Science.gov (United States)

    Rosenqvist, Ake; Imhoff, Marc; Milne, Anthony; Dobson, Craig

    2000-01-01

    The Kyoto Protocol to the United Nations Framework Convention on Climate Change contains quantified, legally binding commitments to limit or reduce greenhouse gas emissions to 1990 levels and allows carbon emissions to be balanced by carbon sinks represented by vegetation. The issue of using vegetation cover as an emission offset raises a debate about the adequacy of current remote sensing systems and data archives to both assess carbon stocks/sinks at 1990 levels, and monitor the current and future global status of those stocks. These concerns and the potential ratification of the Protocol among participating countries is stimulating policy debates and underscoring a need for the exchange of information between the international legal community and the remote sensing community. On October 20-22 1999, two working groups of the International Society for Photogrammetry and Remote Sensing (ISPRS) joined with the University of Michigan (Michigan, USA) to convene discussions on how remote sensing technology could contribute to the information requirements raised by implementation of, and compliance with, the Kyoto Protocol. The meeting originated as a joint effort between the Global Monitoring Working Group and the Radar Applications Working Group in Commission VII of the ISPRS, co-sponsored by the University of Michigan. Tile meeting was attended by representatives from national government agencies and international organizations and academic institutions. Some of the key themes addressed were: (1) legal aspects of transnational remote sensing in the context of the Kyoto Protocol; (2) a review of the current and future and remote sensing technologies that could be applied to the Kyoto Protocol; (3) identification of areas where additional research is needed in order to advance and align remote sensing technology with the requirements and expectations of the Protocol; and 94) the bureaucratic and research management approaches needed to align the remote sensing

  8. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  9. A Protocol for Advanced Psychometric Assessment of Surveys

    Science.gov (United States)

    Squires, Janet E.; Hayduk, Leslie; Hutchinson, Alison M.; Cranley, Lisa A.; Gierl, Mark; Cummings, Greta G.; Norton, Peter G.; Estabrooks, Carole A.

    2013-01-01

    Background and Purpose. In this paper, we present a protocol for advanced psychometric assessments of surveys based on the Standards for Educational and Psychological Testing. We use the Alberta Context Tool (ACT) as an exemplar survey to which this protocol can be applied. Methods. Data mapping, acceptability, reliability, and validity are addressed. Acceptability is assessed with missing data frequencies and the time required to complete the survey. Reliability is assessed with internal consistency coefficients and information functions. A unitary approach to validity consisting of accumulating evidence based on instrument content, response processes, internal structure, and relations to other variables is taken. We also address assessing performance of survey data when aggregated to higher levels (e.g., nursing unit). Discussion. In this paper we present a protocol for advanced psychometric assessment of survey data using the Alberta Context Tool (ACT) as an exemplar survey; application of the protocol to the ACT survey is underway. Psychometric assessment of any survey is essential to obtaining reliable and valid research findings. This protocol can be adapted for use with any nursing survey. PMID:23401759

  10. Accessibility in Public Buildings: Efficiency of Checklist Protocols.

    Science.gov (United States)

    Andersson, Jonas E; Skehan, Terry

    2016-01-01

    In Sweden, governmental agencies and bodies are required to implement a higher level of accessibility in their buildings than that stipulated by the National Building and Planning Act (PBL). The Swedish Agency for Participation (MFD, Myndigheten för delaktighet) develops holistic guidelines in order to conceptualize this higher level of accessibility. In conjunction to these guidelines, various checklist protocols have been produced. The present study focuses on the efficiency of such checklist protocols. The study revolved around the use of a checklist protocol in assessments of two buildings in Stockholm: the new head office for the National Authority for Social Insurances (ASI) and the School of Architecture at the Royal Institute of Technology (KTH). The study included three groups: Group 1 and Group 2 consisted of 50 real estate managers employed by the ASI, while Group 3 consisted of three participants in a course at the KTH. The results were similar in all of the groups. The use of the checklist protocol generated queries, which related mainly to two factors: (1) the accompanying factsheet consisted of textual explanations with no drawings, photographs or illustrations and (2) the order of the questions in the checklist protocol was difficult to correlate with the two buildings' spatial logic of accessing, egressing and making use of the built space.

  11. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  12. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  13. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  14. Robust outer synchronization between two nonlinear complex networks with parametric disturbances and mixed time-varying delays

    Science.gov (United States)

    Zhang, Chuan; Wang, Xingyuan; Luo, Chao; Li, Junqiu; Wang, Chunpeng

    2018-03-01

    In this paper, we focus on the robust outer synchronization problem between two nonlinear complex networks with parametric disturbances and mixed time-varying delays. Firstly, a general complex network model is proposed. Besides the nonlinear couplings, the network model in this paper can possess parametric disturbances, internal time-varying delay, discrete time-varying delay and distributed time-varying delay. Then, according to the robust control strategy, linear matrix inequality and Lyapunov stability theory, several outer synchronization protocols are strictly derived. Simple linear matrix controllers are designed to driver the response network synchronize to the drive network. Additionally, our results can be applied on the complex networks without parametric disturbances. Finally, by utilizing the delayed Lorenz chaotic system as the dynamics of all nodes, simulation examples are given to demonstrate the effectiveness of our theoretical results.

  15. On the synchronization of neural networks containing time-varying delays and sector nonlinearity

    International Nuclear Information System (INIS)

    Yan, J.-J.; Lin, J.-S.; Hung, M.-L.; Liao, T.-L.

    2007-01-01

    We present a systematic design procedure for synchronization of neural networks subject to time-varying delays and sector nonlinearity in the control input. Based on the drive-response concept and the Lyapunov stability theorem, a memoryless decentralized control law is proposed which guarantees exponential synchronization even when input nonlinearity is present. The supplementary requirement that the time-derivative of time-varying delays must be smaller than one is released for the proposed control scheme. A four-dimensional Hopfield neural network with time-varying delays is presented as the illustrative example to demonstrate the effectiveness of the proposed synchronization scheme

  16. Zero-Knowledge Protocols and Multiparty Computation

    DEFF Research Database (Denmark)

    Pastro, Valerio

    majority, in which all players but one are controlled by the adversary. In Chapter 5 we present both the preprocessing and the online phase of [DKL+ 13], while in Chapter 2 we describe only the preprocessing phase of [DPSZ12] since the combination of this preprocessing phase with the online phase of [DKL...... on information-theoretic message authentication codes, requires only a linear amount of data from the preprocessing, and improves on the number of field multiplications needed to perform one secure multiplication (linear, instead of quadratic as in earlier work). The preprocessing phase in Chapter 5 comes...... in an actively secure flavour and in a covertly secure one, both of which compare favourably to previous work in terms of efficiency and provable security. Moreover, the covertly secure solution includes a key generation protocol that allows players to obtain a public key and shares of a corresponding secret key...

  17. New dimensions in SNMP Protocol in Romania

    Directory of Open Access Journals (Sweden)

    Alice Nastovici

    2009-06-01

    Full Text Available In this year 2009, after e-finance shock made in each banks who worked with Simple NetworkManagement Protocol (SNMP default community string and vulnerability:- If you do not absolutely require SNMP, disable it- If you must use SNMP, use the same policy for community names as used for passwords.Make sure that they are difficult to guess or crack and that they are chanced periodically- Validate and check community names using SNMPwalk. Additional information can be foundat http://www.2nd.com/functionSNMPwalk.php- Filter SNMP (port 161/udp at the border-router or firewall unless it is absolutely necessary topool or manage devices from outside of the local network, where possible read-only

  18. CATS Deliverable 5.1 : CATS verification of test matrix and protocol

    OpenAIRE

    Uittenbogaard, J.; Camp, O.M.G.C. op den; Montfort, S. van

    2016-01-01

    This report summarizes the work conducted within work package (WP) 5 "Verification of test matrix and protocol" of the Cyclist AEB testing system (CATS) project. It describes the verification process of the draft CATS test matrix resulting from WP1 and WP2, and the feasibility of meeting requirements set by CATS consortium based on requirements in Euro NCAP AEB protocols regarding accuracy, repeatability and reproducibility using the developed test hardware. For the cases where verification t...

  19. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  20. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  1. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  2. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  3. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  4. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  5. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  6. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  7. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  8. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  9. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  10. Partially linear varying coefficient models stratified by a functional covariate

    KAUST Repository

    Maity, Arnab; Huang, Jianhua Z.

    2012-01-01

    We consider the problem of estimation in semiparametric varying coefficient models where the covariate modifying the varying coefficients is functional and is modeled nonparametrically. We develop a kernel-based estimator of the nonparametric

  11. Control room envelope unfiltered air inleakage test protocols

    International Nuclear Information System (INIS)

    Lagus, P.L.; Grot, R.A.

    1997-01-01

    In 1983, the Advisory Committee on Reactor Safeguards (ACRS) recommended that the US NRC develop a control room HVAC performance testing protocol. To date no such protocol has been forthcoming. Beginning in mid-1994, an effort was funded by NRC under a Small Business Innovation Research (SBIR) grant to develop several simplified test protocols based on the principles of tracer gas testing in order to measure the total unfiltered inleakage entering a CRE during emergency mode operation of the control room ventilation system. These would allow accurate assessment of unfiltered air inleakage as required in SRP 6.4. The continuing lack of a standard protocol is unfortunate since one of the significant parameters required to calculate operator dose is the amount of unfiltered air inleakage into the control room. Often it is assumed that, if the Control Room Envelope (CRE) is maintained at +1/8 in. w.g. differential pressure relative to the surroundings, no significant unfiltered inleakage can occur it is further assumed that inleakage due to door openings is the only source of unfiltered air. 23 refs., 13 figs., 2 tabs

  12. Control room envelope unfiltered air inleakage test protocols

    Energy Technology Data Exchange (ETDEWEB)

    Lagus, P.L. [Lagus Applied Technology, San Diego, CA (United States); Grot, R.A. [Lagus Applied Technology, Olney, MD (United States)

    1997-08-01

    In 1983, the Advisory Committee on Reactor Safeguards (ACRS) recommended that the US NRC develop a control room HVAC performance testing protocol. To date no such protocol has been forthcoming. Beginning in mid-1994, an effort was funded by NRC under a Small Business Innovation Research (SBIR) grant to develop several simplified test protocols based on the principles of tracer gas testing in order to measure the total unfiltered inleakage entering a CRE during emergency mode operation of the control room ventilation system. These would allow accurate assessment of unfiltered air inleakage as required in SRP 6.4. The continuing lack of a standard protocol is unfortunate since one of the significant parameters required to calculate operator dose is the amount of unfiltered air inleakage into the control room. Often it is assumed that, if the Control Room Envelope (CRE) is maintained at +1/8 in. w.g. differential pressure relative to the surroundings, no significant unfiltered inleakage can occur it is further assumed that inleakage due to door openings is the only source of unfiltered air. 23 refs., 13 figs., 2 tabs.

  13. Comparison of Linear Microinstability Calculations of Varying Input Realism

    International Nuclear Information System (INIS)

    Rewoldt, G.

    2003-01-01

    The effect of varying ''input realism'' or varying completeness of the input data for linear microinstability calculations, in particular on the critical value of the ion temperature gradient for the ion temperature gradient mode, is investigated using gyrokinetic and gyrofluid approaches. The calculations show that varying input realism can have a substantial quantitative effect on the results

  14. Comparison of linear microinstability calculations of varying input realism

    International Nuclear Information System (INIS)

    Rewoldt, G.; Kinsey, J.E.

    2004-01-01

    The effect of varying 'input realism' or varying completeness of the input data for linear microinstability calculations, in particular on the critical value of the ion temperature gradient for the ion temperature gradient mode, is investigated using gyrokinetic and gyrofluid approaches. The calculations show that varying input realism can have a substantial quantitative effect on the results

  15. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  16. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  17. Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product

    Energy Technology Data Exchange (ETDEWEB)

    O`Connell, L.J. [ed.

    1994-12-01

    An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  18. A critical analysis of a locally agreed protocol for clinical practice

    International Nuclear Information System (INIS)

    Owen, A.; Hogg, P.; Nightingale, J.

    2004-01-01

    Within the traditional scope of radiographic practice (including advanced practice) there is a need to demonstrate effective patient care and management. Such practice should be set within a context of appropriate evidence and should also reflect peer practice. In order to achieve such practice the use of protocols is encouraged. Effective protocols can maximise care and management by minimising inter- and intra-professional variation; they can also allow for detailed procedural records to be kept in case of legal claims. However, whilst literature exists to encourage the use of protocols there is little published material available to indicate how to create, manage and archive them. This article uses an analytical approach to propose a suitable method for protocol creation and archival, it also offers suggestions on the scope and content of a protocol. To achieve this an existing clinical protocol for radiographer reporting barium enemas is analysed to draw out the general issues. Proposals for protocol creation, management, and archival were identified. The clinical practice described or inferred in the protocol should be drawn from evidence, such evidence could include peer-reviewed material, national standards and peer practice. The protocol should include an explanation of how to proceed when the radiographers reach the limit of their ability. It should refer to the initial training required to undertake the clinical duties as well as the on-going continual professional updating required to maintain competence. Audit of practice should be indicated, including the preferred audit methodology, and associated with this should be a clear statement about standards and what to do if standards are not adequately met. Protocols should be archived, in a paper-based form, for lengthy periods in case of legal claims. On the archived protocol the date it was in clinical use should be included

  19. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  20. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  1. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  2. Tracking time-varying cerebral autoregulation in response to changes in respiratory PaCO2

    International Nuclear Information System (INIS)

    Liu, Jia; Simpson, M David; Allen, Robert; Yan, Jingyu

    2010-01-01

    Cerebral autoregulation has been studied by linear filter systems, with arterial blood pressure (ABP) as the input and cerebral blood flow velocity (CBFV—from transcranial Doppler Ultrasound) as the output. The current work extends this by using adaptive filters to investigate the dynamics of time-varying cerebral autoregulation during step-wise changes in arterial PaCO 2 . Cerebral autoregulation was transiently impaired in 11 normal adult volunteers, by switching inspiratory air to a CO 2 /air mixture (5% CO 2 , 30% O 2 and 65% N 2 ) for approximately 2 min and then back to the ambient air, causing step-wise changes in end-tidal CO 2 (EtCO 2 ). Simultaneously, ABP and CBFV were recorded continuously. Simulated data corresponding to the same protocol were also generated using an established physiological model, in order to refine the signal analysis methods. Autoregulation was quantified by the time-varying phase lead, estimated from the adaptive filter model. The adaptive filter was able to follow rapid changes in autoregulation, as was confirmed in the simulated data. In the recorded signals, there was a slow decrease in autoregulatory function following the step-wise increase in PaCO 2 (but this did not reach a steady state within approximately 2 min of recording), with a more rapid change in autoregulation on return to normocapnia. Adaptive filter modelling was thus able to demonstrate time-varying autoregulation. It was further noted that impairment and recovery of autoregulation during transient increases in EtCO 2 occur in an asymmetric manner, which should be taken into account when designing experimental protocols for the study of autoregulation

  3. Ecological thresholds in the savanna landscape: developing a protocol for monitoring the change in composition and utilisation of large trees.

    Directory of Open Access Journals (Sweden)

    Dave J Druce

    Full Text Available BACKGROUND: Acquiring greater understanding of the factors causing changes in vegetation structure -- particularly with the potential to cause regime shifts -- is important in adaptively managed conservation areas. Large trees (> or =5 m in height play an important ecosystem function, and are associated with a stable ecological state in the African savanna. There is concern that large tree densities are declining in a number of protected areas, including the Kruger National Park, South Africa. In this paper the results of a field study designed to monitor change in a savanna system are presented and discussed. METHODOLOGY/PRINCIPAL FINDINGS: Developing the first phase of a monitoring protocol to measure the change in tree species composition, density and size distribution, whilst also identifying factors driving change. A central issue is the discrete spatial distribution of large trees in the landscape, making point sampling approaches relatively ineffective. Accordingly, fourteen 10 m wide transects were aligned perpendicular to large rivers (3.0-6.6 km in length and eight transects were located at fixed-point photographic locations (1.0-1.6 km in length. Using accumulation curves, we established that the majority of tree species were sampled within 3 km. Furthermore, the key ecological drivers (e.g. fire, herbivory, drought and disease which influence large tree use and impact were also recorded within 3 km. CONCLUSIONS/SIGNIFICANCE: The technique presented provides an effective method for monitoring changes in large tree abundance, size distribution and use by the main ecological drivers across the savanna landscape. However, the monitoring of rare tree species would require individual marking approaches due to their low densities and specific habitat requirements. Repeat sampling intervals would vary depending on the factor of concern and proposed management mitigation. Once a monitoring protocol has been identified and evaluated, the next

  4. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    : multiple tries with invalid passwords caused the expected error message (too many retries). but let the user nevertheless pass. Finally, security can be compromised by silly implementation bugs or design decisions. In a commercial VPN software, all calls to the encryption routines were incidentally replaced by stubs, probably during factory testing. The product worked nicely. and the error (an open VPN) would have gone undetected, if a team member had not inspected the low-level traffic out of curiosity. Also, the use secret proprietary encryption routines can backfire, because such algorithms often exhibit weaknesses which can be exploited easily (see e.g., DVD encoding). Summarizing, there is large number of possibilities to make errors which can compromise the security of a protocol. In today s world with short time-to-market and the use of security protocols in open and hostile networks for safety-critical applications (e.g., power or air-traffic control), such slips could lead to catastrophic situations. Thus, formal methods and automatic reasoning techniques should not be used just for the formal proof of absence of an attack, but they ought to be used to provide an end-to-end tool-supported framework for security software. With such an approach all required artifacts (code, documentation, test cases) , formal analyses, and reliable certification will be generated automatically, given a single, high level specification. By a combination of program synthesis, formal protocol analysis, certification; and proof-carrying code, this goal is within practical reach, since all the important technologies for such an approach actually exist and only need to be assembled in the right way.

  5. Holographic cinematography of time-varying reflecting and time-varying phase objects using a Nd:YAG laser

    Science.gov (United States)

    Decker, A. J.

    1982-01-01

    The use of a Nd:YAG laser to record holographic motion pictures of time-varying reflecting objects and time-varying phase objects is discussed. Sample frames from both types of holographic motion pictures are presented. The holographic system discussed is intended for three-dimensional flow visualization of the time-varying flows that occur in jet-engine components.

  6. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  7. The Virtual Insect Brain protocol: creating and comparing standardized neuroanatomy

    Directory of Open Access Journals (Sweden)

    Schindelin Johannes E

    2006-12-01

    Full Text Available Abstract Background In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. These diverse investigations on the function of the insect brain use gene expression patterns that can be visualized and provide the means for manipulating groups of neurons as a common ground. To take advantage of these patterns one needs to know their typical anatomy. Results This paper describes the Virtual Insect Brain (VIB protocol, a script suite for the quantitative assessment, comparison, and presentation of neuroanatomical data. It is based on the 3D-reconstruction and visualization software Amira, version 3.x (Mercury Inc. 1. Besides its backbone, a standardization procedure which aligns individual 3D images (series of virtual sections obtained by confocal microscopy to a common coordinate system and computes average intensities for each voxel (volume pixel the VIB protocol provides an elaborate data management system for data administration. The VIB protocol facilitates direct comparison of gene expression patterns and describes their interindividual variability. It provides volumetry of brain regions and helps to characterize the phenotypes of brain structure mutants. Using the VIB protocol does not require any programming skills since all operations are carried out at an intuitively usable graphical user interface. Although the VIB protocol has been developed for the standardization of Drosophila neuroanatomy, the program structure can be used for the standardization of other 3D structures as well. Conclusion Standardizing brains and gene expression patterns is a new approach to biological shape and its variability. The VIB protocol provides a first set of tools supporting this endeavor in Drosophila. The script suite is freely available at http://www.neurofly.de2

  8. The Virtual Insect Brain protocol: creating and comparing standardized neuroanatomy

    Science.gov (United States)

    Jenett, Arnim; Schindelin, Johannes E; Heisenberg, Martin

    2006-01-01

    Background In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. These diverse investigations on the function of the insect brain use gene expression patterns that can be visualized and provide the means for manipulating groups of neurons as a common ground. To take advantage of these patterns one needs to know their typical anatomy. Results This paper describes the Virtual Insect Brain (VIB) protocol, a script suite for the quantitative assessment, comparison, and presentation of neuroanatomical data. It is based on the 3D-reconstruction and visualization software Amira, version 3.x (Mercury Inc.) [1]. Besides its backbone, a standardization procedure which aligns individual 3D images (series of virtual sections obtained by confocal microscopy) to a common coordinate system and computes average intensities for each voxel (volume pixel) the VIB protocol provides an elaborate data management system for data administration. The VIB protocol facilitates direct comparison of gene expression patterns and describes their interindividual variability. It provides volumetry of brain regions and helps to characterize the phenotypes of brain structure mutants. Using the VIB protocol does not require any programming skills since all operations are carried out at an intuitively usable graphical user interface. Although the VIB protocol has been developed for the standardization of Drosophila neuroanatomy, the program structure can be used for the standardization of other 3D structures as well. Conclusion Standardizing brains and gene expression patterns is a new approach to biological shape and its variability. The VIB protocol provides a first set of tools supporting this endeavor in Drosophila. The script suite is freely available at [2] PMID:17196102

  9. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    JA Edmonds; CN MacCracken; RD Sands; SH Kim

    2000-07-06

    The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per

  10. A proportional integral estimator-based clock synchronization protocol for wireless sensor networks.

    Science.gov (United States)

    Yang, Wenlun; Fu, Minyue

    2017-11-01

    Clock synchronization is an issue of vital importance in applications of WSNs. This paper proposes a proportional integral estimator-based protocol (EBP) to achieve clock synchronization for wireless sensor networks. As each local clock skew gradually drifts, synchronization accuracy will decline over time. Compared with existing consensus-based approaches, the proposed synchronization protocol improves synchronization accuracy under time-varying clock skews. Moreover, by restricting synchronization error of clock skew into a relative small quantity, it could reduce periodic re-synchronization frequencies. At last, a pseudo-synchronous implementation for skew compensation is introduced as synchronous protocol is unrealistic in practice. Numerical simulations are shown to illustrate the performance of the proposed protocol. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  11. Meeting Quay 2k30's requirements

    NARCIS (Netherlands)

    Wijnants, G.H.; Toorn, A. van der; Schuylenburg, M.; Heijnen, H.P.J.; Gijt, J.G. de; Molenaar, W.F.; Ligteringen, H.; Krom, A.H.M.

    2005-01-01

    The requirements that a quay design should meet in order to yield a viable port infrastructure, vary widely from flexibility due to future customers requirements to durability due to owners requirements. In a Port of Rotterdam backed project, current and future requirements have been aggregated by

  12. An Energy Efficient Protocol For The Internet Of Things

    Science.gov (United States)

    Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas

    2015-01-01

    The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.

  13. Field validation of protocols developed to evaluate in-line mastitis detection systems.

    Science.gov (United States)

    Kamphuis, C; Dela Rue, B T; Eastwood, C R

    2016-02-01

    This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and appropriate treatment and (2) to identify cows with high somatic cell count (SCC) to manage bulk milk SCC levels. Gold standard measures, evaluation tests, performance measures, and performance targets were proposed. The current study validated the protocols on commercial dairy farms with automated in-line mastitis-detection systems using both electrical conductivity (EC) and SCC sensor systems that both monitor at whole-udder level. The protocol for requirement 1 was applied on 3 commercial farms. For requirement 2, the protocol was applied on 6 farms; 3 of them had low bulk milk SCC (128×10(3) cells/mL) and were the same farms as used for field evaluation of requirement 1. Three farms with high bulk milk SCC (270×10(3) cells/mL) were additionally enrolled. The field evaluation methodology and results were presented at a workshop including representation from 7 international suppliers of in-line mastitis-detection systems. Feedback was sought on the acceptance of standardized performance evaluation protocols and recommended refinements to the protocols. Although the methodology for requirement 1 was relatively labor intensive and required organizational skills over an extended period, no major issues were encountered during the field validation of both protocols. The validation, thus, proved the protocols to be practical. Also, no changes to the data collection process were recommended by the technology supplier representatives. However, 4 recommendations were made to refine the protocols: inclusion of an additional analysis that ignores small (low-density) clot observations in the definition of CM, extension of the time window from 4 to 5 milkings for timely alerts for CM

  14. Protein blotting protocol for beginners.

    Science.gov (United States)

    Petrasovits, Lars A

    2014-01-01

    The transfer and immobilization of biological macromolecules onto solid nitrocellulose or nylon (polyvinylidene difluoride (PVDF)) membranes subsequently followed by specific detection is referred to as blotting. DNA blots are called Southerns after the inventor of the technique, Edwin Southern. By analogy, RNA blots are referred to as northerns and protein blots as westerns (Burnette, Anal Biochem 112:195-203, 1981). With few exceptions, western blotting involves five steps, namely, sample collection, preparation, separation, immobilization, and detection. In this chapter, protocols for the entire process from sample collection to detection are described.

  15. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  16. Linear parameter-varying control for engineering applications

    CERN Document Server

    White, Andrew P; Choi, Jongeun

    2013-01-01

    The objective of this brief is to carefully illustrate a procedure of applying linear parameter-varying (LPV) control to a class of dynamic systems via a systematic synthesis of gain-scheduling controllers with guaranteed stability and performance. The existing LPV control theories rely on the use of either H-infinity or H2 norm to specify the performance of the LPV system.  The challenge that arises with LPV control for engineers is twofold. First, there is no systematic procedure for applying existing LPV control system theory to solve practical engineering problems from modeling to control design. Second, there exists no LPV control synthesis theory to design LPV controllers with hard constraints. For example, physical systems usually have hard constraints on their required performance outputs along with their sensors and actuators. Furthermore, the H-infinity and H2 performance criteria cannot provide hard constraints on system outputs. As a result, engineers in industry could find it difficult to utiliz...

  17. Closure requirements

    International Nuclear Information System (INIS)

    Hutchinson, I.P.G.; Ellison, R.D.

    1992-01-01

    Closure of a waste management unit can be either permanent or temporary. Permanent closure may be due to: economic factors which make it uneconomical to mine the remaining minerals; depletion of mineral resources; physical site constraints that preclude further mining and beneficiation; environmental, regulatory or other requirements that make it uneconomical to continue to develop the resources. Temporary closure can occur for a period of several months to several years, and may be caused by factors such as: periods of high rainfall or snowfall which prevent mining and waste disposal; economic circumstances which temporarily make it uneconomical to mine the target mineral; labor problems requiring a cessation of operations for a period of time; construction activities that are required to upgrade project components such as the process facilities and waste management units; and mine or process plant failures that require extensive repairs. Permanent closure of a mine waste management unit involves the provision of durable surface containment features to protect the waters of the State in the long-term. Temporary closure may involve activities that range from ongoing maintenance of the existing facilities to the installation of several permanent closure features in order to reduce ongoing maintenance. This paper deals with the permanent closure features

  18. Team Training and Institutional Protocols to Prevent Shoulder Dystocia Complications.

    Science.gov (United States)

    Smith, Samuel

    2016-12-01

    Shoulder dystocia is an obstetrical emergency that may result in significant neonatal complications. It requires rapid recognition and a coordinated response. Standardization of care, teamwork and communication, and clinical simulation are the key components of patient safety programs in obstetrics. Simulation-based team training and institutional protocols for the management of shoulder dystocia are emerging as integral components of many labor and delivery safety initiatives because of their impact on technical skills and team performance.

  19. Experimental investigation of quantum communication protocols in higher dimensions

    International Nuclear Information System (INIS)

    Groeblacher, S.; Stuetz, M.; Vaziri, A.; Jennewein, T.; Zeilinger, A.

    2005-01-01

    Full text: Higher dimensional quantum systems, such as qutrits, offer unique possibilities for quantum communication. In particular, quantum key distribution may be realized with a higher security margin than with qubit systems. We plan to demonstrate quantum cryptography with entangled photonic qutrits based on orbital angular momentum (OAM). Therefore we test various methods of manipulating and transforming OAM states of photons, which is required for the implementation of quantum communication protocols. (author)

  20. Genomics protocols [Methods in molecular biology, v. 175

    National Research Council Canada - National Science Library

    Starkey, Michael P; Elaswarapu, Ramnath

    2001-01-01

    ... to the larger community of researchers who have recognized the potential of genomics research and may themselves be beginning to explore the technologies involved. Some of the techniques described in Genomics Protocols are clearly not restricted to the genomics field; indeed, a prerequisite for many procedures in this discipline is that they require an extremely high throughput, beyond the scope of the average investigator. However, what we have endeavored here to achieve is both to compile a collection of...

  1. Testing protocols for evaluating monolithic waste forms containing mixed wastes

    International Nuclear Information System (INIS)

    Gilliam, T.M.; Sams, T.L.; Pitt, W.W.

    1986-01-01

    Test protocols have been presented which can be used as a guide in cement-based grout formulation development studies. Based on experience at ORNL, these six tests are generally sufficient to develop a grout product which will meet all applicable DOE, NRC, and EPA performance criteria. As such, these tests can be used to minimize the time required to tailor a grout to be compatible with both the waste stream and the process disposal scenario. 9 refs

  2. Accessibility in Public Buildings: : Efficiency of Checklist Protocols

    OpenAIRE

    Andersson, Jonas E; Skehan, Terry

    2016-01-01

    In Sweden, governmental agencies and bodies are required to implement a higher level of accessibility in their buildings than that stipulated by the National Building and Planning Act (PBL). The Swedish Agency for Participation (MFD, Myndigheten för delaktighet) develops holistic guidelines in order to conceptualize this higher level of accessibility. In conjunction to these guidelines, various checklist protocols have been produced. The present study focuses on the efficiency of such checkli...

  3. Remote object authentication: confidence model, cryptosystem and protocol

    Science.gov (United States)

    Lancrenon, Jean; Gillard, Roland; Fournel, Thierry

    2009-04-01

    This paper follows a paper by Bringer et al.3 to adapt a security model and protocol used for remote biometric authentication to the case of remote morphometric object authentication. We use a different type of encryption technique that requires smaller key sizes and has a built-in mechanism to help control the integrity of the messages received by the server. We also describe the optical technology used to extract the morphometric templates.

  4. Interplanetary Overlay Network Bundle Protocol Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  5. A comparison of sennosides-based bowel protocols with and without docusate in hospitalized patients with cancer.

    Science.gov (United States)

    Hawley, Philippa Helen; Byeon, Jai Jun

    2008-05-01

    Constipation is a common and distressing condition in patients with cancer, especially those taking opioid analgesics. Many institutions prevent and treat constipation with titrated laxatives, which is known as a bowel protocol. An effective and well-tolerated bowel protocol is a very important component of cancer care, and there is little evidence on which to base selection of the most appropriate agents. This study compares a protocol of the stimulant laxative sennosides alone with a protocol of sennosides plus the stool softener docusate, in hospitalized patients at an oncology center. The docusate-containing protocol had an initial docusate-only step for patients not taking opioids, and four to six 100-mg capsules of docusate sodium in addition to the sennosides for the rest of the protocol. Thirty patients received the sennosides-only (S) protocol and 30 the sennosides plus docusate (DS) protocol. The efficacy and adverse effects of the protocols were monitored for 5-12 days. The two protocols were used sequentially, creating two cohorts, one on each protocol. Eighty percent of patients were taking oral opioids and 72% were admitted for symptom control/supportive care. Over a total of 488 days of observation it was found that the S protocol produced more bowel movements than the DS protocol, and in the symptom control/supportive care patients this difference was statistically significant (p sennosides did not reduce bowel cramps, and was less effective in inducing laxation than the sennosides-only protocol. Further research into the appropriate use of docusate and into the details of bowel protocol design are required.

  6. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    Science.gov (United States)

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  7. Chapter 15: Commercial New Construction Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Keates, Steven [ADM Associates, Inc., Atlanta, GA (United States)

    2017-10-09

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) or packages of measures where evaluators can analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol (IPMVP).

  8. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair

    Science.gov (United States)

    Lightsey, Harry M.; Kantrowitz, David E.; Swindell, Hasani W.; Trofa, David P.; Ahmad, Christopher S.; Lynch, T. Sean

    2018-01-01

    . Fifteen protocols (43%) required completion of specific return-to-sport criteria before resuming training. Conclusion: Marked variability is found in both the composition and timing of rehabilitation components across the various complete proximal hamstring repair rehabilitation protocols published online. This finding mirrors the variability of proposed rehabilitation protocols in the professional literature and represents an opportunity to improve patient care. PMID:29511700

  9. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair.

    Science.gov (United States)

    Lightsey, Harry M; Kantrowitz, David E; Swindell, Hasani W; Trofa, David P; Ahmad, Christopher S; Lynch, T Sean

    2018-02-01

    The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Cross-sectional study. Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises. Fifteen protocols (43%) required completion of

  10. Development of a standard communication protocol for an emergency situation management in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Man Cheol, E-mail: charleskim@kaeri.re.k [Integrated Risk Assessment Center, Korea Atomic Energy Research Institute, 150, Deokjin-dong, Yuseong-gu, Daejeon 305-353 (Korea, Republic of); Park, Jinkyun; Jung, Wondea [Integrated Risk Assessment Center, Korea Atomic Energy Research Institute, 150, Deokjin-dong, Yuseong-gu, Daejeon 305-353 (Korea, Republic of); Kim, Hanjeom; Kim, Yoon Joong [YGN Nuclear Power Division Training Center, Korea Hydro and Nuclear Power Company, 517 Kyemari, Hongnong-eup, Yeongkwang-gun, Chonnam 513-880 (Korea, Republic of)

    2010-06-15

    Correct communication between main control room (MCR) operators is an important factor in the management of emergency situations in nuclear power plants (NPPs). For this reason, a standard communication protocol for the management of emergency situations in NPPs has been developed, with the basic direction of enhancing the safety of NPPs and the standardization of communication protocols. To validate the newly developed standard communication protocol, validation experiments with 10 licensed NPP MCR operator teams was performed. From the validation experiments, it was found that the use of the standard communication protocol required more time, but it can contribute to the enhancement of the safety of NPPs by an operators' better grasp of the safety-related parameters and a more efficient and clearer communication between NPP operators, while imposing little additional workloads on the NPP MCR operators. The standard communication protocol is expected to be used to train existing NPP MCR operators without much aversion, as well as new operators.

  11. A distributed Synchronous reservation multiple access control protocol for mobile Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yanling; SUN Xianpu; LI Jiandong

    2007-01-01

    This study proposes a new multiple access control protocol named distributed synchronous reservation multiple access control protocol.in which the hidden and exposed terminal problems are solved,and the quality of service(QoS)requirements for real-time traffic are guaranteed.The protocol is founded on time division multiplex address and a different type of traffic is assigned to difierent priority,according to which a node should compete for and reserve the free slots in a different method.Moreover,there is a reservation acknowledgement process before data transmit in each reserved slot,so that the intruded terminal problem is solved.The throughput and average packets drop probability of this protocol are analyzed and simulated in a fully connected network.the results of which indicate that this protocol is efficient enough to support the real-time traffic.and it is more suitable to MANETs.

  12. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Directory of Open Access Journals (Sweden)

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  13. Implementation of the AAPM Task Group 21 protocol by the Radiological Physics Center and its implications

    International Nuclear Information System (INIS)

    Gastorf, R.J.; Hanson, W.F.; Shalek, R.J.; Berkley, L.W.

    1984-01-01

    The Radiation Therapy Committee of the American Association of Physicists in Medicine appointed Task Group 21 to write a new protocol for the calibration of high-energy photon and electron therapy beams. This protocol updates the physical parameters used in the calculations and is intended to account for differences in ionization chamber design and some differences between phantom materials that were not considered in previous protocols. This paper discusses how the Radiological Physics Center (RPC) intends to implement the new protocol, the changes required in the RPC calibration techniques, and the magnitude of the change in the RPC calculations of absorbed dose resulting from the implementation of the new protocol. Although the change in the RPC absorbed-dose calculations will be only 0%-2% over the range of photon and electron energies of interest, some institutions using specific dosimetry systems may find their absorbed-dose calculations changing by 4% or more

  14. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA).

    Science.gov (United States)

    Muharemovic, O; Troelsen, A; Thomsen, M G; Kallemose, T; Gosvig, K K

    2018-05-01

    Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time and the number of exposure repetitions. Forty patients undergoing primary total hip arthroplasty were equally randomized to either a case or a control group. Radiographers in the case group were assisted by personalized patient protocols containing information about each patient's post-operative RSA imaging. Radiographers in the control group used a standard RSA protocol. At three months, radiographers in the case group significantly reduced (p RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute to the reduction of examination time, thus ensuring a cost benefit for department and patient safety. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.

  15. Space Network Time Distribution and Synchronization Protocol Development for Mars Proximity Link

    Science.gov (United States)

    Woo, Simon S.; Gao, Jay L.; Mills, David

    2010-01-01

    Time distribution and synchronization in deep space network are challenging due to long propagation delays, spacecraft movements, and relativistic effects. Further, the Network Time Protocol (NTP) designed for terrestrial networks may not work properly in space. In this work, we consider the time distribution protocol based on time message exchanges similar to Network Time Protocol (NTP). We present the Proximity-1 Space Link Interleaved Time Synchronization (PITS) algorithm that can work with the CCSDS Proximity-1 Space Data Link Protocol. The PITS algorithm provides faster time synchronization via two-way time transfer over proximity links, improves scalability as the number of spacecraft increase, lowers storage space requirement for collecting time samples, and is robust against packet loss and duplication which underlying protocol mechanisms provide.

  16. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  17. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  18. Modeling the time--varying subjective quality of HTTP video streams with rate adaptations.

    Science.gov (United States)

    Chen, Chao; Choi, Lark Kwon; de Veciana, Gustavo; Caramanis, Constantine; Heath, Robert W; Bovik, Alan C

    2014-05-01

    Newly developed hypertext transfer protocol (HTTP)-based video streaming technologies enable flexible rate-adaptation under varying channel conditions. Accurately predicting the users' quality of experience (QoE) for rate-adaptive HTTP video streams is thus critical to achieve efficiency. An important aspect of understanding and modeling QoE is predicting the up-to-the-moment subjective quality of a video as it is played, which is difficult due to hysteresis effects and nonlinearities in human behavioral responses. This paper presents a Hammerstein-Wiener model for predicting the time-varying subjective quality (TVSQ) of rate-adaptive videos. To collect data for model parameterization and validation, a database of longer duration videos with time-varying distortions was built and the TVSQs of the videos were measured in a large-scale subjective study. The proposed method is able to reliably predict the TVSQ of rate adaptive videos. Since the Hammerstein-Wiener model has a very simple structure, the proposed method is suitable for online TVSQ prediction in HTTP-based streaming.

  19. Spatially varying coefficient models in real estate: Eigenvector spatial filtering and alternative approaches

    NARCIS (Netherlands)

    Helbich, M; Griffith, D

    2016-01-01

    Real estate policies in urban areas require the recognition of spatial heterogeneity in housing prices to account for local settings. In response to the growing number of spatially varying coefficient models in housing applications, this study evaluated four models in terms of their spatial patterns

  20. Estimating varying coefficients for partial differential equation models.

    Science.gov (United States)

    Zhang, Xinyu; Cao, Jiguo; Carroll, Raymond J

    2017-09-01

    Partial differential equations (PDEs) are used to model complex dynamical systems in multiple dimensions, and their parameters often have important scientific interpretations. In some applications, PDE parameters are not constant but can change depending on the values of covariates, a feature that we call varying coefficients. We propose a parameter cascading method to estimate varying coefficients in PDE models from noisy data. Our estimates of the varying coefficients are shown to be consistent and asymptotically normally distributed. The performance of our method is evaluated by a simulation study and by an empirical study estimating three varying coefficients in a PDE model arising from LIDAR data. © 2017, The International Biometric Society.

  1. A shortened protocol for assessing cognitive bias in rats.

    Science.gov (United States)

    Brydges, Nichola M; Hall, Lynsey

    2017-07-15

    Reliable measurement of affective state in animals is a significant goal of animal welfare. Such measurements would also improve the validity of pre-clinical mental health research which relies on animal models. However, at present, affective states in animals are inaccessible to direct measurement. In humans, changes in cognitive processing can give reliable indications of emotional state. Therefore, similar techniques are increasingly being used to gain proxy measures of affective states in animals. In particular, the 'cognitive bias' assay has gained popularity in recent years. Major disadvantages of this technique include length of time taken for animals to acquire the task (typically several weeks), negative experiences associated with task training, and issues of motivation. Here we present a shortened cognitive bias protocol using only positive reinforcers which must actively be responded to. The protocol took an average of 4days to complete, and produced similar results to previous, longer methods (minimum 30days). Specifically, rats housed in standard laboratory conditions demonstrated negative cognitive biases when presented with ambiguous stimuli, and took longer to make a decision when faced with an ambiguous stimulus. Compared to previous methods, this protocol is significantly shorter (average 4days vs. minimum 30days), utilises only positive reinforcers to avoid inducing negative affective states, and requires active responses to all cues, avoiding potential confounds of motivational state. We have successfully developed a shortened cognitive bias protocol, suitable for use with laboratory rats. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  2. Evaluation of American Board of Orthodontics certification protocols in postgraduate orthodontic programs in the United States and Canada.

    Science.gov (United States)

    Park, Jae Hyun; Putrus, Raphael R; Pruzansky, Dawn P; Grubb, John

    2017-03-01

    The objective of this study was to identify the board certification protocols that hospital and university-based postgraduate orthodontic programs have in place to prepare residents for the American Board of Orthodontics (ABO) certification examination. An electronic survey was sent to the program directors of each of the 72 postgraduate orthodontic programs in the United States and Canada. The survey consisted of 49 questions about demographics, resident case assignment protocols, and ABO examination preparation methods. The response rate was 81%. Most programs were 30 to 36 months in length (72.7%). Many residents had a case load of 51 to 75 during their first year (50.9%), with an average maximum case load of 70 to 109. There was a positive correlation with both the number of cases that first-year residents start and the length of the program (Spearman correlation coefficient = 0.379; P <0.01) when compared with maximum case load. Approximately 72% of the programs do not offer a written mock board examination; however, 72% reported offering a clinical mock board examination. ABO cases are identified within the first 6 months of most programs. About 88% of respondents believe that residents take advantage of the banking system, and that over the past 5 years ABO Initial Certification Examination applications have increased. Most program directors (89.1%) believe that their program length is sufficient for board preparation. Subjects tested in the written examination are integrated into the didactic curriculum and strengthened with ongoing literature reviews, with a passing rate over 90%. Clinical examination preparation varies, with most programs requiring a mock board examination for graduation. Total participation in both the Initial Certification Examination and banking has increased since 2010; better follow-up protocols are needed to track residents after graduation. Copyright © 2017 American Association of Orthodontists. Published by Elsevier Inc

  3. Characteristics of postoperative weight bearing and management protocols for tibial plateau fractures: Findings from a scoping review.

    Science.gov (United States)

    Arnold, John B; Tu, Chen Gang; Phan, Tri M; Rickman, Mark; Varghese, Viju Daniel; Thewlis, Dominic; Solomon, Lucian B

    2017-12-01

    To identify and describe the characteristics of existing practices for postoperative weight bearing and management of tibial plateau fractures (TPFs), identify gaps in the literature, and inform the design of future research. Seven electronic databases and clinical trial registers were searched from inception until November 17th 2016. Studies were included if they reported on the surgical management of TPFs, had a mean follow-up time of ≥1year and provided data on postoperative management protocols. Data were extracted and synthesized according to study demographics, patient characteristics and postoperative management (weight bearing regimes, immobilisation devices, exercises and complications). 124 studies were included involving 5156 patients with TPFs. The mean age across studies was 45.1 years (range 20.8-72; 60% male), with a mean follow-up of 34.9 months (range 12-264). The most frequent fracture types were AO/OTA classification 41-B3 (29.5%) and C3 (25%). The most commonly reported non-weight bearing time after surgery was 4-6 weeks (39% of studies), with a further 4-6 weeks of partial weight bearing (51% of studies), resulting in 9-12 weeks before full weight bearing status was recommended (55% of studies). Loading recommendations for initial weight bearing were most commonly toe-touch/bearing was positively correlated with the proportion of fractures of AO/OTA type C (r=0.465, p=0.029) and Schatzker type IV-VI (r=0.614, pbearing time before full weight bearing is recommended at 9-12 weeks. Partial weight bearing protocols and brace use were varied. Type of rehabilitation may be an important factor influencing recovery, with future high quality prospective studies required to determine the impact of different protocols on clinical and radiological outcomes. Crown Copyright © 2017. Published by Elsevier Ltd. All rights reserved.

  4. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  5. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  6. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  7. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  8. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.

    Science.gov (United States)

    Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng

    2018-04-01

     With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated.  Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks.  The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS.  We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features

  9. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  10. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  11. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  12. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  13. Telomerase Repeated Amplification Protocol (TRAP).

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W

    2015-11-20

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al. , 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC - counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al. , 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  14. A False-name-Proof Double Auction Protocol for Arbitrary Evaluation Values

    Science.gov (United States)

    Sakurai, Yuko; Yokoo, Makoto

    We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategy-proofness by incorporating the possibility of false-name bids, e.g., bids submitted using multiple e-mail addresses. An existing protocol called TPD protocol is false-name-proof but can handle only the cases where marginal utilities of each agent always decrease, while our new GTPD protocol can handle arbitrary evaluation values. When marginal utilities can increase, some bids cannot be divided into a single unit (e.g., an all-or-nothing bid). Due to the existence of such indivisible bids, meeting supply/demand becomes difficult. Furthermore, a seller/buyer can submit a false-name-bid by pretending to be a potential buyer/seller to manipulate allocations and payments. In the GTPD protocol, the auctioneer is required to absorb the supply-demand imbalance up to a given upper-bound. Also, the GTPD incorporate a new false-name-proof one-sided auction protocol that is guaranteed to sell/buy a certain number of units. Simulation results show that when the threshold price is set appropriately, this protocol can obtain a good social surplus, and the number of absorbed units is much smaller than the given upper-bound.

  15. Robust Multi-unit Auction Protocol against False-name Bids

    Science.gov (United States)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  16. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  17. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    Science.gov (United States)

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  18. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  19. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  20. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  1. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  2. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  3. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  4. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  5. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  6. Compact wireless control network protocol with fast path switching

    Directory of Open Access Journals (Sweden)

    Yasutaka Kawamoto

    2017-08-01

    Full Text Available Sensor network protocol stacks require the addition or adjustment of functions based on customer requirements. Sensor network protocols that require low delay and low packet error rate (PER, such as wireless control networks, often adopt time division multiple access (TDMA. However, it is difficult to add or adjust functions in protocol stacks that use TDMA methods. Therefore, to add or adjust functions easily, we propose NES-SOURCE, a compact wireless control network protocol with a fast path-switching function. NES-SOURCE is implemented using carrier sense multiple access/collision avoidance (CSMA/CA rather than TDMA. Wireless control networks that use TDMA prevent communication failure by duplicating the communication path. If CSMA/CA networks use duplicate paths, collisions occur frequently, and communication will fail. NES-SOURCE switches paths quickly when communication fails, which reduces the effect of communication failures. Since NES-SOURCE is implemented using CSMA/CA rather than TDMA, the implementation scale is less than one-half that of existing network stacks. Furthermore, since NES-SOURCE’s code complexity is low, functions can be added or adjusted easily and quickly. Communication failures occur owing to changes in the communication environment and collisions. Experimental results demonstrate that the proposed NES-SOURCE’s path-switching function reduces the amount of communication failures when the communication environment changes owing to human movement and others. Furthermore, we clarify the relationships among the probability of a changing communication environment, the collision occurrence rate, and the PER of NES-SOURCE.

  7. Development of Network Protocol for the Integrated Safety System

    Energy Technology Data Exchange (ETDEWEB)

    Park, S. W.; Baek, J. I.; Lee, S. H.; Park, C. S.; Park, K. H.; Shin, J. M. [Hannam Univ., Daejeon (Korea, Republic of)

    2007-06-15

    Communication devices in the safety system of nuclear power plants are distinguished from those developed for commercial purposes in terms of a strict requirement of safety. The concept of safety covers the determinability, the reliability, and the separation/isolation to prevent the undesirable interactions among devices. The safety also requires that these properties be never proof less. Most of the current commercialized communication products rarely have the safety properties. Moreover, they can be neither verified nor validated to satisfy the safety property of implementation process. This research proposes the novel architecture and protocol of a data communication network for the safety system in nuclear power plants.

  8. Development of Network Protocol for the Integrated Safety System

    International Nuclear Information System (INIS)

    Park, S. W.; Baek, J. I.; Lee, S. H.; Park, C. S.; Park, K. H.; Shin, J. M.

    2007-06-01

    Communication devices in the safety system of nuclear power plants are distinguished from those developed for commercial purposes in terms of a strict requirement of safety. The concept of safety covers the determinability, the reliability, and the separation/isolation to prevent the undesirable interactions among devices. The safety also requires that these properties be never proof less. Most of the current commercialized communication products rarely have the safety properties. Moreover, they can be neither verified nor validated to satisfy the safety property of implementation process. This research proposes the novel architecture and protocol of a data communication network for the safety system in nuclear power plants

  9. The Use of Grid Storage Protocols for Healthcare Applications

    CERN Document Server

    Donno, F; CERN. Geneva. IT Department

    2008-01-01

    Grid computing has attracted worldwide attention for a variety of domains. Healthcare projects focus on data mining and standardization techniques, the issue of data accessibility and transparency over the storage systems on the Grid has seldom been tackled. In this position paper, we identify the key issues and requirements imposed by Healthcare applications and point out how Grid Storage Technology can be used to satisfy those requirements. The main contribution of this work is the identification of the characteristics and protocols that make Grid Storage technology attractive for building a Healthcare data storage infrastructure.

  10. [The intervention mapping protocol: A structured process to develop, implement and evaluate health promotion programs].

    Science.gov (United States)

    Fassier, J-B; Lamort-Bouché, M; Sarnin, P; Durif-Bruckert, C; Péron, J; Letrilliart, L; Durand, M-J

    2016-02-01

    Health promotion programs are expected to improve population health and reduce social inequalities in health. However, their theoretical foundations are frequently ill-defined, and their implementation faces many obstacles. The aim of this article is to describe the intervention mapping protocol in health promotion programs planning, used recently in several countries. The challenges of planning health promotion programs are presented, and the six steps of the intervention mapping protocol are described with an example. Based on a literature review, the use of this protocol, its requirements and potential limitations are discussed. The intervention mapping protocol has four essential characteristics: an ecological perspective (person-environment), a participative approach, the use of theoretical models in human and social sciences and the use of scientific evidence. It comprises six steps: conduct a health needs assessment, define change objectives, select theory-based change techniques and practical applications, organize techniques and applications into an intervention program (logic model), plan for program adoption, implementation, and sustainability, and generate an evaluation plan. This protocol was used in different countries and domains such as obesity, tobacco, physical activity, cancer and occupational health. Although its utilization requires resources and a critical stance, this protocol was used to develop interventions which efficacy was demonstrated. The intervention mapping protocol is an integrated process that fits the scientific and practical challenges of health promotion. It could be tested in France as it was used in other countries, in particular to reduce social inequalities in health. Copyright © 2016. Published by Elsevier Masson SAS.

  11. A New Ultra-lightweight Authentication Protocol for Low Cost RFID Tags

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2013-05-01

    Full Text Available The Radio Frequency Identification (RFID system has been widely used in almost every aspects of the society. At present, the problem of security and privacy become a key factor of severely blocking the widespread of its usage. However, due to restraints on RFID tag’s manufacturing cost, the traditional methods of encryption are not good candidate to defend the security of wireless communication channel between reader and tag. Designing lightweight or ultra-lightweight RFID authentication protocol has become a hot research topic recently. This paper proposes a new ultra-lightweight RFID authentication protocol with high robustness and execution efficiency. The proposed protocol requires only simple bit-wise operations, it has the characteristics of low storage requirement and communication cost. At the same time, through elaborate mechanism design, avoid the vulnerability of the existing ultra-lightweight authentication protocols.

  12. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  13. Software for simulating IMRT protocol

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de, E-mail: tcff@ufmg.b, E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Nuclear

    2009-07-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  14. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de

    2009-01-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  15. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  16. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  17. How Do Parenting Concepts Vary within and between the Families?

    Science.gov (United States)

    Roskam, Isabelle; Meunier, Jean Christophe

    2009-01-01

    How do parenting concepts vary within and between the families? The present study regards parenting as a complex family process by considering three concepts of parenting: styles, differential treatment and coparenting consistency. A main question was addressed: whether and how these parenting concepts vary within the families towards siblings or…

  18. Specimen loading list for the varying temperature experiment

    International Nuclear Information System (INIS)

    Qualls, A.L.; Sitterson, R.G.

    1998-01-01

    The varying temperature experiment HFIR-RB-13J has been assembled and inserted in the reactor. Approximately 5300 specimens were cleaned, inspected, matched, and loaded into four specimen holders. A listing of each specimen loaded into the steady temperature holder, its position in the capsule, and the identification of the corresponding specimen loaded into the varying temperature holder is presented in this report

  19. Response of rabbits to varying levels of cassava and Leucaena ...

    African Journals Online (AJOL)

    Response of rabbits to varying levels of cassava and Leucaena leucocephala leaf meal diets. ... Bulletin of Animal Health and Production in Africa ... An experiment was carried out to determine the performance, haematology, carcass characteristics and sensory evaluation of meat from rabbits (n = 30) fed varying levels of ...

  20. Analysis of time-varying psoriasis lesion image patterns

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær; Nielsen, Allan Aasbjerg

    2004-01-01

    The multivariate alteration detection transform is applied to pairs of within and between time varying registered psoriasis image patterns. Color band contribution to the variates explaining maximal change is analyzed.......The multivariate alteration detection transform is applied to pairs of within and between time varying registered psoriasis image patterns. Color band contribution to the variates explaining maximal change is analyzed....

  1. Multivariate time-varying volatility modeling using probabilistic fuzzy systems

    NARCIS (Netherlands)

    Basturk, N.; Almeida, R.J.; Golan, R.; Kaymak, U.

    2016-01-01

    Methods to accurately analyze financial risk have drawn considerable attention in financial institutions. One difficulty in financial risk analysis is the fact that banks and other financial institutions invest in several assets which show time-varying volatilities and hence time-varying financial

  2. Protocol for the quantification of greenhouse gas emissions from waste management activities

    International Nuclear Information System (INIS)

    2013-10-01

    The Waste Sector GHG Protocol is intended to provide guidelines for calculating and reporting greenhouse gas (GHG) emissions associated with a waste management service, over a specific time period (usually one year) and based on simple operational data. The Protocol itself has evolved with time, going through 4 version updates. The different versions correspond to evolutions initiated by the original Entreprises pour l'Environnement Working Group (Seche Environnement, Suez Environnement and Veolia Environnement) but also to the suggestions and feedback provided by several waste associations that have reviewed and commented on the Protocol. As a result, several worldwide associations have validated and used the Protocol for their own greenhouse gas inventories. The version 5 of the Waste Sector GHG Protocol has received the 'Built on the GHG Protocol' label. With such label, the Waste Sector Protocol reinforces its desire to be the reference tool for the waste sector by ensuring its users of a total and transparent coherence and conformity with the GHG Protocol Corporate Standard's requirements. The Protocol is also available on the following web page: http://www.ghgprotocol.org/Tools-Built-on-GHG-Protocol. The Waste Sector GHG Protocol aims at: Providing a consistent and transparent approach to quantify, report and verify GHG direct (scope 1), indirect (scope 2) and avoided emissions of waste management actors; Establishing best practice across the waste sector for the implementation of coherent and homogeneous GHG emissions inventories; Explaining waste sector's particularities in terms of GHG emissions (diffuse emission from landfills, GHG avoided emissions, carbon sequestration); Helping companies to take proper commitments and stakeholders to understand and verify those commitments. The Protocol consists of a manual with two additional documents: A 'Frequently Asked Questions' document; A 'Follow-up of modifications

  3. Description of signature scales in a floating wind turbine model wake subjected to varying turbulence intensity

    Science.gov (United States)

    Kadum, Hawwa; Rockel, Stanislav; Holling, Michael; Peinke, Joachim; Cal, Raul Bayon

    2017-11-01

    The wake behind a floating model horizontal axis wind turbine during pitch motion is investigated and compared to a fixed wind turbine wake. An experiment is conducted in an acoustic wind tunnel where hot-wire data are acquired at five downstream locations. At each downstream location, a rake of 16 hot-wires was used with placement of the probes increasing radially in the vertical, horizontal, and diagonally at 45 deg. In addition, the effect of turbulence intensity on the floating wake is examined by subjecting the wind turbine to different inflow conditions controlled through three settings in the wind tunnel grid, a passive and two active protocols, thus varying in intensity. The wakes are inspected by statistics of the point measurements, where the various length/time scales are considered. The wake characteristics for a floating wind turbine are compared to a fixed turbine, and uncovering its features; relevant as the demand for exploiting deep waters in wind energy is increasing.

  4. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    Science.gov (United States)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  5. Interrater and Intrarater Reliability of the Tuck Jump Assessment by Health Professionals of Varied Educational Backgrounds

    Directory of Open Access Journals (Sweden)

    Lisa A. Dudley

    2013-01-01

    Full Text Available Objective. The Tuck Jump Assessment (TJA, a clinical plyometric assessment, identifies 10 jumping and landing technique flaws. The study objective was to investigate TJA interrater and intrarater reliability with raters of different educational and clinical backgrounds. Methods. 40 participants were video recorded performing the TJA using published protocol and instructions. Five raters of varied educational and clinical backgrounds scored the TJA. Each score of the 10 technique flaws was summed for the total TJA score. Approximately one month later, 3 raters scored the videos again. Intraclass correlation coefficients determined interrater (5 and 3 raters for first and second session, resp. and intrarater (3 raters reliability. Results. Interrater reliability with 5 raters was poor (ICC = 0.47; 95% confidence intervals (CI 0.33–0.62. Interrater reliability between 3 raters who completed 2 scoring sessions improved from 0.52 (95% CI 0.35–0.68 for session one to 0.69 (95% CI 0.55–0.81 for session two. Intrarater reliability was poor to moderate, ranging from 0.44 (95% CI 0.22–0.68 to 0.72 (95% CI 0.55–0.84. Conclusion. Published protocol and training of raters were insufficient to allow consistent TJA scoring. There may be a learned effect with the TJA since interrater reliability improved with repetition. TJA instructions and training should be modified and enhanced before clinical implementation.

  6. The Comparative Study Some of Reactive and Proactive Routing Protocols in The Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Anas Ali Hussien

    2018-02-01

    Full Text Available The wireless sensor network (WSN consists mostly of a large number of nodes in a large area where not all nodes are directly connected. The applications of comprise a wide variety of scenarios.The mobile nodes are free to move because this network has selfــstructured topology. Routing protocols are responsible for detecting and maintaining paths in the network, and it classified into reactive (OnـــDemand, proactive (Table driven, and hybrid. In this paper represents a performance study of some WSN routing protocols: the Dynamic Source Routing (DSR, Ad hoc On-Demand Distance Vector (AODV, and Destination-Sequenced Distance-Vector (DSDV. The comparison made according to important metrics like packet delivery ratio (PDR, total packets dropped, Average end-to-end delay (Avg EED, and normalized routing load under the Transmission Control Protocol (TCP and User Datagram Protocol (UDP traffic connection and with varying number of nodes, pause time; and  varying speed. In this work used (NSــ2.35 that installed on (Ubuntu 14.04 operating system to implementing the scenario. Conclude that the DSR has better performance in TCP connection; while the DSDV has better performance in UDP protocol.

  7. Time varying voltage combustion control and diagnostics sensor

    Science.gov (United States)

    Chorpening, Benjamin T [Morgantown, WV; Thornton, Jimmy D [Morgantown, WV; Huckaby, E David [Morgantown, WV; Fincham, William [Fairmont, WV

    2011-04-19

    A time-varying voltage is applied to an electrode, or a pair of electrodes, of a sensor installed in a fuel nozzle disposed adjacent the combustion zone of a continuous combustion system, such as of the gas turbine engine type. The time-varying voltage induces a time-varying current in the flame which is measured and used to determine flame capacitance using AC electrical circuit analysis. Flame capacitance is used to accurately determine the position of the flame from the sensor and the fuel/air ratio. The fuel and/or air flow rate (s) is/are then adjusted to provide reduced flame instability problems such as flashback, combustion dynamics and lean blowout, as well as reduced emissions. The time-varying voltage may be an alternating voltage and the time-varying current may be an alternating current.

  8. Measuring spatially- and directionally-varying light scattering from biological material.

    Science.gov (United States)

    Harvey, Todd Alan; Bostwick, Kimberly S; Marschner, Steve

    2013-05-20

    Light interacts with an organism's integument on a variety of spatial scales. For example in an iridescent bird: nano-scale structures produce color; the milli-scale structure of barbs and barbules largely determines the directional pattern of reflected light; and through the macro-scale spatial structure of overlapping, curved feathers, these directional effects create the visual texture. Milli-scale and macro-scale effects determine where on the organism's body, and from what viewpoints and under what illumination, the iridescent colors are seen. Thus, the highly directional flash of brilliant color from the iridescent throat of a hummingbird is inadequately explained by its nano-scale structure alone and questions remain. From a given observation point, which milli-scale elements of the feather are oriented to reflect strongly? Do some species produce broader "windows" for observation of iridescence than others? These and similar questions may be asked about any organisms that have evolved a particular surface appearance for signaling, camouflage, or other reasons. In order to study the directional patterns of light scattering from feathers, and their relationship to the bird's milli-scale morphology, we developed a protocol for measuring light scattered from biological materials using many high-resolution photographs taken with varying illumination and viewing directions. Since we measure scattered light as a function of direction, we can observe the characteristic features in the directional distribution of light scattered from that particular feather, and because barbs and barbules are resolved in our images, we can clearly attribute the directional features to these different milli-scale structures. Keeping the specimen intact preserves the gross-scale scattering behavior seen in nature. The method described here presents a generalized protocol for analyzing spatially- and directionally-varying light scattering from complex biological materials at multiple

  9. Heavy vehicle simulator operations: protocol for instrumentation, data collection and data storage - 2nd draft

    CSIR Research Space (South Africa)

    Jones, DJ

    2002-09-01

    Full Text Available The instrumentation used is discussed under the relevant sections. Keywords: Accelerated pavement testing (APT), Heavy Vehicle Simulator (HVS) Proposals for implementation: Follow protocol in all future HVS testing. Update as required... future HVS testing. The protocol discusses staffing, site selection and establishment, and data collection, analysis and storage. 1.2. Accelerated Pavement Testing Accelerated Pavement Testing (APT) can be described as a controlled application...

  10. Application of Protocol-Oriented MVVM Architecture in iOS Development

    OpenAIRE

    Luong Nguyen, Khoi Nguyen

    2017-01-01

    The mobile application industry is fast paced. Requirements change, additions of new features occur on a daily basis and demand frequent code structure adjustment. Thus, a flexible and maintainable software architecture is often a key factor for an application’s success. The major objective of this thesis is to propose a practical use case of Protocol Oriented Model View View Model, an architecture inspired by the Protocol Oriented Programming paradigm. This thesis explains the architectur...

  11. Considerations preliminary to the application of early and immediate loading protocols in dental implantology.

    Science.gov (United States)

    Szmukler-Moncler, S; Piattelli, A; Favero, G A; Dubruille, J H

    2000-02-01

    In oral implantology, a 3-6 month stress-free healing period is presently accepted as a prerequisite to achieve bone apposition without interposition of a fibrous scar tissue. This protocol was introduced by Brånemark and co-workers in 1977. The aim of the present paper is to review the reasons that led Brånemark and collaborators to require long delayed loading periods. It is shown that the requirement for long delayed loading periods was drawn from the initiation and development periods of their original clinical trial. Demanding conditions were met involving simultaneously: 1) patients with poor bone quality and quantity, 2) non-optimized implant design, 3) short implants, 4) non-optimized surgical placement, 5) non-optimized surgical protocol and 6) biomechanically non-optimized prosthesis. Extrapolation of the requirement for long healing periods from these particular conditions to more standard situations involving refined surgical protocols and careful patient selection might be questioned. Albeit premature loading has been interpreted as inducing fibrous tissue interposition, immediate loading per se is not responsible for fibrous encapsulation. It is the excess of micromotion during the healing phase that interferes with bone repair. A threshold of tolerated micromotion exists, that is somewhere between 50 microns and 150 microns. It is suggested that loading protocols might be shortened through 2 different approaches. The first way would be to decrease stepwise the delayed loading period for free-standing implants below the presently accepted 3-6 months of healing. The second way would be to identify immediate loading protocols that are capable of keeping the amount of micromotion beneath the threshold of deleterious micromotion. Immediate loading protocols for implants-retained overdentures and fixed bridges are reviewed. It is shown that successful premature loading protocols require a careful and strict patient selection aimed to achieve the best

  12. Blocking Optimality in Distributed Real-Time Locking Protocols

    Directory of Open Access Journals (Sweden)

    Björn Bernhard Brandenburg

    2014-09-01

    Full Text Available Lower and upper bounds on the maximum priority inversion blocking (pi-blocking that is generally unavoidable in distributed multiprocessor real-time locking protocols (where resources may be accessed only from specific synchronization processors are established. Prior work on suspension-based shared-memory multiprocessor locking protocols (which require resources to be accessible from all processors has established asymptotically tight bounds of Ω(m and Ω(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively, where m denotes the total number of processors and n denotes the number of tasks. In this paper, it is shown that, in the case of distributed semaphore protocols, there exist two different task allocation scenarios that give rise to distinct lower bounds. In the case of co-hosted task allocation, where application tasks may also be assigned to synchronization processors (i.e., processors hosting critical sections, Ω(Φ · n maximum pi-blocking is unavoidable for some tasks under any locking protocol under both suspension-aware and suspension-oblivious schedulability analysis, where Φ denotes the ratio of the maximum response time to the shortest period. In contrast, in the case of disjoint task allocation (i.e., if application tasks may not be assigned to synchronization processors, only Ω(m and Ω(n maximum pi-blocking is fundamentally unavoidable under suspension-oblivious and suspension-aware analysis, respectively, as in the shared-memory case. These bounds are shown to be asymptotically tight with the construction of two new distributed real-time locking protocols that ensure O(m and O(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively.

  13. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    Directory of Open Access Journals (Sweden)

    Jamal N. Al-Karaki

    2011-04-01

    Full Text Available The new characteristics of Wireless Multimedia Sensor Network (WMSN and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  14. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  15. An Individualized, Perception-Based Protocol to Investigate Human Physiological Responses to Cooling

    Science.gov (United States)

    Coolbaugh, Crystal L.; Bush, Emily C.; Galenti, Elizabeth S.; Welch, E. Brian; Towse, Theodore F.

    2018-01-01

    Cold exposure, a known stimulant of the thermogenic effects of brown adipose tissue (BAT), is the most widely used method to study BAT physiology in adult humans. Recently, individualized cooling has been recommended to standardize the physiological cold stress applied across participants, but critical experimental details remain unclear. The purpose of this work was to develop a detailed methodology for an individualized, perception-based protocol to investigate human physiological responses to cooling. Participants were wrapped in two water-circulating blankets and fitted with skin temperature probes to estimate BAT activity and peripheral vasoconstriction. We created a thermoesthesia graphical user interface (tGUI) to continuously record the subject's perception of cooling and shivering status during the cooling protocol. The protocol began with a 15 min thermoneutral phase followed by a series of 10 min cooling phases and concluded when sustained shivering (>1 min duration) occurred. Researchers used perception of cooling feedback (tGUI ratings) to manually adjust and personalize the water temperature at each cooling phase. Blanket water temperatures were recorded continuously during the protocol. Twelve volunteers (ages: 26.2 ± 1.4 years; 25% female) completed a feasibility study to evaluate the proposed protocol. Water temperature, perception of cooling, and shivering varied considerably across participants in response to cooling. Mean clavicle skin temperature, a surrogate measure of BAT activity, decreased (−0.99°C, 95% CI: −1.7 to −0.25°C, P = 0.16) after the cooling protocol, but an increase in supraclavicular skin temperature was observed in 4 participants. A strong positive correlation was also found between thermoesthesia and peripheral vasoconstriction (ρ = 0.84, P < 0.001). The proposed individualized, perception-based protocol therefore has potential to investigate the physiological responses to cold stress applied across populations with

  16. Phantom dark energy with varying-mass dark matter particles: Acceleration and cosmic coincidence problem

    International Nuclear Information System (INIS)

    Leon, Genly; Saridakis, Emmanuel N.

    2010-01-01

    We investigate several varying-mass dark matter particle models in the framework of phantom cosmology. We examine whether there exist late-time cosmological solutions, corresponding to an accelerating universe and possessing dark energy and dark matter densities of the same order. Imposing exponential or power-law potentials and exponential or power-law mass dependence, we conclude that the coincidence problem cannot be solved or even alleviated. Thus, if dark energy is attributed to the phantom paradigm, varying-mass dark matter models cannot fulfill the basic requirement that led to their construction.

  17. Block Empirical Likelihood for Longitudinal Single-Index Varying-Coefficient Model

    Directory of Open Access Journals (Sweden)

    Yunquan Song

    2013-01-01

    Full Text Available In this paper, we consider a single-index varying-coefficient model with application to longitudinal data. In order to accommodate the within-group correlation, we apply the block empirical likelihood procedure to longitudinal single-index varying-coefficient model, and prove a nonparametric version of Wilks’ theorem which can be used to construct the block empirical likelihood confidence region with asymptotically correct coverage probability for the parametric component. In comparison with normal approximations, the proposed method does not require a consistent estimator for the asymptotic covariance matrix, making it easier to conduct inference for the model's parametric component. Simulations demonstrate how the proposed method works.

  18. Robot training of upper limb in multiple sclerosis: comparing protocols with or without manipulative task components.

    Science.gov (United States)

    Carpinella, Ilaria; Cattaneo, Davide; Bertoni, Rita; Ferrarin, Maurizio

    2012-05-01

    In this pilot study, we compared two protocols for robot-based rehabilitation of upper limb in multiple sclerosis (MS): a protocol involving reaching tasks (RT) requiring arm transport only and a protocol requiring both objects' reaching and manipulation (RMT). Twenty-two MS subjects were assigned to RT or RMT group. Both protocols consisted of eight sessions. During RT training, subjects moved the handle of a planar robotic manipulandum toward circular targets displayed on a screen. RMT protocol required patients to reach and manipulate real objects, by moving the robotic arm equipped with a handle which left the hand free for distal tasks. In both trainings, the robot generated resistive and perturbing forces. Subjects were evaluated with clinical and instrumental tests. The results confirmed that MS patients maintained the ability to adapt to the robot-generated forces and that the rate of motor learning increased across sessions. Robot-therapy significantly reduced arm tremor and improved arm kinematics and functional ability. Compared to RT, RMT protocol induced a significantly larger improvement in movements involving grasp (improvement in Grasp ARAT sub-score: RMT 77.4%, RT 29.5%, p=0.035) but not precision grip. Future studies are needed to evaluate if longer trainings and the use of robotic handles would significantly improve also fine manipulation.

  19. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  20. On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations

    DEFF Research Database (Denmark)

    Cramer, Ronald; Damgård, Ivan Bjerre; Pastro, Valerio

    2011-01-01

    require the strong RSA assumption, we only need the assumption required by the commitment scheme itself, namely factoring. We generalize this to a protocol that verifies $l$ instances of an algebraic circuit $D$ over $K$ with $v$ inputs, in the following sense: given committed values $x_{i,j}$ and $z...

  1. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  2. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  3. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  4. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  5. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  6. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  7. Approximating the Qualitative Vickrey Auction by a Negotiation Protocol

    Science.gov (United States)

    Hindriks, Koen V.; Tykhonov, Dmytro; de Weerdt, Mathijs

    A result of Bulow and Klemperer has suggested that auctions may be a better tool to obtain an efficient outcome than negotiation. For example, some auction mechanisms can be shown to be efficient and strategy-proof. However, they generally also require that the preferences of at least one side of the auction are publicly known. However, sometimes it is very costly, impossible, or undesirable to publicly announce such preferences. It thus is interesting to find methods that do not impose this constraint but still approximate the outcome of the auction. In this paper we show that a multi-round multi-party negotiation protocol may be used to this end if the negotiating agents are capable of learning opponent preferences. The latter condition can be met by current state of the art negotiation technology. We show that this protocol approximates the theoretical outcome predicted by a so-called Qualitative Vickrey auction mechanism (even) on a complex multi-issue domain.

  8. Security Enhanced EMV-Based Mobile Payment Protocol

    Directory of Open Access Journals (Sweden)

    Ming-Hour Yang

    2014-01-01

    Full Text Available Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer’s credits for risk control, and users can have online-equivalent credits in offline transactions.

  9. Access Protocol For An Industrial Optical Fibre LAN

    Science.gov (United States)

    Senior, John M.; Walker, William M.; Ryley, Alan

    1987-09-01

    A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.

  10. Remote control of the industry processes. POWERLINK protocol application

    Science.gov (United States)

    Wóbel, A.; Paruzel, D.; Paszkiewicz, B.

    2017-08-01

    The present technological development enables the use of solutions characterized by a lower failure rate, and work with greater precision. This allows you to obtain the most efficient production, high speed production and reliability of individual components. The main scope of this article was POWERLINK protocol application for communication with the controller B & R through communication Ethernet for recording process parameters. This enables control of run production cycle using an internal network connected to the PC industry. Knowledge of the most important parameters of the production in real time allows detecting of a failure immediately after occurrence. For this purpose, the position of diagnostic use driver X20CP1301 B&R to record measurement data such as pressure, temperature valve between the parties and the torque required to change the valve setting was made. The use of POWERLINK protocol allows for the transmission of information on the status of every 200 μs.

  11. Data Crosscutting Requirements Review

    Energy Technology Data Exchange (ETDEWEB)

    Kleese van Dam, Kerstin [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Shoshani, Arie [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Plata, Charity [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2013-04-01

    In April 2013, a diverse group of researchers from the U.S. Department of Energy (DOE) scientific community assembled to assess data requirements associated with DOE-sponsored scientific facilities and large-scale experiments. Participants in the review included facilities staff, program managers, and scientific experts from the offices of Basic Energy Sciences, Biological and Environmental Research, High Energy Physics, and Advanced Scientific Computing Research. As part of the meeting, review participants discussed key issues associated with three distinct aspects of the data challenge: 1) processing, 2) management, and 3) analysis. These discussions identified commonalities and differences among the needs of varied scientific communities. They also helped to articulate gaps between current approaches and future needs, as well as the research advances that will be required to close these gaps. Moreover, the review provided a rare opportunity for experts from across the Office of Science to learn about their collective expertise, challenges, and opportunities. The "Data Crosscutting Requirements Review" generated specific findings and recommendations for addressing large-scale data crosscutting requirements.

  12. Robust Stabilization of Nonlinear Systems with Uncertain Varying Control Coefficient

    Directory of Open Access Journals (Sweden)

    Zaiyue Yang

    2014-01-01

    Full Text Available This paper investigates the stabilization problem for a class of nonlinear systems, whose control coefficient is uncertain and varies continuously in value and sign. The study emphasizes the development of a robust control that consists of a modified Nussbaum function to tackle the uncertain varying control coefficient. By such a method, the finite-time escape phenomenon has been prevented when the control coefficient is crossing zero and varying its sign. The proposed control guarantees the asymptotic stabilization of the system and boundedness of all closed-loop signals. The control performance is illustrated by a numerical simulation.

  13. Results of ERAS protocol in patients with colorectal cancer

    Directory of Open Access Journals (Sweden)

    A. O. Rasulov

    2016-01-01

    Full Text Available Objective: explore the use of enhanced recovery after surgery (ERAS in the treatment of patients with colorectal cancer, evaluate its efficacy and safety.Materials and methods. Prospective, single-site, randomized study for the implementation of enhanced recovery after surgery in patients with colorectal cancer has been conducted from October 2014 till the present time. All patients after laparoscopic surgeries undergo treatment according to ERAS protocol, patients after open surgeries are randomized (1:1 in groups of the standard treatment or treatment according to ERAS protocol. The study included patients with localized and locally disseminated colorectal cancer aged from 18 to 75 years, ECOG score ≤ 2. The primary evaluated parameters were the following: the number of postoperative complications (according to Clavien– Dindo classification, postoperative hospital days, incidence of complications and mortality in the 30-day period, timing of activation.Results. Up to date, the study includes 105 patients: laparoscopic group – 51 patients, open-surgery group of patients treated by ERAS protocol – 27 patients, open-surgery group of patients with the standard post-op treatment – 26 patients. Complications requiring emergency surgery for anastomotic leak (p = 0.159 developed in 3.7 % of patients with the standard post-op treatment and in 3.9 % of patients after laparoscopic surgery, while 1 patient required repeat hospitalization. The total number of complications was significantly lower in opensurgery group of patients treated by ERAS protocol compared with the standard post-op treatment (p = 0.021. However, there were no differences between laparoscopic and open-surgery group with the standard post-op treatment (p = 0.159. An average hospitalization stay in patients with the standard post-op treatment was equal to 10 days compared to 7 days in patients treated by ERAS protocol (p = 0.067 and 6 days after laparoscopic

  14. Comparison of Three Prehospital Cervical Spine Protocols for Missed Injuries

    Directory of Open Access Journals (Sweden)

    Rick Hong

    2014-07-01

    Full Text Available Introduction: We wanted to compare 3 existing emergency medical services (EMS immobilization protocols: the Prehospital Trauma Life Support (PHTLS, mechanism-based; the Domeier protocol (parallels the National Emergency X-Radiography Utilization Study [NEXUS] criteria; and the Hankins’ criteria (immobilization for patients 65 years, those with altered consciousness, focal neurologic deficit, distracting injury, or midline or paraspinal tenderness.To determine the proportion of patients who would require cervical immobilization per protocol and the number of missed cervical spine injuries, had each protocol been followed with 100% compliance. Methods: This was a cross-sectional study of patients ≥18 years transported by EMS post-traumatic mechanism to an inner city emergency department. Demographic and clinical/historical data obtained by physicians were recorded prior to radiologic imaging. Medical record review ascertained cervical spine injuries. Both physicians and EMS were blinded to the objective of the study. Results: Of 498 participants, 58% were male and mean age was 48 years. The following participants would have required cervical spine immobilization based on the respective protocol: PHTLS, 95.4% (95% CI: 93.1-96.9%; Domeier, 68.7% (95% CI: 64.5-72.6%; Hankins, 81.5% (95% CI: 77.9-84.7%. There were 18 cervical spine injuries: 12 vertebral fractures, 2 subluxations/dislocations and 4 spinal cord injuries. Compliance with each of the 3 protocols would have led to appropriate cervical spine immobilization of all injured patients. In practice, 2 injuries were missed when the PHTLS criteria were mis-applied. Conclusion: Although physician-determined presence of cervical spine immobilization criteria cannot be generalized to the findings obtained by EMS personnel, our findings suggest that the mechanism-based PHTLS criteria may result in unnecessary cervical spine immobilization without apparent benefit to injured patients. PHTLS

  15. Efficacy of protocols for induction of chronic hyperthyroidism in male and female mice.

    Science.gov (United States)

    Engels, Kathrin; Rakov, Helena; Zwanziger, Denise; Hönes, Georg Sebastian; Rehders, Maren; Brix, Klaudia; Köhrle, Josef; Möller, Lars Christian; Führer, Dagmar

    2016-10-01

    Protocols for induction of hyperthyroidism in mice are highly variable and mostly involve short-term thyroid hormone (TH) treatment. In addition, little is known about a possible influence of sex on experimental TH manipulation. Here we analyzed the efficacy of intraperitoneal vs. oral levothyroxine (T4) administration to induce chronic hyperthyroidism in male and female mice and asked which T4 dosing intervals are required to achieve stable organ thyrotoxicosis. T4 was administered intraperitoneally or orally over a period of 6/7 weeks. Assessment included monitoring of body weight, TH serum concentrations, and serial quantitative TH target gene expression analysis in liver and heart. Our results show that both intraperitoneal and oral T4 treatment are reliable methods for induction of chronic hyperthyroidism in mice. Thereby T4 injection intervals should not exceed 48 h and oral levothyroxine should be administered continuously during experiments and up to sacrifice to ensure a hyperthyroid organ state. Furthermore, we found a sex-dependent variation in levothyroxine-induced TH serum state, with significantly higher T4 concentrations in female mice, while expression of investigated classical TH responsive genes in liver and heart did not vary with animal's sex. In summary, our study shows that common approaches for rendering rodents thyrotoxic can also be used for induction of chronic hyperthyroidism in male and female mice. Thereby T4 dosing intervals are critical as are read-out parameters to verify a chronic thyrotoxic organ state.

  16. Evaluation of imaging protocol for ECT based on CS image reconstruction algorithm

    International Nuclear Information System (INIS)

    Zhou Xiaolin; Yun Mingkai; Cao Xuexiang; Liu Shuangquan; Wang Lu; Huang Xianchao; Wei Long

    2014-01-01

    Single-photon emission computerized tomography and positron emission tomography are essential medical imaging tools, for which the sampling angle number and scan time should be carefully chosen to give a good compromise between image quality and radiopharmaceutical dose. In this study, the image quality of different acquisition protocols was evaluated via varied angle number and count number per angle with Monte Carlo simulation data. It was shown that, when similar imaging counts were used, the factor of acquisition counts was more important than that of the sampling number in emission computerized tomography. To further reduce the activity requirement and the scan duration, an iterative image reconstruction algorithm for limited-view and low-dose tomography based on compressed sensing theory has been developed. The total variation regulation was added to the reconstruction process to improve the signal to noise Ratio and reduce artifacts caused by the limited angle sampling. Maximization of the maximum likelihood of the estimated image and the measured data and minimization of the total variation of the image are alternatively implemented. By using this advanced algorithm, the reconstruction process is able to achieve image quality matching or exceed that of normal scans with only half of the injection radiopharmaceutical dose. (authors)

  17. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  18. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  19. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  20. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  1. A security analysis of version 2 of the Network Time Protocol (NTP): A report to the privacy and security research group

    Science.gov (United States)

    Bishop, Matt

    1991-01-01

    The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate.

  2. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  3. A Guide to Writing a Qualitative Systematic Review Protocol to Enhance Evidence-Based Practice in Nursing and Health Care.

    Science.gov (United States)

    Butler, Ashleigh; Hall, Helen; Copnell, Beverley

    2016-06-01

    The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the

  4. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  5. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  6. Uus Eesti film pandi eile Karlovy Varys projektorisse / Kristiina Davidjants

    Index Scriptorium Estoniae

    Davidjants, Kristiina, 1974-

    2008-01-01

    8. juulil esilinastus Karlovy Vary filmifestivalil Rene Vilbre noortefilm "Mina olin siin", mille aluseks on Sass Henno romaan "Mina olin siin. Esimene arest". Film võistleb võistlusprogrammis "East of the West"

  7. Enhancement of heat transfer using varying width twisted tape inserts

    African Journals Online (AJOL)

    International Journal of Engineering, Science and Technology ... experimental investigations of the augmentation of turbulent flow heat transfer in a horizontal tube by means of varying width twisted tape inserts with air as the working fluid.

  8. Influence of feeding varying crude protein and digestible energy ...

    African Journals Online (AJOL)

    Influence of feeding varying crude protein and digestible energy levels on the development of individual muscles, rate of lean and fat deposition in pigs reared from 9 to 60kg liveweight in a humid tropical environment.

  9. Comparison of chest pain, electrocardiographic changes and thallium-201 scintigraphy during varying exercise intensities in men with stable angina pectoris

    International Nuclear Information System (INIS)

    Heller, G.V.; Ahmed, I.; Tilkemeier, P.L.; Barbour, M.M.; Garber, C.E.

    1991-01-01

    This study was performed to evaluate the presence of angina pectoris, electrocardiographic changes and reversible thallium-201 defects resulting from 2 different levels of exercise in 19 patients with known coronary artery disease and evidence of exercise-induced ischemia. The exercise protocols consisted of a symptom-limited incremental exercise test (Bruce protocol) followed within 3 to 14 days by a submaximal, steady-state exercise test performed at 70% of the maximal heart rate achieved during the Bruce protocol. The presence and time of onset of angina and electrocardiographic changes (greater than or equal to 0.1 mV ST-segment depression) as well as oxygen uptake, exercise duration and pressure-rate product were recorded. Thallium-201 (2.5 to 3.0 mCi) was injected during the last minute of exercise during both protocols, and the images were analyzed using both computer-assisted quantitation and visual interpretations. Incremental exercise resulted in anginal symptoms in 84% of patients, and electrocardiographic changes and reversible thallium-201 defects in all patients. In contrast, submaximal exercise produced anginal symptoms in only 26% (p less than 0.01) and electrocardiographic changes in only 47% (p less than 0.05), but resulted in thallium-201 defects in 89% of patients (p = not significant). The locations of the thallium-201 defects, when present, were not different between the 2 exercise protocols. These findings confirm the sequence of the ischemic cascade using 2 levels of exercise and demonstrate that the cascade theory is applicable during varying ischemic intensities in the same patient

  10. Do Time-Varying Covariances, Volatility Comovement and Spillover Matter?

    OpenAIRE

    Lakshmi Balasubramanyan

    2005-01-01

    Financial markets and their respective assets are so intertwined; analyzing any single market in isolation ignores important information. We investigate whether time varying volatility comovement and spillover impact the true variance-covariance matrix under a time-varying correlation set up. Statistically significant volatility spillover and comovement between US, UK and Japan is found. To demonstrate the importance of modelling volatility comovement and spillover, we look at a simple portfo...

  11. Performance of a solar chimney by varying design parameters

    CSIR Research Space (South Africa)

    Kumirai, T

    2015-08-01

    Full Text Available the design of solar chimneys to ensure optimal performance. The purpose of this chapter is to discuss the performance of an example solar chimney by varying the design parameters and examining their effects on the interior ventilation performance... chimney by varying design parameters Tichaona Kumirai, Researcher, Built Environment CSIR Jan-Hendrik Grobler, DPSS CSIR Dr D.C.U. Conradie, Senior researcher, Built Environment CSIR 1 Introduction Trombe walls and solar chimneys are not widely...

  12. Perturbation methods and the Melnikov functions for slowly varying oscillators

    International Nuclear Information System (INIS)

    Lakrad, Faouzi; Charafi, Moulay Mustapha

    2005-01-01

    A new approach to obtaining the Melnikov function for homoclinic orbits in slowly varying oscillators is proposed. The present method applies the Lindstedt-Poincare method to determine an approximation of homoclinic solutions. It is shown that the resultant Melnikov condition is the same as that obtained in the usual way involving distance functions in three dimensions by Wiggins and Holmes [Homoclinic orbits in slowly varying oscillators. SIAM J Math Anal 1987;18(3):612

  13. Marketingový mix HC Enegie Karlovy Vary

    OpenAIRE

    Štrobl, Adam

    2016-01-01

    Title: Marketing mix of HC Energie Karlovy Vary Objectives: This thesis is based on a questionnaire responses obtained from HC Energie Karlovy Vary fans. Its objective is focused on evaluation of their opinions on the marketing mix, their subsequent interpretation, and finally even development of recommendations for improvement based on previous analysis. Methods: Two methods are used to analyse the marketing mix. The first method is qualitative participant observation. The second method is a...

  14. Testing for time-varying loadings in dynamic factor models

    DEFF Research Database (Denmark)

    Mikkelsen, Jakob Guldbæk

    Abstract: In this paper we develop a test for time-varying factor loadings in factor models. The test is simple to compute and is constructed from estimated factors and residuals using the principal components estimator. The hypothesis is tested by regressing the squared residuals on the squared...... there is evidence of time-varying loadings on the risk factors underlying portfolio returns for around 80% of the portfolios....

  15. Bounds and asymptotics for orthogonal polynomials for varying weights

    CERN Document Server

    Levin, Eli

    2018-01-01

    This book establishes bounds and asymptotics under almost minimal conditions on the varying weights, and applies them to universality limits and entropy integrals.  Orthogonal polynomials associated with varying weights play a key role in analyzing random matrices and other topics.  This book will be of use to a wide community of mathematicians, physicists, and statisticians dealing with techniques of potential theory, orthogonal polynomials, approximation theory, as well as random matrices. .

  16. Pemodelan Markov Switching Dengan Time-varying Transition Probability

    OpenAIRE

    Savitri, Anggita Puri; Warsito, Budi; Rahmawati, Rita

    2016-01-01

    Exchange rate or currency is an economic variable which reflects country's state of economy. It fluctuates over time because of its ability to switch the condition or regime caused by economic and political factors. The changes in the exchange rate are depreciation and appreciation. Therefore, it could be modeled using Markov Switching with Time-Varying Transition Probability which observe the conditional changes and use information variable. From this model, time-varying transition probabili...

  17. Quantum capacity under adversarial quantum noise: arbitrarily varying quantum channels

    OpenAIRE

    Ahlswede, Rudolf; Bjelakovic, Igor; Boche, Holger; Noetzel, Janis

    2010-01-01

    We investigate entanglement transmission over an unknown channel in the presence of a third party (called the adversary), which is enabled to choose the channel from a given set of memoryless but non-stationary channels without informing the legitimate sender and receiver about the particular choice that he made. This channel model is called arbitrarily varying quantum channel (AVQC). We derive a quantum version of Ahlswede's dichotomy for classical arbitrarily varying channels. This includes...

  18. Comparison of Different Dosing Protocols of Anti-Snake Venom (ASV) in Snake Bite Cases.

    Science.gov (United States)

    Daswani, B R; Chandanwale, A S; Kadam, D B; Ghongane, B B; Ghorpade, V S; Manu, H C

    2017-09-01

    Considering the cost of Anti-Snake Venom (ASV) and irregularity in its supply, there is often a need to curtail doses of ASV, despite guidelines for management of snake bite. During June 2013 to September 2013, when ASV was in short supply, our institutional committee reviewed the overall hospital statistics of snake bite cases as well as scientific literature and formulated a working modified protocol that used low dose of ASV in snake bite cases. To retrospectively analyse and compare the modified ASV protocol versus conventional ASV protocol with respect to outcome, number of ASV vials required, duration of stay in the hospital/ ICU, and additional supportive interventions needed. This was a retrospective study conducted at a tertiary care teaching hospital, Maharashtra, India. Hospital records of inpatients admitted for snake bite during June 2013 to September 2013 (since introduction of the modified protocol) as well as during June 2012 to September 2012, (when patients received conventional protocol-historical controls) were retrospectively analysed to assess the number of ASV vials received by the patients during the stay, need for supportive therapy, duration of stay and outcome of the patients. There was a significant reduction in average number of ASV vials per patient, required vide the modified protocol compared to their historical controls (10.74±0.95 vs 28.17±2.75 pcost of management of each patient reduced by approximately 11974.41 INR per treated patient, based on the requirement of ASV. The modified ASV protocol used in this study is more cost effective as compared to the conventional protocol, deserves prospective evaluation and may be followed at least during prime time of scarcity of ASV.

  19. Development of transportation operations requirements

    International Nuclear Information System (INIS)

    Grady, S.T.; Best, R.E.; Danese, F.L.; Peterson, R.W.; Pope, R.B.

    1990-01-01

    Transport conditions at various utility sties vary dramatically in terms of characteristics at and near the site, requirements, administrative procedures, and other factors. Continuation of design efforts for the OCRWM transportation operations system requires that the operating requirements for the transportation system -- quantity of fuel per unit time per site -- be identified so that the effect the variations have on the system can be accommodated. The approach outlined in this paper provides for an identification of specific sites, evaluation of shipment capabilities at each site, and integration of the sites into multi-site shipping campaigns to scope the logistics management problem for the transportation operations system. 1 fig., 1 tab

  20. The effect of varying incubation times for hypotonic treatment of lymphocytes in dicentric assay technique

    International Nuclear Information System (INIS)

    Noraisyah Yusof; Noriah Jamal; Rahimah Abdul Rahim; Juliana Mahamad Napiah

    2010-01-01

    The International Atomic Energy Agency (IAEA) has recommended that incubation time for the hypotonic treatment of lymphocytes in dicentric assay technique to be between 15 to 20 minutes. Incubation time will effect the hypotonic treatment of lymphocytes and thus, the breakage of cytoplasmic membrane. The objective of this study is to examine the effect of varying incubation times for hypotonic treatment of lymphocytes in dicentric assay technique. In this study, we choose to use our standard protocol for dicentric assay technique. However, for the hypotonic treatment of lymphocytes, the incubation times were varied from 10, 15, 20, 25 and 30 minutes respectively. Lymphocytes were then fixed and stained with Giemsa. The cells were then analyzed for clear background that indicates good metaphases. We found that incubation time of 30 minutes gives the best metaphase images. This incubation time is longer than what has been recommended by the IAEA. This maybe explained by the fact that our country's climate is of higher humidity compared with the European countries. (author)