WorldWideScience

Sample records for rapid bioassessment protocol

  1. Use of Chironomidae (Diptera) Surface-Floating Pupal Exuviae as a Rapid Bioassessment Protocol for Water Bodies.

    Science.gov (United States)

    Kranzfelder, Petra; Anderson, Alyssa M; Egan, Alexander T; Mazack, Jane E; Bouchard, R William; Rufer, Moriya M; Ferrington, Leonard C

    2015-07-24

    Rapid bioassessment protocols using benthic macroinvertebrate assemblages have been successfully used to assess human impacts on water quality. Unfortunately, traditional benthic larval sampling methods, such as the dip-net, can be time-consuming and expensive. An alternative protocol involves collection of Chironomidae surface-floating pupal exuviae (SFPE). Chironomidae is a species-rich family of flies (Diptera) whose immature stages typically occur in aquatic habitats. Adult chironomids emerge from the water, leaving their pupal skins, or exuviae, floating on the water's surface. Exuviae often accumulate along banks or behind obstructions by action of the wind or water current, where they can be collected to assess chironomid diversity and richness. Chironomids can be used as important biological indicators, since some species are more tolerant to pollution than others. Therefore, the relative abundance and species composition of collected SFPE reflect changes in water quality. Here, methods associated with field collection, laboratory processing, slide mounting, and identification of chironomid SFPE are described in detail. Advantages of the SFPE method include minimal disturbance at a sampling area, efficient and economical sample collection and laboratory processing, ease of identification, applicability in nearly all aquatic environments, and a potentially more sensitive measure of ecosystem stress. Limitations include the inability to determine larval microhabitat use and inability to identify pupal exuviae to species if they have not been associated with adult males.

  2. Rapid Bioassessment Methods for Assessing Stream Macroinvertebrate Community on the Savannah River Site

    International Nuclear Information System (INIS)

    Specht, W.L.

    1999-01-01

    Macroinvertebrate sampling was performed at 16 locations in the Savannah River Site (SRS) streams using Hester-Dendy multiplate samplers and EPA Rapid Bioassessment Protocols (RBP). Some of the sampling locations were unimpacted, while other locations had been subject to various forms of perturbation by SRS activities. In general, the data from the Hester-Dendy multiplate samplers were more sensitive at detecting impacts than were the RBP data. We developed a Biotic Index for the Hester-Dendy data which incorporated eight community structure, function, and balance parameters. when tested using a data set that was unrelated to the data set that was used in developing the Biotic Index, the index was very successful at detecting impact

  3. Rapid Bioassessment Methods for Assessing Stream Macroinvertebrate Community on the Savannah River Site

    Energy Technology Data Exchange (ETDEWEB)

    Specht, W.L.

    1999-11-22

    Macroinvertebrate sampling was performed at 16 locations in the Savannah River Site (SRS) streams using Hester-Dendy multiplate samplers and EPA Rapid Bioassessment Protocols (RBP). Some of the sampling locations were unimpacted, while other locations had been subject to various forms of perturbation by SRS activities. In general, the data from the Hester-Dendy multiplate samplers were more sensitive at detecting impacts than were the RBP data. We developed a Biotic Index for the Hester-Dendy data which incorporated eight community structure, function, and balance parameters. when tested using a data set that was unrelated to the data set that was used in developing the Biotic Index, the index was very successful at detecting impact.

  4. Field evaluation of hazardous waste site bioassessment protocols

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, J.M.; Cline, J.F.; Cushing, C.E.; McShane, M.C.; Rogers, J.E.; Rogers, L.E.; Simpson, J.C.; Skalski, J.R.

    1983-04-01

    The goals were: (1) determine the variability (both within and between laboratories) for the various bioassay procedures using contaminated soil samples from the Rocky Mountain Arsenal (RMA); (2) assess variability within and between plots for several assessment techniques (for sampling small mammals, plants, insects including honeybees and microarthropods) so that field studies could be designed to detect a defined biotic change; (3) establish three field plant transects which are apparently (a) contaminated, (b) appear contaminated and (c) could serve as a control; (4) assess the feasibility (in the laboratory) of using Basin F water to contaminate RMA soil artificially, and to supply information for the design of a field plot study in 1983; (5) attempt to obtain preliminary data on any promising field or laboratory bioassessment techniques not currently mentioned in the statement of work; and (6) obtain field data to assess the ecological status of RMA lakes and compare these observations to results from bioassessment testing.

  5. Ship Creek bioassessment investigations

    Energy Technology Data Exchange (ETDEWEB)

    Cushing, C.E.; Mueller, R.P.; Murphy, M.T.

    1995-06-01

    Pacific Northwest Laboratory (PNL) was asked by Elmendorf Air Force Base (EAFB) personnel to conduct a series of collections of macroinvertebrates and sediments from Ship Creek to (1) establish baseline data on these populations for reference in evaluating possible impacts from Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) activities at two operable units, (2) compare current population indices with those found by previous investigations in Ship Creek, and (3) determine baseline levels of concentrations of any contaminants in the sediments associated with the macroinvertebrates. A specific suite of indices established by the US Environmental Protection Agency (EPA) was requested for the macroinvertebrate analyses; these follow the Rapid Bioassessment Protocol developed by Plafkin et al. (1989) and will be described. Sediment sample analyses included a Microtox bioassay and chemical analysis for contaminants of concern. These analyses included, volatile organic compounds, total gasoline and diesel hydrocarbons (EPA method 8015, CA modified), total organic carbon, and an inductive-coupled plasma/mass spectrometry (ICP/MS) metals scan. Appendix A reports on the sediment analyses. The Work Plan is attached as Appendix B.

  6. BioData: a national aquatic bioassessment database

    Science.gov (United States)

    MacCoy, Dorene

    2011-01-01

    -retrieval web site provides access to bioassessment data. BioData currently accepts data collected using two national protocols: (1) NAWQA and (2) U.S. Environmental Protection Agency (USEPA) National Rivers and Streams Assessment (NRSA). Additional collection protocols are planned for future versions.

  7. Bioassessment of the ecological integrity of river ecosystems using ...

    African Journals Online (AJOL)

    Bioassessment of the ecological integrity of river ecosystems using aquatic macroinvertebrates: an overview with a focus on South Africa. ... In conclusion, a number of potential avenues for further research regarding the use of macroinvertebrates in the bioassessment of river ecosystems are identified. Keywords: benthic ...

  8. Use of traits-based bioassessment approaches in biomonitoring and ecological risk assessment

    NARCIS (Netherlands)

    Brink, van den P.J.; Alexander, A.; Desrosiers, M.; Goedkoop, W.; Goethals, P.L.M.; Liess, M.; Dyer, S.

    2011-01-01

    We discuss the application of traits-based bioassessment approaches in retrospective bioassessment as well as in prospective ecological risk assessments in regulatory frameworks. Both approaches address the interaction between species and stressors and their consequences at different levels of

  9. Influence of selected biotopes on chironomid-based bioassessment ...

    African Journals Online (AJOL)

    ... three distinct biotopes, i.e., stones, vegetation and sediments. In this study, the influence of reducing the numbers of biotopes on chironomid-based bioassessment of pollution in the Swartkops River was investigated. This paper addresses the following questions: (i) can the chironomid species assemblage from any single ...

  10. Comparing two periphyton collection methods commonly used for stream bioassessment and the development of numeric nutrient standards.

    Science.gov (United States)

    Rodman, Ashley R; Scott, J Thad

    2017-07-01

    Periphyton is an important component of stream bioassessment, yet methods for quantifying periphyton biomass can differ substantially. A case study within the Arkansas Ozarks is presented to demonstrate the potential for linking chlorophyll-a (chl-a) and ash-free dry mass (AFDM) data sets amassed using two frequently used periphyton sampling protocols. Method A involved collecting periphyton from a known area on the top surface of variably sized rocks gathered from relatively swift-velocity riffles without discerning canopy cover. Method B involved collecting periphyton from the entire top surface of cobbles systematically gathered from riffle-run habitat where canopy cover was intentionally avoided. Chl-a and AFDM measurements were not different between methods (p = 0.123 and p = 0.550, respectively), and there was no interaction between method and time in the repeated measures structure of the study. However, significantly different seasonal distinctions were observed for chl-a and AFDM from all streams when data from the methods were combined (p methods may effectively be used together with some minor considerations due to potential confounding factors. This study provides motivation for the continued investigation of combining data sets derived from multiple methods of data collection, which could be useful in stream bioassessment and particularly important for the development of regional stream nutrient criteria for the southern Ozarks.

  11. The Namibian Scoring System (NASS) version 2 rapid bio ...

    African Journals Online (AJOL)

    This paper presents a rapid bio-assessment method for assessing the ... The method uses the composition and abundance of aquatic invertebrates, which are ... Training of Namibian personnel to apply the method, as part of the National ...

  12. Application of Some Biometric Indices in the Assessment of the ...

    African Journals Online (AJOL)

    Application of Some Biometric Indices in the Assessment of the Water Quality of the Benin River, Niger Delta, Nigeria. ... Username, Password, Remember me, or Register ... Rapid Bioassessment Protocols (RBP) using some biometric indices ...

  13. Biological Assessment of Streams Associated with the Northern Training Complex at Fort knox, Kentucky, August 2000

    National Research Council Canada - National Science Library

    Payne, Berry

    2001-01-01

    .... The benthic macroinvertebrate aspect of the U.S. Environmental Protection Agency's Rapid Bioassessment Protocol was applied in August 2000 to selected streams likely to be affected by proposed improvements of training facilities on Fort Knox...

  14. Use of multiple functional traits of protozoa for bioassessment of marine pollution.

    Science.gov (United States)

    Zhong, Xiaoxiao; Xu, Guangjian; Xu, Henglong

    2017-06-30

    Ecological parameters based on multiply functional traits have many advantages for monitoring programs by reducing "signal to noise" ratios of observed species data. To identify potential indicators for bioassessment of marine pollution in function space, the functional patterns of protozoan communities and relationships with environmental changes were studied in coastal waters of the Yellow Sea during a 1-year period. The results showed that: (1) the spatial variability in functional trait distributions of the protozoa was significantly associated with changes in environmental variables, especially chemical oxygen demand (COD) and nutrients on spatial scale; (2) the functional traits, especially food resources and feeding type, were significantly correlated with COD and nutrients; and (3) the functional diversity indices were generally related to nutrients or COD. Based on the results, we suggest that the functional traits and diversity indices of protozoan communities may be used as more effective indicators for bioassessment of marine pollution. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Bio-assessment of water pollution in coal belt

    International Nuclear Information System (INIS)

    Mishra, P.K.

    1998-01-01

    Water pollution in coal belt has attracted attention of scientists as well as general people. Implication of water pollution on bio-system is still a more important issue and a lot of information has been accumulated. Apart from conventional methods of pollution monitoring, bio-monitoring is comparatively a new approach and a proper methodology is still in pipeline. The present study reviews various methods of bio-monitoring and compare various methodologies suggested at population level with conventional methods. The results indicated that the bio-assessment methodology can be a tool and hence be developed. (author)

  16. Bioassessment of a Drinking Water Reservoir Using Plankton: High Throughput Sequencing vs. Traditional Morphological Method

    Directory of Open Access Journals (Sweden)

    Wanli Gao

    2018-01-01

    Full Text Available Drinking water safety is increasingly perceived as one of the top global environmental issues. Plankton has been commonly used as a bioindicator for water quality in lakes and reservoirs. Recently, DNA sequencing technology has been applied to bioassessment. In this study, we compared the effectiveness of the 16S and 18S rRNA high throughput sequencing method (HTS and the traditional optical microscopy method (TOM in the bioassessment of drinking water quality. Five stations reflecting different habitats and hydrological conditions in Danjiangkou Reservoir, one of the largest drinking water reservoirs in Asia, were sampled May 2016. Non-metric multi-dimensional scaling (NMDS analysis showed that plankton assemblages varied among the stations and the spatial patterns revealed by the two methods were consistent. The correlation between TOM and HTS in a symmetric Procrustes analysis was 0.61, revealing overall good concordance between the two methods. Procrustes analysis also showed that site-specific differences between the two methods varied among the stations. Station Heijizui (H, a site heavily influenced by two tributaries, had the largest difference while station Qushou (Q, a confluence site close to the outlet dam, had the smallest difference between the two methods. Our results show that DNA sequencing has the potential to provide consistent identification of taxa, and reliable bioassessment in a long-term biomonitoring and assessment program for drinking water reservoirs.

  17. Coral Reef Biological Criteria: Using Clean Water Act to Protect a National Treasure

    Science.gov (United States)

    A collaborative Environmental Protection Agency effort is underway to elucidate the technical aspects of coral reef biocriteria implementation. A stony coral rapid bioassessment protocol has been introduced and applied in the Florida Keys and U.S. Virgin Islands, where several in...

  18. Evaluation of alternative macroinvertebrate sampling techniques for use in a new tropical freshwater bioassessment scheme

    Directory of Open Access Journals (Sweden)

    Isabel Eleanor Moore

    2015-06-01

    Full Text Available Aim: The study aimed to determine the effectiveness of benthic macroinvertebrate dredge net sampling procedures as an alternative method to kick net sampling in tropical freshwater systems, specifically as an evaluation of sampling methods used in the Zambian Invertebrate Scoring System (ZISS river bioassessment scheme. Tropical freshwater ecosystems are sometimes dangerous or inaccessible to sampling teams using traditional kick-sampling methods, so identifying an alternative procedure that produces similar results is necessary in order to collect data from a wide variety of habitats.MethodsBoth kick and dredge nets were used to collect macroinvertebrate samples at 16 riverine sites in Zambia, ranging from backwaters and floodplain lagoons to fast flowing streams and rivers. The data were used to calculate ZISS, diversity (S: number of taxa present, and Average Score Per Taxon (ASPT scores per site, using the two sampling methods to compare their sampling effectiveness. Environmental parameters, namely pH, conductivity, underwater photosynthetically active radiation (PAR, temperature, alkalinity, flow, and altitude, were also recorded and used in statistical analysis. Invertebrate communities present at the sample sites were determined using multivariate procedures.ResultsAnalysis of the invertebrate community and environmental data suggested that the testing exercise was undertaken in four distinct macroinvertebrate community types, supporting at least two quite different macroinvertebrate assemblages, and showing significant differences in habitat conditions. Significant correlations were found for all three bioassessment score variables between results acquired using the two methods, with dredge-sampling normally producing lower scores than did the kick net procedures. Linear regression models were produced in order to correct each biological variable score collected by a dredge net to a score similar to that of one collected by kick net

  19. 76 FR 20974 - Implications of Climate Change for Bioassessment Programs and Approaches To Account for Effects

    Science.gov (United States)

    2011-04-14

    ... resource management to determine the ecological consequences of environmental stressors. All states utilize... environmental factors. We found that climatically vulnerable components of bioassessment programs include... reference condition). Implementation (e.g., data collection and analysis). Environmental management (e.g...

  20. Integrating DNA-based data into bioassessments improves our understanding of species distributions and species habitat relationships

    Science.gov (United States)

    The integration of DNA-based identification methods into bioassessments could result in more accurate representations of species distributions and species-habitat relationships. DNA-based approaches may be particularly informative for tracking the distributions of rare and/or inv...

  1. Implementing Rapid Bioassessment Protocols (RBP’s) for Watershed Monitoring

    Science.gov (United States)

    2010-08-01

    indicate greater stream quality. ............................... 16 Figure 7. Percent EPT (Ephemeroptera, Plecoptera , and Trichoptera) within sampled...greater stream quality. Figure 7. Percent EPT (Ephemeroptera, Plecoptera , and Trichoptera) within sampled basins at Fort Benning, 2002-2005; greater

  2. Comparative analysis of selected hydromorphological assessment methods

    Czech Academy of Sciences Publication Activity Database

    Šípek, Václav; Matoušková, M.; Dvořák, M.

    2010-01-01

    Roč. 169, 1-4 (2010), s. 309-319 ISSN 0167-6369 Institutional support: RVO:67985874 Keywords : Hydromorphology * Ecohydromorphological river habitat assessment: EcoRivHab * Rapid Bioassessment Protocol * LAWA Field and Overview Survey * Libechovka River * Bilina River * Czech Republic Subject RIV: DA - Hydrology ; Limnology Impact factor: 1.436, year: 2010

  3. USING ANT COMMUNITIES FOR RAPID ASSESSMENT OF TERRESTRIAL ECOSYSTEM HEALTH

    Energy Technology Data Exchange (ETDEWEB)

    Wike, L; Doug Martin, D; Michael Paller, M; Eric Nelson, E

    2007-01-12

    Ecosystem health with its near infinite number of variables is difficult to measure, and there are many opinions as to which variables are most important, most easily measured, and most robust, Bioassessment avoids the controversy of choosing which physical and chemical parameters to measure because it uses responses of a community of organisms that integrate all aspects of the system in question. A variety of bioassessment methods have been successfully applied to aquatic ecosystems using fish and macroinvertebrate communities. Terrestrial biotic index methods are less developed than those for aquatic systems and we are seeking to address this problem here. This study had as its objective to examine the baseline differences in ant communities at different seral stages from clear cut back to mature pine plantation as a precursor to developing a bioassessment protocol. Comparative sampling was conducted at four seral stages; clearcut, 5 year, 15 year and mature pine plantation stands. Soil and vegetation data were collected at each site. All ants collected were preserved in 70% ethyl alcohol and identified to genus. Analysis of the ant data indicates that ants respond strongly to the habitat changes that accompany ecological succession in managed pine forests and that individual genera as well as ant community structure can be used as an indicator of successional change. Ants exhibited relatively high diversity in both early and mature seral stages. High ant diversity in the mature seral stages was likely related to conditions on the forest floor which favored litter dwelling and cool climate specialists.

  4. Evaluation of alternative macroinvertebrate sampling techniques for use in a new tropical freshwater bioassessment scheme

    OpenAIRE

    Isabel Eleanor Moore; Kevin Joseph Murphy

    2015-01-01

    Aim: The study aimed to determine the effectiveness of benthic macroinvertebrate dredge net sampling procedures as an alternative method to kick net sampling in tropical freshwater systems, specifically as an evaluation of sampling methods used in the Zambian Invertebrate Scoring System (ZISS) river bioassessment scheme. Tropical freshwater ecosystems are sometimes dangerous or inaccessible to sampling teams using traditional kick-sampling methods, so identifying an alternative procedure that...

  5. The RAPID protocol enhances patient recovery after both laparoscopic and open colorectal resections.

    LENUS (Irish Health Repository)

    Lloyd, G M

    2010-06-01

    Enhanced recovery after surgery (ERAS) programs can accelerate recovery and shorten the hospital stay after colorectal resections. The RAPID (remove, ambulate, postoperative analgesia, introduce diet) protocol is a simplified ERAS program that consists of a simplified, user-friendly single-page pro forma schedule. This study aimed to evaluate the impact of the RAPID protocol on patients undergoing both laparoscopic and open colorectal resections in two specialized colorectal units.

  6. A SAFE PROTOCOL FOR RAPID DESENSITIZATION IN PATIENTS WITH CYSTIC FIBROSIS AND ANTIBIOTIC HYPERSENSITIVITY

    Science.gov (United States)

    Legere, Henry J.; Palis, Ross I.; Bouza, Tito Rodriguez; Uluer, Ahmet Z.; Castells, Mariana C.

    2009-01-01

    Background CF patients often demonstrate hypersensitivity to one or multiple antibiotics due to frequent and repeated exposures. Attempts at antibiotic desensitization in this population are historically complicated by higher reaction rates, failure to complete the procedure and consequent withholding of first-line therapy. This study evaluates the outcomes of a rapid desensitization protocol developed at our institution. Methods We retrospectively reviewed the medical records of 15 patients undergoing 52 rapid antibiotic desensitizations at Brigham and Women’s Hospital and Children’s Hospital Boston utilizing our protocol. Results Mean FEV1 % predicted was 44.1 (SD 16.5), with two patients at desensitized during bilateral lung transplantation. Adverse reactions during desensitization occurred in 13.4%, and most were mild. 100% of patients completed the protocol and ultimately tolerated subsequent full-strength antibiotic courses. Conclusions CF patients with antibiotic hypersensitivity can safely receive first-line antibiotics via our rapid desensitization protocol, including those with severe obstructive lung disease. PMID:19740711

  7. Implementation of a rapid chest pain protocol in the emergency department: A quality improvement project.

    Science.gov (United States)

    Bunch, Azalea Marie; Leasure, A Renee; Carithers, Cathrin; Burnette, Robert E; Berryman, Michael Scott

    2016-02-01

    The purpose of this quality improvement (QI) project is to compare the effectiveness of a rapid 90-min chest pain screening and evaluation protocol to a 120-min screening and evaluation protocol in determining patient readiness for hospital admission or discharge home. The existing chest pain protocol utilized in the emergency department (ED) was revised based on a review of current research changing initial screening and reevaluation times from 120 to 90 min. A prospective comparative study of patients presenting to the ED with chest pain was performed comparing the existing chest pain protocol of 120 min (standard care) with a rapid screening evaluation protocol of 90 min. A total of 128 patients presenting to an ED in Texas with chest pain comprised the sample for this study. There was a significant difference in the number of minutes between the groups for readiness for disposition. The average time from chest pain evaluation to readiness for disposition home, observation, or admission decreased from an average of 191 min in the standard care group to an average of 118 min in the rapid screening group. Use of the rapid screening and evaluation protocol decreased the time to disposition by an average of 73 min, which enhanced ED flow without influencing disposition and patient safety. ©2015 American Association of Nurse Practitioners.

  8. Effectiveness of a Rapid Lumbar Spine MRI Protocol Using 3D T2-Weighted SPACE Imaging Versus a Standard Protocol for Evaluation of Degenerative Changes of the Lumbar Spine.

    Science.gov (United States)

    Sayah, Anousheh; Jay, Ann K; Toaff, Jacob S; Makariou, Erini V; Berkowitz, Frank

    2016-09-01

    Reducing lumbar spine MRI scanning time while retaining diagnostic accuracy can benefit patients and reduce health care costs. This study compares the effectiveness of a rapid lumbar MRI protocol using 3D T2-weighted sampling perfection with application-optimized contrast with different flip-angle evolutions (SPACE) sequences with a standard MRI protocol for evaluation of lumbar spondylosis. Two hundred fifty consecutive unenhanced lumbar MRI examinations performed at 1.5 T were retrospectively reviewed. Full, rapid, and complete versions of each examination were interpreted for spondylotic changes at each lumbar level, including herniations and neural compromise. The full examination consisted of sagittal T1-weighted, T2-weighted turbo spin-echo (TSE), and STIR sequences; and axial T1- and T2-weighted TSE sequences (time, 18 minutes 40 seconds). The rapid examination consisted of sagittal T1- and T2-weighted SPACE sequences, with axial SPACE reformations (time, 8 minutes 46 seconds). The complete examination consisted of the full examination plus the T2-weighted SPACE sequence. Sensitivities and specificities of the full and rapid examinations were calculated using the complete study as the reference standard. The rapid and full studies had sensitivities of 76.0% and 69.3%, with specificities of 97.2% and 97.9%, respectively, for all degenerative processes. Rapid and full sensitivities were 68.7% and 66.3% for disk herniation, 85.2% and 81.5% for canal compromise, 82.9% and 69.1% for lateral recess compromise, and 76.9% and 69.7% for foraminal compromise, respectively. Isotropic SPACE T2-weighted imaging provides high-quality imaging of lumbar spondylosis, with multiplanar reformatting capability. Our SPACE-based rapid protocol had sensitivities and specificities for herniations and neural compromise comparable to those of the protocol without SPACE. This protocol fits within a 15-minute slot, potentially reducing costs and discomfort for a large subgroup of

  9. A rapid infusion protocol is safe for total dose iron polymaltose: time for change.

    Science.gov (United States)

    Garg, M; Morrison, G; Friedman, A; Lau, A; Lau, D; Gibson, P R

    2011-07-01

    Intravenous correction of iron deficiency by total dose iron polymaltose is inexpensive and safe, but current protocols entail prolonged administration over more than 4 h. This results in reduced patient acceptance, and hospital resource strain. We aimed to assess prospectively the safety of a rapid intravenous protocol and compare this with historical controls. Consecutive patients in whom intravenous iron replacement was indicated were invited to have up to 1.5 g iron polymaltose by a 58-min infusion protocol after an initial 15-min test dose without pre-medication. Infusion-related adverse events (AE) and delayed AE over the ensuing 5 days were also prospectively documented and graded as mild, moderate or severe. One hundred patients, 63 female, mean age 54 (range 18-85) years were studied. Thirty-four infusion-related AE to iron polymaltose occurred in a total of 24 patients--25 mild, 8 moderate and 1 severe; higher than previously reported for a slow protocol iron infusion. Thirty-one delayed AE occurred in 26 patients--26 mild, 3 moderate and 2 severe; similar to previously reported. All but five patients reported they would prefer iron replacement through the rapid protocol again. The presence of inflammatory bowel disease (IBD) predicted infusion-related reactions (54% vs 14% without IBD, P cost, resource utilization and time benefits for the patient and hospital system. © 2011 The Authors. Internal Medicine Journal © 2011 Royal Australasian College of Physicians.

  10. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    Directory of Open Access Journals (Sweden)

    de Courten Maximilian

    2006-02-01

    Full Text Available Abstract Background In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol for the gathering of other data through site visits, discussions, and document reviews. Methods The Rapid Assessment Protocol for Insulin Access draws on the principles of Rapid Assessment Protocols which have been developed and implemented in several different areas. This protocol was adapted through a thorough literature review on diabetes, chronic condition management and medicine supply in developing countries. A visit to three countries in sub-Saharan Africa and meetings with different experts in the field of diabetes helped refine the questionnaires. Following the development of the questionnaires these were tested with various people familiar with diabetes and/or healthcare in developing countries. The Protocol was piloted in Mozambique then refined and had two further iterations in Zambia and Mali. Translations of questionnaires were made into local languages when necessary, with back translation to ensure precision. Results In each country the protocol was implemented in 3 areas – the capital city, a large urban centre and a predominantly rural area and their respective surroundings. Interviews were carried out by local teams trained on how to use the tool. Data was then collected and entered into a database for analysis. Conclusion The Rapid Assessment Protocol for Insulin Access was developed to provide a situational analysis of Type 1 diabetes, in order to make recommendations to the national Ministries of Health and Diabetes Associations. It provided valuable information on patients' access to insulin, syringes, monitoring and care. It was thus able to sketch a picture of the health care system with regards to its ability to

  11. The Value of the Freshwater Snail Dip Scoop Sampling Method in Macroinvertebrates Bioassessment of Sugar Mill Wastewater Pollution in Mbandjock, Cameroon

    Directory of Open Access Journals (Sweden)

    Emmanuel Noumi

    2008-03-01

    Full Text Available Macroinvertebrates identification and enumeration may be used as a simple and affordable alternative to chemical analysis in water pollution monitoring. However, the ecological responses of various taxa to pollution are poorly known in resources-limited tropical countries. While freshwater macroinvertebrates have been used in the assessment of water quality in Europe and the Americas, investigations in Africa have mainly focused on snail hosts of human parasites. There is a need for sampling methods that can be used to assess both snails and other macroinvertebrates. The present study was designed to evaluate the usefulness of the freshwater snail dip scoop method in the study of macroinvertebrates for the assessment of the SOSUCAM sugar mill effluents pollution. Standard snail dip scoop samples were collected upstream and downstream of the factory effluent inputs, on the Mokona and Mengoala rivers. The analysis of the macroinvertebrate communities revealed the absence of Ephemeroptera and Trichoptera, and the thriving of Syrphidae in the sections of the rivers under high effluent load. The Shannon and Weaver diversity index was lower in these areas. The dip scoop sampling protocol was found to be a useful method for macroinvertebrates collection. Hence, this method is recommended as a simple, cost-effective and efficient tool for the bio-assessment of freshwater pollution in developing countries with limited research resources.

  12. A Rapid and Efficient Sonogashira Protocol and Improved Synthesis of Free Fatty Acid 1 (FFA1) Receptor Agonists

    DEFF Research Database (Denmark)

    Christiansen, Elisabeth; Due-Hansen, Maria E; Ulven, Trond

    2010-01-01

    A protocol for rapid and efficient Pd/Cu-catalyzed coupling of aryl bromides and iodides to terminal alkynes has been developed with use of 2-(di-tert-butylphosphino)-N-phenylindole (cataCXium PIntB) as ligand in TMEDA and water. The new protocol successfully couples substrates which failed...

  13. Sinusoidal voltage protocols for rapid characterisation of ion channel kinetics.

    Science.gov (United States)

    Beattie, Kylie A; Hill, Adam P; Bardenet, Rémi; Cui, Yi; Vandenberg, Jamie I; Gavaghan, David J; de Boer, Teun P; Mirams, Gary R

    2018-03-24

    Ion current kinetics are commonly represented by current-voltage relationships, time constant-voltage relationships and subsequently mathematical models fitted to these. These experiments take substantial time, which means they are rarely performed in the same cell. Rather than traditional square-wave voltage clamps, we fitted a model to the current evoked by a novel sum-of-sinusoids voltage clamp that was only 8 s long. Short protocols that can be performed multiple times within a single cell will offer many new opportunities to measure how ion current kinetics are affected by changing conditions. The new model predicts the current under traditional square-wave protocols well, with better predictions of underlying currents than literature models. The current under a novel physiologically relevant series of action potential clamps is predicted extremely well. The short sinusoidal protocols allow a model to be fully fitted to individual cells, allowing us to examine cell-cell variability in current kinetics for the first time. Understanding the roles of ion currents is crucial to predict the action of pharmaceuticals and mutations in different scenarios, and thereby to guide clinical interventions in the heart, brain and other electrophysiological systems. Our ability to predict how ion currents contribute to cellular electrophysiology is in turn critically dependent on our characterisation of ion channel kinetics - the voltage-dependent rates of transition between open, closed and inactivated channel states. We present a new method for rapidly exploring and characterising ion channel kinetics, applying it to the hERG potassium channel as an example, with the aim of generating a quantitatively predictive representation of the ion current. We fitted a mathematical model to currents evoked by a novel 8 second sinusoidal voltage clamp in CHO cells overexpressing hERG1a. The model was then used to predict over 5 minutes of recordings in the same cell in response to

  14. Bioassessment in nonperennial streams: Hydrologic stability influences assessment validity

    Science.gov (United States)

    Mazor, R. D.; Stein, E. D.; Schiff, K.; Ode, P.; Rehn, A.

    2011-12-01

    Nonperennial streams pose a challenge for bioassessment, as assessment tools developed in perennial streams may not work in these systems. For example, indices of biotic integrity (IBIs) developed in perennial streams may give improper indications of impairment in nonperennial streams, or may be unstable. We sampled benthic macroinvertebrates from 12 nonperennial streams in southern California. In addition, we deployed loggers to obtain continuous measures of flow. 3 sites were revisited over 2 years. For each site, we calculated several metrics, IBIs, and O/E scores to determine if assessments were consistent and valid throughout the summer. Hydrology varied widely among the streams, with several streams drying between sampling events. IBIs suggested good ecological health at the beginning of the study, but declined sharply at some sites. Multivariate ordination suggested that, despite differences among sites, changes in community structure were similar, with shifts from Ephemeroptera, Plecoptera, and Trichoptera to Coleoptera and more tolerant organisms. Site revisits revealed a surprising level of variability, as 2 of the 3 revisited sites had perennial or near-perennial flow in the second year of sampling. IBI scores were more consistent in streams with stable hydrographs than in those with strongly intermittent hydrographs. These results suggest that nonperennial streams can be monitored successfully, but they may require short index periods and distinct metrics from those used in perennial streams. In addition, better approaches to mapping nonperennial streams are required.

  15. Outcomes of a rapid refeeding protocol in Adolescent Anorexia Nervosa.

    Science.gov (United States)

    Madden, Sloane; Miskovic-Wheatley, Jane; Clarke, Simon; Touyz, Stephen; Hay, Phillipa; Kohn, Michael R

    2015-01-01

    The impact of severe malnutrition and medical instability in adolescent Anorexia Nervosa (AN) on immediate health and long-term development underscores the need for safe and efficient methods of refeeding. Current refeeding guidelines in AN advocate low initial caloric intake with slow increases in energy intake to avoid refeeding syndrome. This study demonstrates the potential for more rapid refeeding to promote initial weight recovery and correct medical instability in adolescent AN. Seventy-eight adolescents with AN (12-18 years), hospitalised in two specialist paediatric eating disorder units, for medical instability (bradycardia, hypotension, hypothermia, orthostatic instability and/or cardiac arrhythmia) were followed during a 2.5 week admission. Patients were refed using a standardised protocol commencing with 24-72 hours of continuous nasogastric feeds (ceased with daytime medical stability) and routine oral phosphate supplementation, followed by nocturnal feeds and a meal plan of 1200-2400 kcal/day aiming for a total caloric intake of 2400-3000 kcal/day. Along with indicators of medical stability, weight, phosphate and glucose levels were recorded. All patients gained weight in week one (M = 2.79 kg, SD = 1.27 kg) and at subsequent measurement points with an average gain of 5.12 kg (SD = 2.96) at 2.5 weeks. No patient developed hypophosphatemia, hypoglycaemia, or stigmata of the refeeding syndrome. The refeeding protocol resulted in immediate weight gain and was well tolerated with no indicators of refeeding syndrome. There were no significant differences in outcomes between the treatment sites, suggesting the protocol is replicable. Australian Clinical Trials Register number: ACTRN012607000009415.

  16. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    DEFF Research Database (Denmark)

    Beran, David; Yudkin, John S; de Courten, Maximilian

    2006-01-01

    In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol...... for the gathering of other data through site visits, discussions, and document reviews....

  17. A rapid and efficient DNA extraction protocol from fresh and frozen human blood samples.

    Science.gov (United States)

    Guha, Pokhraj; Das, Avishek; Dutta, Somit; Chaudhuri, Tapas Kumar

    2018-01-01

    Different methods available for extraction of human genomic DNA suffer from one or more drawbacks including low yield, compromised quality, cost, time consumption, use of toxic organic solvents, and many more. Herein, we aimed to develop a method to extract DNA from 500 μL of fresh or frozen human blood. Five hundred microliters of fresh and frozen human blood samples were used for standardization of the extraction procedure. Absorbance at 260 and 280 nm, respectively, (A 260 /A 280 ) were estimated to check the quality and quantity of the extracted DNA sample. Qualitative assessment of the extracted DNA was checked by Polymerase Chain reaction and double digestion of the DNA sample. Our protocol resulted in average yield of 22±2.97 μg and 20.5±3.97 μg from 500 μL of fresh and frozen blood, respectively, which were comparable to many reference protocols and kits. Besides yielding bulk amount of DNA, our protocol is rapid, economical, and avoids toxic organic solvents such as Phenol. Due to unaffected quality, the DNA is suitable for downstream applications. The protocol may also be useful for pursuing basic molecular researches in laboratories having limited funds. © 2017 Wiley Periodicals, Inc.

  18. The Resin-Embedded Cornea Prepared Via Rapid Processing Protocol : A Good Histomorphometric Target for Clinical Investigation in Ophthalmology and Optometry

    Science.gov (United States)

    Cheah, Pike See; Mohidin, Norhani; Mohd Ali, Bariah; Maung, Myint; Latif, Azian Abdul

    2008-01-01

    This study illustrates and quantifies the changes on corneal tissue between the paraffin-embedded and resin-embedded blocks and thus, selects a better target in investigational ophthalmology and optometry via light microscopy. Corneas of two cynomolgus monkeys (Macaca fascicularis) were used in this study. The formalin-fixed cornea was prepared in paraffin block via the conventional tissue processing protocol (4-day protocol) and stained with haematoxylin and eosin. The glutaraldehyde-fixed cornea was prepared in resin block via the rapid and modified tissue processing procedure (1.2-day protocol) and stained with toluidine blue. The paraffin-embedded sample exhibits various undesired tissue damage and artifact such as thinner epithelium (due to the substantial volumic extraction from the tissue), thicker stroma layer (due to the separation of lamellae and the presence of voids) and the distorted endothelium. In contrast, the resin-embedded corneal tissue has demonstrated satisfactory corneal ultrastructural preservation. The rapid and modified tissue processing method for preparing the resin-embedded is particularly beneficial to accelerate the microscopic evaluation in ophthalmology and optometry. PMID:22570589

  19. A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE, AIKEN, SC

    Energy Technology Data Exchange (ETDEWEB)

    Martin, D

    2006-10-04

    This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on ''rapid'' and, because the available keys contained a large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained more genera than we would likely encounter and because this larger number of genera required both more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher) more time was required to process samples. In developing this set of keys I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.

  20. Rivers rapid assessment protocols and insertion of society in monitoring of water resources

    Directory of Open Access Journals (Sweden)

    Guilherme Malafaia

    2008-12-01

    Full Text Available The degradation of water resources has been detected and changes both institutional and in the legislation have been demanded. The careless use of rivers has ecological changes as direct consequence, causing serious modifications in the landscape and fluvial regime, besides altering the availability of habitats and the trophic composition of the aquatic environment. Pressed by this scenario, scientists have been developing assessment methods that are efficient both for the evaluation itself and for supporting decision taking in the environmental management processes. In this perspective, the objective of this study is to present the Rapid River Assessment Protocols (RAPs and to emphasize how these protocols can promote the community participation in water resources monitoring. The RAPs can used to evaluate in an integrated form the characteristics of a river section according to the conservation or degradation condition of the fluvial environment and it is characterized by its economic viability and easy applicability. In regions with poor financial resources and serious problems of water quality, the RAPs can be used in environmental management programs. By using these protocols, the integration of the community in water resources monitoring generates data which represent the quality of fluvial ecosystems throughout time, without requesting high costs or specialized professionals. The RAPs in a simplified but not simplistic tool, which can be used in activities that aim at promoting a quick and reliable assessment of the “health” of a river.

  1. A Comparison of ectoparasite infestation by chigger mite larvae (Acarina: Trombiculidae) on resident and migratory birds in Chiapas, Mexico illustrating a rapid visual assessment protocol

    Science.gov (United States)

    Thomas V. Dietsch

    2005-01-01

    This study presents a protocol developed to rapidly assess ectoparasite prevalence and intensity. Using this protocol during a mist-netting project in two different coffee agroecosystems in Chiapas, Mexico, data were collected on ectoparasitic chigger mite larvae (Acarina: Trombiculidae) found on resident and migratory birds. Surprisingly high infestation rates were...

  2. A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE

    Energy Technology Data Exchange (ETDEWEB)

    Martin, D

    2007-09-04

    This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on 'rapid' and, because the available keys contained a very large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained many more genera than we would ever encounter and because this larger number of genera required more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher), more time was required to process samples. In developing this set of keys I emphasized character states that are easier for nonspecialists to recognize. I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that, when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.

  3. Implementation of a Rapid, Protocol-based TIA Management Pathway.

    Science.gov (United States)

    Jarhult, Susann J; Howell, Melissa L; Barnaure-Nachbar, Isabelle; Chang, Yuchiao; White, Benjamin A; Amatangelo, Mary; Brown, David F; Singhal, Aneesh B; Schwamm, Lee H; Silverman, Scott B; Goldstein, Joshua N

    2018-03-01

    Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED) with symptoms of transient ischemic attack (TIA). We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6-12 months after implementation. Outcomes included ED length of stay (LOS), hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18). Following the intervention, the inpatient admission rate decreased from 62% to 24% (pTIA among those with final diagnosis of TIA was 3% for both periods. Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  4. Gamma-H2AX biodosimetry for use in large scale radiation incidents: comparison of a rapid ‘96 well lyse/fix’ protocol with a routine method

    Directory of Open Access Journals (Sweden)

    Jayne Moquet

    2014-03-01

    Full Text Available Following a radiation incident, preliminary dose estimates made by γ-H2AX foci analysis can supplement the early triage of casualties based on clinical symptoms. Sample processing time is important when many individuals need to be rapidly assessed. A protocol was therefore developed for high sample throughput that requires less than 0.1 ml blood, thus potentially enabling finger prick sampling. The technique combines red blood cell lysis and leukocyte fixation in one step on a 96 well plate, in contrast to the routine protocol, where lymphocytes in larger blood volumes are typically separated by Ficoll density gradient centrifugation with subsequent washing and fixation steps. The rapid ‘96 well lyse/fix’ method reduced the estimated sample processing time for 96 samples to about 4 h compared to 15 h using the routine protocol. However, scoring 20 cells in 96 samples prepared by the rapid protocol took longer than for the routine method (3.1 versus 1.5 h at zero dose; 7.0 versus 6.1 h for irradiated samples. Similar foci yields were scored for both protocols and consistent dose estimates were obtained for samples exposed to 0, 0.2, 0.6, 1.1, 1.2, 2.1 and 4.3 Gy of 250 kVp X-rays at 0.5 Gy/min and incubated for 2 h. Linear regression coefficients were 0.87 ± 0.06 (R2 = 97.6% and 0.85 ± 0.05 (R2 = 98.3% for estimated versus actual doses for the routine and lyse/fix method, respectively. The lyse/fix protocol can therefore facilitate high throughput processing for γ-H2AX biodosimetry for use in large scale radiation incidents, at the cost of somewhat longer foci scoring times.

  5. A rapid Q-PCR titration protocol for adenovirus and helper-dependent adenovirus vectors that produces biologically relevant results

    Science.gov (United States)

    Gallaher, Sean D.; Berk, Arnold J.

    2013-01-01

    Adenoviruses are employed in the study of cellular processes and as expression vectors used in gene therapy. The success and reproducibility of these studies is dependent in part on having accurate and meaningful titers of replication competent and helper-dependent adenovirus stocks, which is problematic due to the use of varied and divergent titration protocols. Physical titration methods, which quantify the total number of viral particles, are used by many, but are poor at estimating activity. Biological titration methods, such as plaque assays, are more biologically relevant, but are time consuming and not applicable to helper-dependent gene therapy vectors. To address this, a protocol was developed called “infectious genome titration” in which viral DNA is isolated from the nuclei of cells ~3 h post-infection, and then quantified by Q-PCR. This approach ensures that only biologically active virions are counted as part of the titer determination. This approach is rapid, robust, sensitive, reproducible, and applicable to all forms of adenovirus. Unlike other Q-PCR-based methods, titers determined by this protocol are well correlated with biological activity. PMID:23624118

  6. Insights into bioassessment of marine pollution using body-size distinctness of planktonic ciliates based on a modified trait hierarchy.

    Science.gov (United States)

    Xu, Henglong; Jiang, Yong; Xu, Guangjian

    2016-06-15

    Based on a modified trait hierarchy of body-size units, the feasibility for bioassessment of water pollution using body-size distinctness of planktonic ciliates was studied in a semi-enclosed bay, northern China. An annual dataset was collected at five sampling stations within a gradient of heavy metal contaminants. Results showed that: (1) in terms of probability density, the body-size spectra of the ciliates represented significant differences among the five stations; (2) bootstrap average analysis demonstrated a spatial variation in body-size rank patterns in response to pollution stress due to heavy metals; and (3) the average body-size distinctness (Δz(+)) and variation in body-size distinctness (Λz(+)), based on the modified trait hierarchy, revealed a clear departure pattern from the expected body-size spectra in areas with pollutants. These results suggest that the body-size diversity measures based on the modified trait hierarchy of the ciliates may be used as a potential indicator of marine pollution. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Implementation of a Rapid, Protocol-based TIA Management Pathway

    Directory of Open Access Journals (Sweden)

    Susann J. Jarhult

    2018-02-01

    Full Text Available Introduction: Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED with symptoms of transient ischemic attack (TIA. Methods: We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6–12 months after implementation. Outcomes included ED length of stay (LOS, hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. Results: From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18. Following the intervention, the inpatient admission rate decreased from 62% to 24% (p<0.001, median ED LOS decreased by 1.2 hours (5.7 to 4.9 hours, p=0.027, and median total hospital LOS from 29.4 hours to 23.1 hours (p=0.019. The proportion of patients receiving head computed tomography (CT went from 68% to 58% (p=0.087; brain magnetic resonance (MR imaging from 83% to 88%, (p=0.44 neck CT angiography from 32% to 22% (p=0.039; and neck MR angiography from 61% to 72% (p=0.046. Ninety-day stroke or recurrent TIA among those with final diagnosis of TIA was 3% for both periods. Conclusion: Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  8. A novel stent inflation protocol improves long-term outcomes compared with rapid inflation/deflation deployment method.

    Science.gov (United States)

    Vallurupalli, Srikanth; Kasula, Srikanth; Kumar Agarwal, Shiv; Pothineni, Naga Venkata K; Abualsuod, Amjad; Hakeem, Abdul; Ahmed, Zubair; Uretsky, Barry F

    2017-08-01

    High-pressure inflation for coronary stent deployment is universally performed. However, the duration of inflation is variable and does not take into account differences in lesion compliance. We developed a standardized "pressure optimization protocol" (POP) using inflation pressure stability rather than an arbitrary inflation time or angiographic balloon appearance for stent deployment. Whether this approach improves long-term outcomes is unknown. 792 patients who underwent PCI using either rapid inflation/deflation (n = 376) or POP (n = 416) between January 2009 and March 2014 were included. Exclusion criteria included PCI for acute myocardial infarction, in-stent restenosis, chronic total occlusion, left main, and saphenous vein graft lesions. Primary endpoint was target vessel failure [TVF = combined end point of target vessel revascularization (TVR), myocardial infarction, and cardiac death]. Outcomes were analyzed in the entire cohort and in a propensity analysis. Stent implantation using POP with a median follow-up of 1317 days was associated with lower TVF compared with rapid inflation/deflation (10.1 vs. 17.8%, P inflation/deflation (10 vs. 18%, P < 0.0001). Stent deployment using POP led to reduced TVF compared to rapid I/D. These results recommend this method to improve long-term outcomes. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  9. A rapid echocardiographic screening protocol for rheumatic heart disease in Samoa: a high prevalence of advanced disease.

    Science.gov (United States)

    Allen, Marvin; Allen, John; Naseri, Take; Gardner, Rebecca; Tolley, Dennis; Allen, Lori

    2017-10-01

    Echocardiography has been proposed as a method to screen children for rheumatic heart disease. The World Heart Federation has established guidelines for echocardiographic screening. In this study, we describe a rapid echocardiogram screening protocol according to the World Heart Federation guidelines in Samoa, endemic for rheumatic heart disease. We performed echocardiogram screening in schoolchildren in Samoa between 2013 and 2015. A brief screening echocardiogram was performed on all students. Children with predefined criteria suspicious for rheumatic hear diseases were referred for a more comprehensive echocardiogram. Complete echocardiograms were classified according to the World Heart Federation guidelines and severity of valve disease. Echocardiographic screening was performed on 11,434 children, with a mean age of 10.2 years; 51% of them were females. A total of 558 (4.8%) children underwent comprehensive echocardiography, including 49 students who were randomly selected as controls. Definite rheumatic heart disease was observed in 115 students (10.0 per 1000): 92 students were classified as borderline (8.0 per 1000) and 23 with CHD. Advanced disease was identified in 50 students (4.4 per 1000): 15 with severe mitral regurgitation, five with severe aortic regurgitation, 11 with mitral stenoses, and 19 with mitral and aortic valve disease. We successfully applied a rapid echocardiographic screening protocol to a large number of students over a short time period - 28 days of screening over a 3-year time period - to identify a high prevalence of rheumatic heart disease. We also reported a significantly higher rate of advanced disease compared with previously published echocardiographic screening programmes.

  10. Adapting a rapid river assessment protocols to be used by elementary school children

    Directory of Open Access Journals (Sweden)

    Guilherme Malafaia

    2012-12-01

    Full Text Available The present study aimed to adapt a rapid river assessment protocols (RAP to be used by elementary school children. The study was conducted in Ipameri, GO and the RAP was adapted for the evaluation of streams in the Cerrado biome. Based on two protocol models, the developed RAP included: physical parameters that affect the functioning of streams, language adapted to the educational level of elementary school and the presence of drawings that could facilitate the field application of RAP by the students. For consolidation of the adapted instrument, it was offered a monitoring workshop to 95 students from two public education institutions, and developed an analysis and interpretation of the pattern of responses obtained during the practical step of the workshop. The Bartlett and Levene tests revealed no statistical differences between the response patterns of the students, allowing to infer that the developed RAP was understandable by the evaluators. The application of the RAP was fast (20 to 40 minutes and the students reported that the developed instrument helped them to familiarize with environmental issues. In addition, the monitoring workshop helped them to understand the instrument and the available illustrations facilitated the field evaluation. In addition, the students concluded that they have become aware of the issues related to the water resource preservation and also that participation in the environmental monitoring workshop allowed the appropriation of knowledge about the river system functioning. It was concluded that adapted RAP has been proved to be a useful and interesting tool for using in environmental education projects and programs.

  11. Acute Postexercise Time Course Responses of Hypertrophic vs. Power-Endurance Squat Exercise Protocols on Maximal and Rapid Torque of the Knee Extensors.

    Science.gov (United States)

    Conchola, Eric C; Thiele, Ryan M; Palmer, Ty B; Smith, Doug B; Thompson, Brennan J

    2015-05-01

    The aim of this study was to examine the effects of a medium-intensity high-volume vs. explosive squat protocol on the postexercise time course responses of maximal and rapid strength of the knee extensors. Seventeen resistance-trained men (mean ± SD: age = 22.0 ± 2.6 years) performed maximal voluntary contractions (MVCs) of the knee extensors before and after performing a squat workout using either a low-intensity fast velocity (LIFV) (5 × 16 at 40% 1 repetition maximum) or a traditional high-intensity slow velocity (TISV) (5 × 8 at 80% 1RM) exercise protocol. For each MVC, peak torque (PT), peak rate of torque development (RTDpeak), absolute (RTDabs), and relative RTD (RTDnorm) at early (0-50 milliseconds) and late (100-200 milliseconds) phases of muscle contraction were examined at pre- (Pre) and post-exercise at 0, 7, 15, and 30 (Post0...30) minutes. There were no intensity × time interactions for any variables (p = 0.098-0.832). Peak torque was greater at Pre than Post0 and Post7 (p = 0.001-0.016) but was not greater than Post15 and Post30 (p = 0.010-0.189). RTDpeak and early absolute RTD (RTD50abs) were greater at Pre than all postexercise time phases (p = 0.001-0.050); however, later absolute RTD (RTD100-200abs) was only greater at Pre than Post0 and Post30 (p = 0.013-0.048). Early relative RTD (RTD50norm) was only higher at Pre compared with Post0 (p = 0.023), whereas no differences were observed for later relative RTD (RTD100-200norm) (p = 0.920-0.990). Low-intensity fast velocity and TISV squat protocols both yielded acute decreases in maximal and rapid strength capacities following free-weight squats, with rapid strength showing slower recovery characteristics than maximal strength.

  12. Microplastic contamination in natural mussel beds from a Brazilian urbanized coastal region: Rapid evaluation through bioassessment.

    Science.gov (United States)

    Santana, M F M; Ascer, L G; Custódio, M R; Moreira, F T; Turra, A

    2016-05-15

    Microplastic pollution (particles urbanized area of the coast of São Paulo State, Brazil. A simple and rapid assessment showed that 75% of sampled mussels had ingested microplastics, an issue of human and environmental concern. All sampling points had contaminated mussels and this contamination had no clear pattern of distribution along the estuary. This was the first time that microplastic bioavailability was assessed in nature for the southern hemisphere and that wild P. perna was found contaminated with this pollutant. This is an important issue that should be better assessed due to an increase in seafood consumption and culture in Brazil and worldwide. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. DNAqua-Net: Developing new genetic tools for bioassessment and monitoring of aquatic ecosystems in Europe

    Directory of Open Access Journals (Sweden)

    Florian Leese

    2016-11-01

    Full Text Available The protection, preservation and restoration of aquatic ecosystems and their functions are of global importance. For European states it became legally binding mainly through the EU-Water Framework Directive (WFD. In order to assess the ecological status of a given water body, aquatic biodiversity data are obtained and compared to a reference water body. The quantified mismatch obtained determines the extent of potential management actions. The current approach to biodiversity assessment is based on morpho-taxonomy. This approach has many drawbacks such as being time consuming, limited in temporal and spatial resolution, and error-prone due to the varying individual taxonomic expertise of the analysts. Novel genomic tools can overcome many of the aforementioned problems and could complement or even replace traditional bioassessment. Yet, a plethora of approaches are independently developed in different institutions, thereby hampering any concerted routine application. The goal of this Action is to nucleate a group of researchers across disciplines with the task to identify gold-standard genomic tools and novel eco-genomic indices for routine application in biodiversity assessments of European fresh- and marine water bodies. Furthermore, DNAqua-Net will provide a platform for training of the next generation of European researchers preparing them for the new technologies. Jointly with water managers, politicians, and other stakeholders, the group will develop a conceptual framework for the standard application of eco-genomic tools as part of legally binding assessments.

  14. A Rapid and Reproducible Genomic DNA Extraction Protocol for Sequence-Based Identification of Archaea, Bacteria, Cyanobacteria, Diatoms, Fungi, and Green Algae

    OpenAIRE

    Farkhondeh Saba; Moslem Papizadeh; Javad Khansha; Mahshid Sedghi; Mehrnoosh Rasooli; Mohammad Ali Amoozegar; Mohammad Reza Soudi; Seyed Abolhassan Shahzadeh Fazeli

    2016-01-01

    Background:  Sequence-based identification of various microorganisms including Archaea, Bacteria, Cyanobacteria, Diatoms, Fungi, and green algae necessitates an efficient and reproducible genome extraction procedure though which a pure template DNA is yielded and it can be used in polymerase chain reactions (PCR). Considering the fact that DNA extraction from these microorganisms is time consuming and laborious, we developed and standardized a safe, rapid and inexpensive miniprep protocol. Me...

  15. Development of an improved rapid BACpro® protocol and a method for direct identification from blood-culture-positive bottles using matrix-assisted laser desorption ionization time-of-flight mass spectrometry.

    Science.gov (United States)

    Yonezawa, Takatoshi; Watari, Tomohisa; Ashizawa, Kazuho; Hanada, Daisuke; Yanagiya, Takako; Watanabe, Naoki; Terada, Takashi; Tomoda, Yutaka; Fujii, Satoshi

    2018-05-01

    Matrix-assisted laser desorption ionization time-of-flight mass spectrometry (MALDI-TOF MS) has been incorporated into pathogenic bacterial identification methods and has improved their rapidity. Various methods have been reported to directly identify bacteria with MALDI-TOF MS by pretreating culture medium in blood culture bottles. Rapid BACpro® (Nittobo Medical Co., Ltd.) is a pretreatment kit for effective collection of bacteria with cationic copolymers. However, the Rapid BACpro® pretreatment kit is adapted only for MALDI Biotyper (Bruker Daltonics K.K.), and there has been a desire to expand its use to VITEK MS (VMS; bioMerieux SA). We improved the protocol and made it possible to analyze with VMS. The culture medium bacteria collection method was changed to a method with centrifugation after hemolysis using saponin; the cationic copolymer concentration was changed to 30% of the original concentration; the sequence with which reagents were added was changed; and a change was made to an ethanol/formic acid extraction method. The improved protocol enhanced the identification performance. When VMS was used, the identification rate was 100% with control samples. With clinical samples, the identification agreement rate with the cell smear method was 96.3%. The improved protocol is effective in blood culture rapid identification, being both simpler and having an improved identification performance compared with the original. Copyright © 2018 Elsevier B.V. All rights reserved.

  16. Comparison of two protocols for maxillary protraction: bone anchors versus face mask with rapid maxillary expansion

    Science.gov (United States)

    Cevidanes, Lucia; Baccetti, Tiziano; Franchi, Lorenzo; McNamara, James A.; De Clerck, Hugo

    2010-01-01

    Objective To test the hypothesis that there is no difference in the active treatment effects for maxillary advancement induced by bone-anchored maxillary protraction (BAMP) and the active treatment effects for face mask in association with rapid maxillary expansion (RME/FM). Materials and Methods This is a study on consecutively treated patients. The changes in dentoskeletal cephalometric variables from start of treatment (T1) to end of active treatment (T2) with an average T1–T2 interval of about 1 year were contrasted in a BAMP sample of 21 subjects with a RME/FM sample of 34 patients. All subjects were prepubertal at T1. Statistical comparison was performed with t-tests for independent samples. Results The BAMP protocol produced significantly larger maxillary advancement than the RME/FM therapy (with a difference of 2 mm to 3 mm). Mandibular sagittal changes were similar, while vertical changes were better controlled with BAMP. The sagittal intermaxillary relationships improved 2.5 mm more in the BAMP patients. Additional favorable outcomes of BAMP treatment were the lack of clockwise rotation of the mandible as well as a lack of retroclination of the lower incisors. Conclusions The hypothesis is rejected. The BAMP protocol produced significantly larger maxillary advancement than the RME/FM therapy. PMID:20578848

  17. Rapid bioassessment of the effects of repeated rotenone treatments ...

    African Journals Online (AJOL)

    The potential collateral effects of eradicating invasive fishes in streams necessitate the monitoring of invertebrate communities during treatment. In an environmental rehabilitation programme, non-native smallmouth bass were removed from the lower reaches of the Rondegat River, Western Cape, South Africa, in 2012 and ...

  18. A new method for rapid Canine retraction

    Directory of Open Access Journals (Sweden)

    "Khavari A

    2001-06-01

    Full Text Available Distraction osteogenesis method (Do in bone lengthening and rapid midpalatal expansion have shown the great ability of osteognic tissues for rapid bone formation under distraction force and special protocol with optimum rate of one millimeter per day. Periodontal membrane of teeth (PDM is the extension of periostium in the alveolar socked. Orthodontic force distracts PDM fibers in the tension side and then bone formation will begin.Objects: Rapid retraction of canine tooth into extraction space of first premolar by DO protocol in order to show the ability of the PDM in rapid bone formation. The other objective was reducing total orthodontic treatment time of extraction cases.Patients and Methods: Tweleve maxillary canines in six patients were retracted rapidly in three weeks by a custom-made tooth-born appliance. Radiographic records were taken to evaluate the effects of heavy applied force on canine and anchorage teeth.Results: Average retraction was 7.05 mm in three weeks (2.35 mm/week. Canines rotated distal- in by mean 3.5 degrees.Anchorage loss was from 0 to 0.8 mm with average of 0.3 mm.Root resorption of canines was negligible, and was not significant clinically. Periodontium was normal after rapid retraction. No hazard for pulp vitality was observed.Discussion: PDM responded well to heavy distraction force by Do protocol. Rapid canine retraction seems to be a safe method and can considerabely reduce orthodontic time.

  19. Integration of DNA barcoding approaches into aquatic bioassessments

    Science.gov (United States)

    The Clean Water Act directs states to protect water resources by developing criteria based in part on biological assessments of natural aquatic ecosystems. Current protocols can be limited by the availability of taxonomic expertise and concerns about precision and accuracy in mor...

  20. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  1. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  2. Evaluation of the Implementation of a Rapid Response Treatment Protocol for Patients with Acute Onset Stroke: Can We Increase the Number of Patients Treated and Shorten the Time Needed

    Directory of Open Access Journals (Sweden)

    Rajiv Advani

    2014-06-01

    Full Text Available Aims: This study aims to evaluate the implementation of a rapid response treatment protocol for patients presenting with acute onset ischemic stroke. Improvements of routines surrounding the admission and treatment of patients with intravenous thrombolysis (IVT, such as door-to-needle (DTN times, and increasing the numbers of patients treated are discussed. Methods: We conducted a retrospective analysis of all patients (n = 320 treated with IVT for acute onset ischemic stroke at the Stavanger University Hospital, Norway, between 2003 and 2012. In 2009, a succession of changes to pre- and intra-hospital routines were made as well as an improvement in the education of primary health care physicians, nurses and paramedics involved in the treatment of acute onset stroke patients (rapid response treatment protocol. Analyses of DTN times, onset-to-needle times and the number of patients treated per year were carried out to ascertain the effect of the changes made. The primary aim was to analyze DTN times to look for any changes, and the secondary aim was to analyze changes in the number of patients treated per year. Results: In the years after the implementation of the rapid treatment protocol, we saw an improvement in the median DTN time with a decrease from 73 to 50 min in the first year (p = 0.03, a decrease of 45 min in the second year (p = 0.01 and a decrease of 31 min in the third year (p Conclusions: The implementation of the rapid treatment protocol for acute onset ischemic stroke patients led to a significant decrease in the DTN time at our center. These improvements also produced an increase in the number of patients treated per year. The extension of the therapeutic window from 3 to 4.5 h for the use of intravenous recombinant tissue plasminogen activator also played a role in the increased treatment numbers.

  3. Safety of a rapid diagnostic protocol with accelerated stress testing.

    Science.gov (United States)

    Soremekun, Olan A; Hamedani, Azita; Shofer, Frances S; O'Conor, Katie J; Svenson, James; Hollander, Judd E

    2014-02-01

    Most patients at low to intermediate risk for an acute coronary syndrome (ACS) receive a 12- to 24-hour "rule out." Recently, trials have found that a coronary computed tomographic angiography-based strategy is more efficient. If stress testing were performed within the same time frame as coronary computed tomographic angiography, the 2 strategies would be more similar. We tested the hypothesis that stress testing can safely be performed within several hours of presentation. We performed a retrospective cohort study of patients presenting to a university hospital from January 1, 2009, to December 31, 2011, with potential ACS. Patients placed in a clinical pathway that performed stress testing after 2 negative troponin values 2 hours apart were included. We excluded patients with ST-elevation myocardial infarction or with an elevated initial troponin. The main outcome was safety of immediate stress testing defined as the absence of death or acute myocardial infarction (defined as elevated troponin within 24 hours after the test). A total of 856 patients who presented with potential ACS were enrolled in the clinical pathway and included in this study. Patients had a median age of 55.0 (interquartile range, 48-62) years. Chest pain was the chief concern in 86%, and pain was present on arrival in 73% of the patients. There were no complications observed during the stress test. There were 0 deaths (95% confidence interval, 0%-0.46%) and 4 acute myocardial infarctions within 24 hours (0.5%; 95% confidence interval, 0.14%-1.27%). The peak troponins were small (0.06, 0.07, 0.07, and 0.19 ng/mL). Patients who present to the ED with potential ACS can safely undergo a rapid diagnostic protocol with stress testing. © 2013.

  4. Field evaluation of hazardous waste site bioassessment protocols. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, J.M.; Cline, J.F.; Gano, K.A.; McShane, M.C.; Rogers, J.E.; Rogers, L.E.; Simpson, J.C.; Skalski, J.R.

    1984-04-01

    The overall goal of the plan was to demonstrate that honeybees could be used in detecting likely areas of chemical pollution, to demonstrate the usefulness of microbial and plant phytoassays, and to demonstrate a relationship between laboratory derived phytotoxicity results and field observations of plant community structure and diversity. Field studies were conducted through a cooperative arrangement with the US Army arsenal in Commerce City, Colorado.

  5. Rapid Bioavailability and Disposition protocol: A novel higher throughput approach to assess pharmacokinetics and steady-state brain distribution with reduced animal usage.

    Science.gov (United States)

    Fu, Tingting; Gao, Ruina; Scott-Stevens, Paul; Chen, Yan; Zhang, Chalmers; Wang, Jianfei; Summerfield, Scott; Liu, Houfu; Sahi, Jasminder

    2018-05-29

    Besides routine pharmacokinetic (PK) parameters, unbound brain-to-blood concentration ratio (K p,uu ) is an index particularly crucial in drug discovery for central nervous system (CNS) indications. Despite advantages of K p,uu from steady state after constant intravenous (i.v.) infusion compared with one- or multiple time points after transient dosing, it is seldom obtained for compound optimization in early phase of CNS drug discovery due to requirement of prerequisite PK data to inform the study design. Here, we designed a novel rat in vivo PK protocol, dubbed as Rapid Bioavailability and Disposition (RBD), which combined oral (p.o.) dosing and i.v. infusion to obtain steady-state brain penetration, along with blood clearance, oral exposure and oral bioavailability for each discovery compound, within a 24 hour in-life experiment and only a few (e.g., 3) animals. Protocol validity was verified through simulations with a range of PK parameters in compartmental models as well as data comparison for nine compounds with distinct PK profiles. PK parameters (K p,brain , CL b and oral AUC) measured from the RBD protocol for all compounds, were within two-fold and/or statistically similar to those derived from conventional i.v./p.o. crossover PK studies. Our data clearly indicates that the RBD protocol offers reliable and reproducible data over a wide range of PK properties, with reduced turnaround time and animal usage. Copyright © 2017. Published by Elsevier B.V.

  6. Enhancing creative cognition with a rapid right-parietal neurofeedback procedure.

    Science.gov (United States)

    Agnoli, Sergio; Zanon, Marco; Mastria, Serena; Avenanti, Alessio; Corazza, Giovanni Emanuele

    2018-02-14

    The present article describes an innovative neurofeedback training (NFT) procedure aimed at increasing creative cognition through the enhancement of specific brain activities previously associated with divergent thinking. We designed and tested two NFT protocols based on training alpha and beta EEG oscillations selectively measured over the right parietal region. A total of 80 participants were involved, 40 in the alpha NFT protocol and 40 in the beta NFT protocol. The NFT loop was closed on a video stream that would advance only when oscillation power exceeded a normalized threshold. The total duration of the protocol was two hours in a single day, hence its classification as rapid. Changes in ideational fluency and originality, measured with a divergent thinking task, were compared between participants receiving real video feedback and participants receiving sham feedback. We controlled for individual differences in creative achievement level. Results showed that the protocols were effective at enhancing alpha and beta activities in the targeted area. Differences between the two protocols emerged in their effectiveness at promoting divergent thinking. While no significant changes in originality resulted from the rapid alpha NFT, increases in both originality and fluency emerged as a consequence of the rapid beta NFT. These results were particularly evident in participants starting with a low creative achievement level. Possible interpretations and future directions are proposed and discussed. Copyright © 2018 Elsevier Ltd. All rights reserved.

  7. Mapping of Schistosomiasis and Soil-Transmitted Helminths in Namibia: The First Large-Scale Protocol to Formally Include Rapid Diagnostic Tests.

    Directory of Open Access Journals (Sweden)

    José Carlos Sousa-Figueiredo

    Full Text Available Namibia is now ready to begin mass drug administration of praziquantel and albendazole against schistosomiasis and soil-transmitted helminths, respectively. Although historical data identifies areas of transmission of these neglected tropical diseases (NTDs, there is a need to update epidemiological data. For this reason, Namibia adopted a new protocol for mapping of schistosomiasis and geohelminths, formally integrating rapid diagnostic tests (RDTs for infections and morbidity. In this article, we explain the protocol in detail, and introduce the concept of 'mapping resolution', as well as present results and treatment recommendations for northern Namibia.This new protocol allowed a large sample to be surveyed (N = 17,896 children from 299 schools at relatively low cost (7 USD per person mapped and very quickly (28 working days. All children were analysed by RDTs, but only a sub-sample was also diagnosed by light microscopy. Overall prevalence of schistosomiasis in the surveyed areas was 9.0%, highly associated with poorer access to potable water (OR = 1.5, P<0.001 and defective (OR = 1.2, P<0.001 or absent sanitation infrastructure (OR = 2.0, P<0.001. Overall prevalence of geohelminths, more particularly hookworm infection, was 12.2%, highly associated with presence of faecal occult blood (OR = 1.9, P<0.001. Prevalence maps were produced and hot spots identified to better guide the national programme in drug administration, as well as targeted improvements in water, sanitation and hygiene. The RDTs employed (circulating cathodic antigen and microhaematuria for Schistosoma mansoni and S. haematobium, respectively performed well, with sensitivities above 80% and specificities above 95%.This protocol is cost-effective and sensitive to budget limitations and the potential economic and logistical strains placed on the national Ministries of Health. Here we present a high resolution map of disease prevalence levels, and treatment regimens are

  8. Diagnostic value of a new myocardial perfusion agent, teboroxime (SO 30,217), utilizing a rapid planar imaging protocol: Preliminary results

    International Nuclear Information System (INIS)

    Hendel, R.C.; McSherry, B.; Karimeddini, M.; Leppo, J.A.

    1990-01-01

    Technetium-99m-labeled agents have advantages over thallium-201 in terms of photon statistics, cost and clinical availability. They have been suggested as an alternative to thallium for myocardial perfusion imaging. Teboroxime is a new boronic acid adduct of technetium dioxime (BATO) compound that demonstrates favorable characteristics in preliminary studies. With use of a novel (seated) patient positioning technique and a rapid dynamic acquisition protocol, 30 patients underwent planar imaging with teboroxoime while at rest and after maximal treadmill exercise. Postexercise scans were completed in an average time (mean +/- SD) of 4.4 +/- 1.6 min, with 4.8 +/- 1.5 min for the views at rest. These results were compared with coronary arteriography or thallium scintigraphy after treadmill exercise, or both. Diagnostic agreement (abnormal versus normal) was present in 28 of the 30 patients (p less than 0.001). Regarding physiologic assessment as compared with thallium scintigraphy, the finding of infarction and ischemia was concordant in 89% and 86% of patients, respectively. This report describes the initial use of teboroxime with a rapid dynamic planar imaging technique, resulting in a high correlation with exercise thallium scintigraphy. Delayed postexercise images obtained 5 to 10 min after exercise demonstrated rapid disappearance of exercise-induced defects noted on the initial (0 to 5 min) postexercise views. The rapid differential washout with teboroxime has not been previously described and the possible clinical significance is discussed

  9. Optimizing the high-resolution manometry (HRM) study protocol.

    Science.gov (United States)

    Patel, A; Ding, A; Mirza, F; Gyawali, C P

    2015-02-01

    Intolerance of the esophageal manometry catheter may prolong high-resolution manometry (HRM) studies and increase patient distress. We assessed the impact of obtaining the landmark phase at the end of the study when the patient has acclimatized to the HRM catheter. 366 patients (mean age 55.4 ± 0.8 years, 62.0% female) undergoing esophageal HRM over a 1-year period were studied. The standard protocol consisted of the landmark phase, 10 5 mL water swallows 20-30 s apart, and multiple rapid swallows where 4-6 2 mL swallows were administered in rapid succession. The modified protocol consisted of the landmark phase at the end of the study after test swallows. Study duration, technical characteristics, indications, and motor findings were compared between standard and modified protocols. Of the 366 patients, 89.6% underwent the standard protocol (study duration 12.9 ± 0.3 min). In 10.4% with poor catheter tolerance undergoing the modified protocol, study duration was significantly longer (15.6 ± 1.0 min, p = 0.004) despite similar duration of study maneuvers. Only elevated upper esophageal sphincter basal pressures at the beginning of the study segregated modified protocol patients. The 95th percentile time to landmark phase in the standard protocol patients was 6.1 min; as many as 31.4% of modified protocol patients could not obtain their first study maneuver within this period (p = 0.0003). Interpretation was not impacted by shifting the landmark phase to the end of the study. Modification of the HRM study protocol with the landmark phase obtained at the end of the study optimizes study duration without compromising quality. © 2014 John Wiley & Sons Ltd.

  10. The best data design for applying the taxonomic distinctness index in lotic systems: A case study of the Southern Morava River basin.

    Science.gov (United States)

    Stojković Piperac, Milica; Milošević, Djuradj; Petrović, Ana; Simić, Vladica

    2018-01-01

    The taxonomic distinctness (Δ+) index has been recognized as a robust measure to assess human impacts on marine biodiversity. However, its applicability in freshwater ecosystems has still not been confirmed. We aimed to propose the most suitable data design for calculating the Δ+ index for application in assessing anthropogenically caused degradation in lotic environments. We calculated the values of Δ+ based on different taxa groups and taxa resolutions, in order to examine its utility as a potential metric in bioassessment programs. We found that the exclusion of non-insect taxa and selected insect orders significantly increased the index sensitivity. Thus, we believe that an appropriate data design for Δ+ calculation based on macroinvertebrate assemblages is the main prerequisite for the effective estimation of degradation in lotic environments. In addition, we argue that a decrease in taxonomic resolution up to genus level is completely acceptable, as it results in only minor information loss. Bearing this in mind would significantly facilitate its application in rapid bioassessment programs. Despite the observed correlation, the utility of Δ+ as a potential bioassessment metric is rather limited, since its fails to detect fine differences in environmental stress, and instead only roughly distinguishes between two basic classes of degradation level, unimpacted and impacted. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Establishment of an efficient in vitro regeneration protocol for rapid and mass propagation of Dendrobium chrysotoxum Lindl. using seed culture.

    Science.gov (United States)

    Nongdam, Potshangbam; Tikendra, Leimapokpam

    2014-01-01

    An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species.

  12. Establishment of an Efficient In Vitro Regeneration Protocol for Rapid and Mass Propagation of Dendrobium chrysotoxum Lindl. Using Seed Culture

    Science.gov (United States)

    2014-01-01

    An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species. PMID:25401154

  13. Adapting a rapid assessment protocol to environmentally assess palm swamp (Veredas) springs in the Cerrado biome, Brazil.

    Science.gov (United States)

    Guimarães, Ariane; de Lima Rodrigues, Aline Sueli; Malafaia, Guilherme

    2017-10-30

    The exploitation and degradation of natural environments exert intense pressure on important ecosystems worldwide. Thus, it is necessary developing or adapting assessment methods to monitor environmental changes and to generate results to be applied to environmental management programs. The Brazilian Veredas (phytophysiognomies typical to the Cerrado biome) are threatened by several human activities; thus, the aim of the present study is to adapt a rapid assessment protocol (RAP) to be applied to Veredas springs, by using the upper course of the Vai-e-Vem stream watershed (Ipameri County, Goiás State, Brazil). Therefore, several springs in the study site were visited and 11 of them were considered Veredas springs. After the RAP was adapted, the instrument was validated and used to environmentally assess the springs in order to demonstrate its applicability. The present study has provided an instrument of option to monitor Veredas springs.

  14. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.K.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt

  15. Rapid maxillary distraction protocol utilizing the halo distraction system and rigid internal fixation.

    Science.gov (United States)

    Baker, Stephen B; Reid, Russell R; Burkey, Brooke; Bartlett, Scott P

    2007-09-01

    To shorten head frame wear time associated with external halo distraction (HD), we have adapted a protocol for maxillary distraction with the halo system that integrates plate fixation. All patients had a history of cleft lip and/or palate and maxillary retrusion > or = 8 mm. Five patients treated with this protocol and followed for at least 1 year were included in this study. The protocol included a 3-day latency period, variable maxillary distraction, and removal of the halo device with simultaneous rigid internal fixation. Two patients had a variable period of maxillomandibular fixation (MMF), which maintained the maxillary advancement and idealized intercuspal position while permitting further callus maturation. Cephalographs were obtained preoperatively, immediately following distractor removal, and 1 year after rigid internal fixation. The mean age at time of surgery was 18.7 years. The maxillary deficiency ranged from 8 to 15 mm (mean = 10.6 mm). All five patients demonstrated excellent occlusion. Cephalometric analysis 1-year post rigid internal fixation revealed minimal (maxillary distraction followed by MMF to maintain maxillary advancement may reduce halo device wear to 1 to 2 weeks. MMF optimizes occlusion by forcing the maxillary teeth into maximal intercuspal position. Rigid fixation is not only associated with less long-term relapse compared to nonrigid forms of fixation, but also minimizes the incidence of nonunion. This treatment protocol provides the advancement possible with distraction osteogenesis and the accuracy of orthognathic surgery, thereby minimizing external head frame wear.

  16. Treatment of skeletal class III malocclusion using face mask therapy with alternate rapid maxillary expansion and constriction (Alt-RAMEC protocol

    Directory of Open Access Journals (Sweden)

    Anand Ramchandra Rathi

    2015-01-01

    Full Text Available Class III malocclusion is very common malocclusion and can be due to maxillary retrusion, mandibular prognathism, or combination. Ellis and McNamara found a combination of maxillary retrusion and mandibular protrusion to be the most common skeletal relationship (30%. The treatment should be carried out as early as possible for permitting normal growth of the skeletal bases. Reverse pull head gear combined with maxillary expansion can effectively correct skeletal Class III malocclusion due to maxillary deficiency in growing patient. An eight-year-old female patient with chief complaint of prognathic mandible and anterior crossbite was successfully treated in duration of 5 months with facemask and expansion therapy based on Alternate Rapid Maxillary Expansion and Constriction (Alt-RAMEC protocol.

  17. Macroinvertebrate response to acid mine drainage: community metrics and on-line behavioural toxicity bioassay

    International Nuclear Information System (INIS)

    Gerhardt, A.; Janssens de Bisthoven, L.; Soares, A.M.V.M.

    2004-01-01

    The hypothesis is tested that toxicity of acid mine drainage can be detected by a selection of existing macroinvertebrate community and bioindicator metrices supplemented by toxicity tests with the local mosquitofish Gambusia holbrooki Girard and the shrimp Atyaephyra desmaresti Millet. The behavioural responses of A. desmaresti to acid mine drainage were recorded in the Multispecies Freshwater Biomonitor[reg], based on behaviour and survival as parameters. Bioassessment methods were based on community diversity, structure, function, and bioindicators and supplemented by chemical analysis (temperature, pH, metals). The Biological Monitoring Working Party adapted for the Iberian Peninsula, the number of predators (Coleoptera, Hemiptera) and the number of Ephemeroptera and Trichoptera taxa differentiated the sites well. The on-line toxicity test revealed pH-dependent acute toxicity of the acid mine drainage for the shrimp (LC 50 -48 h: pH-AMD=5.8) and a pH- dependent decrease in locomotory activity with the lowest-observed-response-times (LORTs) within 5 h of exposure. Shrimp were more sensitive to acid mine drainage than fish (LC 50 -48 h: pH-AMD=4.9). A new multimetric index combining toxicity testing and bioassessment methods is proposed. - Toxicity of acid mine drainage was evaluated by macroinvertebrate bioassessment and a new on-line rapid behavioural toxicity test with Atyaephyra desmaresti (Crustacea)

  18. Macroinvertebrate response to acid mine drainage: community metrics and on-line behavioural toxicity bioassay

    Energy Technology Data Exchange (ETDEWEB)

    Gerhardt, A.; Janssens de Bisthoven, L.; Soares, A.M.V.M

    2004-07-01

    The hypothesis is tested that toxicity of acid mine drainage can be detected by a selection of existing macroinvertebrate community and bioindicator metrices supplemented by toxicity tests with the local mosquitofish Gambusia holbrooki Girard and the shrimp Atyaephyra desmaresti Millet. The behavioural responses of A. desmaresti to acid mine drainage were recorded in the Multispecies Freshwater Biomonitor[reg], based on behaviour and survival as parameters. Bioassessment methods were based on community diversity, structure, function, and bioindicators and supplemented by chemical analysis (temperature, pH, metals). The Biological Monitoring Working Party adapted for the Iberian Peninsula, the number of predators (Coleoptera, Hemiptera) and the number of Ephemeroptera and Trichoptera taxa differentiated the sites well. The on-line toxicity test revealed pH-dependent acute toxicity of the acid mine drainage for the shrimp (LC{sub 50}-48 h: pH-AMD=5.8) and a pH- dependent decrease in locomotory activity with the lowest-observed-response-times (LORTs) within 5 h of exposure. Shrimp were more sensitive to acid mine drainage than fish (LC{sub 50}-48 h: pH-AMD=4.9). A new multimetric index combining toxicity testing and bioassessment methods is proposed. - Toxicity of acid mine drainage was evaluated by macroinvertebrate bioassessment and a new on-line rapid behavioural toxicity test with Atyaephyra desmaresti (Crustacea)

  19. In vitro bioassessment of the immunomodulatory activity of Saccharomyces cerevisiae components using bovine macrophages and Mycobacterium avium ssp. paratuberculosis.

    Science.gov (United States)

    Li, Z; Kang, H; You, Q; Ossa, F; Mead, P; Quinton, M; Karrow, N A

    2018-04-11

    The yeast Saccharomyces cerevisiae and its components are used for the prevention and treatment of enteric disease in different species; therefore, they may also be useful for preventing Johne's disease, a chronic inflammatory bowel disease of ruminants caused by Mycobacterium avium ssp. paratuberculosis (MAP). The objective of this study was to identify potential immunomodulatory S. cerevisiae components using a bovine macrophage cell line (BOMAC). The BOMAC phagocytic activity, reactive oxygen species production, and immune-related gene (IL6, IL10, IL12p40, IL13, IL23), transforming growth factor β, ARG1, CASP1, and inducible nitric oxide synthase expression were investigated when BOMAC were cocultured with cell wall components from 4 different strains (A, B, C, and D) and 2 forms of dead yeast from strain A. The BOMAC phagocytosis of mCherry-labeled MAP was concentration-dependently attenuated when BOMAC were cocultured with yeast components for 6 h. Each yeast derivative also induced a concentration-dependent increase in BOMAC reactive oxygen species production after a 6-h exposure. In addition, BOMAC mRNA expression of the immune-related genes was investigated after 6 and 24 h of exposure to yeast components. All yeast components were found to regulate the immunomodulatory genes of BOMAC; however, the response varied among components and over time. The in vitro bioassessment studies reported here suggest that dead yeast and its cell wall components may be useful for modulating macrophage function before or during MAP infection. Copyright © 2018 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  20. Novel protocol for persister cells isolation.

    Directory of Open Access Journals (Sweden)

    Silvia J Cañas-Duarte

    Full Text Available Bacterial persistence, where a fraction of a population presents a transient resistance to bactericidal substances, has great medical importance due to its relation with the appearance of antibiotic resistances and untreatable bacterial chronic infections. The mechanisms behind this phenomenon remain largely unknown in spite of recent advances, in great part because of the difficulty in isolating the very small fraction of the population that is in this state at any given time. Current protocols for persister isolation have resulted in possible biases because of the induction of this state by the protocol itself. Here we present a novel protocol that allows rapid isolation of persister cells both from exponential and stationary phase. Moreover, it is capable of differentiating between type I and type II persister cells, which should allow the field to move beyond its current state of studying only one type. While this protocol prompts a revision of many of the current results, it should greatly facilitate further advances in the field.

  1. A quick DNA extraction protocol: Without liquid nitrogen in ambient ...

    African Journals Online (AJOL)

    Marker assisted selection is an effective technique for quality traits selection in breeding program which are impossible by visual observation. Marker assisted selection in early generation requires rapid DNA extraction protocol for large number of samples in a low cost approach. A rapid and inexpensive DNA extraction ...

  2. A Rapid and Reproducible Genomic DNA Extraction Protocol for Sequence-Based Identification of Archaea, Bacteria, Cyanobacteria, Diatoms, Fungi, and Green Algae

    Directory of Open Access Journals (Sweden)

    Farkhondeh Saba

    2017-01-01

    Full Text Available Background:  Sequence-based identification of various microorganisms including Archaea, Bacteria, Cyanobacteria, Diatoms, Fungi, and green algae necessitates an efficient and reproducible genome extraction procedure though which a pure template DNA is yielded and it can be used in polymerase chain reactions (PCR. Considering the fact that DNA extraction from these microorganisms is time consuming and laborious, we developed and standardized a safe, rapid and inexpensive miniprep protocol. Methods:  According to our results, amplification of various genomic regions including SSU, LSU, ITS, β-tubulin, actin, RPB2, and EF-1 resulted in a reproducible and efficient DNA extraction from a wide range of microorganisms yielding adequate pure genomic material for reproducible PCR-amplifications. Results:   This method relies on a temporary shock of increased concentrations of detergent which can be applied concomitant with multiple freeze-thaws to yield sufficient amount of DNA for PCR amplification of multiple or single fragments(s of the genome. As an advantage, the recipe seems very flexible, thus, various optional steps can be included depending on the samples used.Conclusion:   Having the needed flexibility in each step, this protocol is applicable on a very wide range of samples. Hence, various steps can be included depending on the desired quantity and quality.

  3. A Rapid and Reproducible Genomic DNA Extraction Protocol for Sequence-Based Identification of Archaea, Bacteria, Cyanobacteria, Diatoms, Fungi, and Green Algae

    Directory of Open Access Journals (Sweden)

    Farkhondeh Saba

    2016-09-01

    Full Text Available Background:  Sequence-based identification of various microorganisms including Archaea, Bacteria, Cyanobacteria, Diatoms, Fungi, and green algae necessitates an efficient and reproducible genome extraction procedure though which a pure template DNA is yielded and it can be used in polymerase chain reactions (PCR. Considering the fact that DNA extraction from these microorganisms is time consuming and laborious, we developed and standardized a safe, rapid and inexpensive miniprep protocol. Methods:  According to our results, amplification of various genomic regions including SSU, LSU, ITS, β-tubulin, actin, RPB2, and EF-1 resulted in a reproducible and efficient DNA extraction from a wide range of microorganisms yielding adequate pure genomic material for reproducible PCR-amplifications. Results:   This method relies on a temporary shock of increased concentrations of detergent which can be applied concomitant with multiple freeze-thaws to yield sufficient amount of DNA for PCR amplification of multiple or single fragments(s of the genome. As an advantage, the recipe seems very flexible, thus, various optional steps can be included depending on the samples used.Conclusion:   Having the needed flexibility in each step, this protocol is applicable on a very wide range of samples. Hence, various steps can be included depending on the desired quantity and quality.

  4. Rapid purification of recombinant histones.

    Science.gov (United States)

    Klinker, Henrike; Haas, Caroline; Harrer, Nadine; Becker, Peter B; Mueller-Planitz, Felix

    2014-01-01

    The development of methods to assemble nucleosomes from recombinant histones decades ago has transformed chromatin research. Nevertheless, nucleosome reconstitution remains time consuming to this day, not least because the four individual histones must be purified first. Here, we present a streamlined purification protocol of recombinant histones from bacteria. We termed this method "rapid histone purification" (RHP) as it circumvents isolation of inclusion bodies and thereby cuts out the most time-consuming step of traditional purification protocols. Instead of inclusion body isolation, whole cell extracts are prepared under strongly denaturing conditions that directly solubilize inclusion bodies. By ion exchange chromatography, the histones are purified from the extracts. The protocol has been successfully applied to all four canonical Drosophila and human histones. RHP histones and histones that were purified from isolated inclusion bodies had similar purities. The different purification strategies also did not impact the quality of octamers reconstituted from these histones. We expect that the RHP protocol can be readily applied to the purification of canonical histones from other species as well as the numerous histone variants.

  5. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  6. The Tolerability and Efficacy of Rapid Infliximab Infusions in Patients with Inflammatory Bowel Disease.

    Science.gov (United States)

    Qazi, Taha; Shah, Bhavesh; El-Dib, Mohammed; Farraye, Francis A

    2016-02-01

    Few studies have assessed the loss of efficacy or patient and caregiver satisfaction with rapid infliximab infusions. The aim of this study is to assess the tolerability, loss of efficacy and to describe the impact on resource utilization and patient satisfaction in rapid infliximab infusions. Subjects with inflammatory bowel disease receiving rapid infliximab infusions were included in the study. Subjects received maintenance infusions from June 2011 to June 2013. Incidence of adverse reactions and the total number of rapid infliximab infusions were recorded. Efficacy was compared to published studies evaluating the long-term efficacy of infliximab infusions. Patient satisfaction was addressed through a survey following the implementation of the rapid infusion protocol. Seventy-five subjects with IBD were included in the study. Five hundred and twenty-two rapid infliximab infusions were provided to patients. There were no acute or delayed infusion reactions. Ten subjects (13 %) required either a dose escalation or interval adjustment between infliximab infusions. A majority of patients reported increased satisfaction with 1-h infliximab infusions, and 97 % of surveyed patients opted to continue rapid infusions. The rapid infliximab infusion protocol increased infusion unit efficiency by increasing capacity by 15 %. Cost savings in the elimination of nursing time translated to approximately $108,150 savings at our institution. Rapid infliximab infusions do not appear to increase the risk of loss of response compared to historical studies of long-term infliximab efficiency. A rapid infliximab infusion protocol improved efficiency in our infusion unit and increased patient and nursing satisfaction.

  7. The effects of interventions targeting multiple health behaviors on smoking cessation outcomes: a rapid realist review protocol.

    Science.gov (United States)

    Minian, Nadia; deRuiter, Wayne K; Lingam, Mathangee; Corrin, Tricia; Dragonetti, Rosa; Manson, Heather; Taylor, Valerie H; Zawertailo, Laurie; Ebnahmady, Arezoo; Melamed, Osnat C; Rodak, Terri; Hahn, Margaret; Selby, Peter

    2018-03-01

    Health behaviors directly impact the health of individuals, and populations. Since individuals tend to engage in multiple unhealthy behaviors such as smoking, excessive alcohol use, physical inactivity, and eating an unhealthy diet simultaneously, many large community-based interventions have been implemented to reduce the burden of disease through the modification of multiple health behaviors. Smoking cessation can be particularly challenging as the odds of becoming dependent on nicotine increase with every unhealthy behavior a smoker exhibits. This paper presents a protocol for a rapid realist review which aims to identify factors associated with effectively changing tobacco use and target two or more additional unhealthy behaviors. An electronic literature search will be conducted using the following bibliographic databases: MEDLINE, Embase, PsycINFO, Cumulative Index to Nursing and Allied Health Literature (CINAHL), The Cochrane Library, Social Science Abstracts, Social Work Abstracts, and Web of Science. Two reviewers will screen titles and abstracts for relevant research, and the selected full papers will be used to extract data and assess the quality of evidence. Throughout this process, the rapid realist approach proposed by Saul et al., 2013 will be used to refine our initial program theory and identify contextual factors and mechanisms that are associated with successful multiple health behavior change. This review will provide evidence-based research on the context and mechanisms that may drive the success or failure of interventions designed to support multiple health behavior change. This information will be used to guide curriculum and program development for a government funded project on improving smoking cessation by addressing multiple health behaviors in people in Canada. PROSPERO CRD42017064430.

  8. An Evaluation of Protocols for UAV Science Applications

    Science.gov (United States)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  9. A rapid and efficient protocol for in vitro multiplication of genetically uniform Stevia rebaudiana (Bertoni).

    Science.gov (United States)

    Khan, A; Jayanthi, M; Gantasala, Nagavara Prasad; Bhooshan, N; Rao, Uma

    2016-07-01

    Stevia rebaudiana (Bertoni), commonly called candy leaf or sweet leaf, endemic to South America, is an important medicinal plant. As a source of low calorie natural sweetener 'stevoside', it is used in obesity, diabetes, treatment of heartburn and tooth decay, and also serves as a food supplement. Large scale commercial propagation of S. rebaudiana demands a suitable protocol. Here, we propose an improved protocol for in vitro multiplication of S. rebaudiana from nodal explants. In this protocol, the effect of laboratory grade urea on multiple shoot induction from nodal explants was studied. The nodal explants were initially cultured on Murashige and Skoog (MS) basal media for 2 weeks which facilitated the axillary bud break. Further, culturing of these explants on MS medium fortified with 6 benzyl amninopurine (BAP) (2 mg/L) and Naphthalene acetic acid (NAA) (1 mg/L) with and .without urea (5 mg/L) for a period of 40 days revealed maximum shoot production of 44.56 from a single nodal explant in media supplemented with urea as compared to 22.44 without urea. The differences in the number of shoots produced were significant and these shoots readily rooted in MS media with NAA (4 mg/L). Primary and secondary hardening was successful in these plants. There were no visible morphological abnormalities observed in the micropropagated plantlets. Genetic analysis from random samples also revealed that these plants are genetically uniform. The advantage of the present protocol is that the complete process of multiple shoot induction, rooting and hardening could be completed within a period of 6 months as compared to the existing protocols.

  10. A PROPOSED MAPPING ARCHITECTURE BETWEEN IAX AND JINGLE PROTOCOLS

    OpenAIRE

    Hadeel Saleh Haj Aliwi; Putra Sumari

    2016-01-01

    Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call eve...

  11. Rapid magnetic resonance imaging protocol for detecting femoral head avascular necrosis: A case series-it′s utility in the general population in developing countries

    Directory of Open Access Journals (Sweden)

    M Sanjay Khaladkar

    2015-01-01

    Full Text Available Introduction: Osteonecrosis of the femoral head is an increasing cause of musculoskeletal disability, common among the younger population, between the third and fifth decade of life, affecting mainly men, thereby requiring prompt diagnosis and early intervention. Aims and Objectives: The aim was to formulate a limited magnetic resonance imaging (MRI examination protocol for detection of avascular necrosis (AVN in clinically suspected cases that can be performed rapidly and will be inexpensive. Materials and Methods: Forty-five patients suspected clinically and or on conventional radiography for AVN of the femoral head were referred for MRI hip. MRI hip was done on 1.5 T Siemens Avanto. Of 45, 36 were detected to have AVN (total 58 hips, whereas 9 did not have AVN on MRI. Initially, coronal T1-weighted image (T1WI sequence was obtained as limited MRI protocol, followed by complete MRI examination. Results: Maximum patients belonged to age group 31-40 (30.5%. 32 (88.88% patients were males and 4 (11.11% were females. Bilateral AVN was detected in 44 (61.1% and unilateral in 14 patients (38.8%. Pre collapsed stage (Stages I and II was detected in 18 hips (31.03%, collapsed stage (Stages III and IV was detected in 40 hips (68.9%. Peripheral low-intensity rim was seen on T1WI in all 58 cases of AVN. Double line sign on T2-weighted image was seen in 33/58 (56.8%. Conclusion: Our study concluded that coronal T1W sequence is an easy, rapid and cost-effective method of detecting unilateral or bilateral AVN.

  12. Rapid modification of retroviruses using lipid conjugates

    International Nuclear Information System (INIS)

    Mukherjee, Nimisha G; Le Doux, Joseph M; Andrew Lyon, L

    2009-01-01

    Methods are needed to manipulate natural nanoparticles. Viruses are particularly interesting because they can act as therapeutic cellular delivery agents. Here we examine a new method for rapidly modifying retroviruses that uses lipid conjugates composed of a lipid anchor (1,2-distearoyl-sn-glycero-3-phosphoethanolamine), a polyethylene glycol chain, and biotin. The conjugates rapidly and stably modified retroviruses and enabled them to bind streptavidin. The implication of this work for modifying viruses for gene therapy and vaccination protocols is discussed.

  13. Comparing rapid methods for detecting Listeria in seafood and environmental samples using the most probably number (MPN) technique.

    Science.gov (United States)

    Cruz, Cristina D; Win, Jessicah K; Chantarachoti, Jiraporn; Mutukumira, Anthony N; Fletcher, Graham C

    2012-02-15

    The standard Bacteriological Analytical Manual (BAM) protocol for detecting Listeria in food and on environmental surfaces takes about 96 h. Some studies indicate that rapid methods, which produce results within 48 h, may be as sensitive and accurate as the culture protocol. As they only give presence/absence results, it can be difficult to compare the accuracy of results generated. We used the Most Probable Number (MPN) technique to evaluate the performance and detection limits of six rapid kits for detecting Listeria in seafood and on an environmental surface compared with the standard protocol. Three seafood products and an environmental surface were inoculated with similar known cell concentrations of Listeria and analyzed according to the manufacturers' instructions. The MPN was estimated using the MPN-BAM spreadsheet. For the seafood products no differences were observed among the rapid kits and efficiency was similar to the BAM method. On the environmental surface the BAM protocol had a higher recovery rate (sensitivity) than any of the rapid kits tested. Clearview™, Reveal®, TECRA® and VIDAS® LDUO detected the cells but only at high concentrations (>10(2) CFU/10 cm(2)). Two kits (VIP™ and Petrifilm™) failed to detect 10(4) CFU/10 cm(2). The MPN method was a useful tool for comparing the results generated by these presence/absence test kits. There remains a need to develop a rapid and sensitive method for detecting Listeria in environmental samples that performs as well as the BAM protocol, since none of the rapid tests used in this study achieved a satisfactory result. Copyright © 2011 Elsevier B.V. All rights reserved.

  14. Rapid Screening of In-Vitro Regenerated Plantlets of Four Nigerian ...

    African Journals Online (AJOL)

    Prof. Ogunji

    Tissue culture technique provides a rapid means of studying plant-pathogen interaction in a controlled ... Keywords: cowpea, in-vitro regeneration, hormones, Fusarium wilt, protocols. .... solanacearum and evaluation of tomato in Nepal.

  15. Design and Simulation of a High Performance Emergency Data Delivery Protocol

    DEFF Research Database (Denmark)

    Swartz, Kevin; Wang, Di

    2007-01-01

    The purpose of this project was to design a high performance data delivery protocol, capable of delivering data as quickly as possible to a base station or target node. This protocol was designed particularly for wireless network topologies, but could also be applied towards a wired system....... An emergency is defined as any event with high priority that needs to be handled immediately. It is assumed that this emergency event is important enough that energy efficiency is not a factor in our protocol. The desired effect is for fast as possible delivery to the base station for rapid event handling....

  16. Byzantine-fault tolerant self-stabilizing protocol for distributed clock synchronization systems

    Science.gov (United States)

    Malekpour, Mahyar R. (Inventor)

    2010-01-01

    A rapid Byzantine self-stabilizing clock synchronization protocol that self-stabilizes from any state, tolerates bursts of transient failures, and deterministically converges within a linear convergence time with respect to the self-stabilization period. Upon self-stabilization, all good clocks proceed synchronously. The Byzantine self-stabilizing clock synchronization protocol does not rely on any assumptions about the initial state of the clocks. Furthermore, there is neither a central clock nor an externally generated pulse system. The protocol converges deterministically, is scalable, and self-stabilizes in a short amount of time. The convergence time is linear with respect to the self-stabilization period.

  17. Rapid micropropagation of Boesenbergia rotunda (L.) Mansf. Kulturpfl.

    African Journals Online (AJOL)

    Rapid micropropagation of Boesenbergia rotunda (L.) Mansf. Kulturpfl. (a valuable medicinal plant) from shoot bud explants. NA Yusuf, MMS Annuar, N Khalid. Abstract. A successful protocol was developed for mass propagation of Boesenbergia rotunda (L.) Mansf. Kulturpfl., an important medicinal plant. Numerous shoots ...

  18. RapidIO as a multi-purpose interconnect

    Science.gov (United States)

    Baymani, Simaolhoda; Alexopoulos, Konstantinos; Valat, Sébastien

    2017-10-01

    RapidIO (http://rapidio.org/) technology is a packet-switched high-performance fabric, which has been under active development since 1997. Originally meant to be a front side bus, it developed into a system level interconnect which is today used in all 4G/LTE base stations world wide. RapidIO is often used in embedded systems that require high reliability, low latency and scalability in a heterogeneous environment - features that are highly interesting for several use cases, such as data analytics and data acquisition (DAQ) networks. We will present the results of evaluating RapidIO in a data analytics environment, from setup to benchmark. Specifically, we will share the experience of running ROOT and Hadoop on top of RapidIO. To demonstrate the multi-purpose characteristics of RapidIO, we will also present the results of investigating RapidIO as a technology for high-speed DAQ networks using a generic multi-protocol event-building emulation tool. In addition we will present lessons learned from implementing native ports of CERN applications to RapidIO.

  19. A simple and highly efficient Agrobacterium-mediated transformation protocol for Setaria viridis

    Directory of Open Access Journals (Sweden)

    Polyana Kelly Martins

    2015-06-01

    Full Text Available The production and use of sugarcane in Brazil is very important for bioenergy production and is recognized as one of the most efficient in the world. In our laboratory, Setaria viridis is being tested as a model plant for sugarcane. S. viridis has biological attributes (rapid life cycle, small genome, diploid, short stature and simple growth requirements that make it suitable for use as a model system. We report a highly efficient protocol for Agrobacterium-mediated genetic transformation of S. viridis. The optimization of several steps in tissue culture allowed the rapid regeneration of plants and increased the rate of transformation up to 29%. This protocol could become a powerful tool for functional genomics in sugarcane.

  20. Efficient protocol for rapid Aloe vera micropropagation.

    Science.gov (United States)

    Molsaghi, Mozhgan; Moieni, Ahmad; Kahrizi, Danial

    2014-06-01

    Aloe vera Linn. (Liliaceae) is a medicinal plant and has a number of curative properties. Vegetative propagation has not enough potential for supplying market demand. However, via in vitro propagation makes possible the mass production of Aloe plants. The current study was conducted to investigate growth regulators' effects on proliferation of A. vera. In this study, for comparison of plant growth regulators' effects on proliferation, the shoot tips and auxiliary buds of A. vera were cultured in the Murashige and Skoog (MS) medium. Rooted plantlets were transferred to garden soil, compost, and sand in the proportion of 1:1:1, respectively, after hardening. The maximum number of shoots was obtained on the medium supplemented with 1 mg/L IAA+4 mg/L BAP and 0.2 mg/L IAA+0.8 BAP mg/L. Rooting was also achieved in the same media composition proliferation of shoot. The acclimatized plants showed 100% of survival. The regenerated plants looked healthy, and they were morphologically similar to that of stock plants. These results suggest that in vitro culture may be used as a technique for rapid propagation of A. vera.

  1. Wireless Power Transfer Protocols in Sensor Networks: Experiments and Simulations

    Directory of Open Access Journals (Sweden)

    Sotiris Nikoletseas

    2017-04-01

    Full Text Available Rapid technological advances in the domain of Wireless Power Transfer pave the way for novel methods for power management in systems of wireless devices, and recent research works have already started considering algorithmic solutions for tackling emerging problems. In this paper, we investigate the problem of efficient and balanced Wireless Power Transfer in Wireless Sensor Networks. We employ wireless chargers that replenish the energy of network nodes. We propose two protocols that configure the activity of the chargers. One protocol performs wireless charging focused on the charging efficiency, while the other aims at proper balance of the chargers’ residual energy. We conduct detailed experiments using real devices and we validate the experimental results via larger scale simulations. We observe that, in both the experimental evaluation and the evaluation through detailed simulations, both protocols achieve their main goals. The Charging Oriented protocol achieves good charging efficiency throughout the experiment, while the Energy Balancing protocol achieves a uniform distribution of energy within the chargers.

  2. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKDS

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A novel Multiple Access Control(MAC) protocol-User-dependent Perfect-scheduling Multiple Access(UPMA) protocol,which supports joint transmission of voice and data packets,is proposed.By this protocol,the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals(MTs) can be perfectly scheduled by means of polling.Meanwhile.a unique frame stucture is designed to guarantee Quality of Service(QoS) in voice traffic supporting.An effective colision resolution algorthm is also proposed to guarantee rapid channel access for activated MTs.Finally,performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  3. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  4. Evaluation of protocol uniformity concerning laparoscopic cholecystectomy in The Netherlands

    NARCIS (Netherlands)

    L.S.G.L. Wauben; R.H.M. Goossens (Richard); D.J. van Eijk (Daan); J.F. Lange (Johan)

    2008-01-01

    textabstractBackground: Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the "critical view of safety" concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid

  5. Rapid Fishery Assessment by Market Survey (RFAMS--an improved rapid-assessment approach to characterising fish landings in developing countries.

    Directory of Open Access Journals (Sweden)

    William T White

    Full Text Available The complex multi-gear, multi-species tropical fisheries in developing countries are poorly understood and characterising the landings from these fisheries is often impossible using conventional approaches. A rapid assessment method for characterising landings at fish markets, using an index of abundance and estimated weight within taxonomic groups, is described. This approach was developed for contexts where there are no detailed data collection protocols, and where consistent data collection across a wide range of fisheries types and geographic areas is required, regardless of the size of the site and scale of the landings. This methodology, which was demonstrated at seven fish landing sites/fish markets in southern Indonesia between July 2008 and January 2011, provides a rapid assessment of the abundance and diversity in the wild catch over a wide variety of taxonomic groups. The approach has wider application for species-rich fisheries in developing countries where there is an urgent need for better data collection protocols, monitoring future changes in market demographics, and evaluating health of fisheries.

  6. The evaluation of MRI protocols for the quantification of adiposity in the obese

    International Nuclear Information System (INIS)

    Tagami, Hirotaka; Taki, Tomomi; Ueoro, Kouichi

    1998-01-01

    Obesity is a recognized risk factor for the development of diseases such as atherosclerosis, diabetes mellitus and hypertension. The individual risk of the obesity can not be evaluated merely by the body weight or body mass index. The fat distribution is a key to evaluate it. So far, the MRI protocols in the literature tested for the evaluation of the fat distribution were spin-echo and inversion-recovery images. We tested both protocols and couldn't get good images basically due to motion artifacts. Therefore, the field-echo (FE) protocol, a rapid scan protocol, was evaluated. The transverse fat distributions at umbilical level of 8 male obese volunteers were examined with MRI FE protocol and X-ray computed tomography (CT). The excellent images were obtained with FE protocol and correlation with CT images was also satisfactory. The FE protocols for the evaluation of the fat distribution is of use and reasonable tool for the clinical usage. (author)

  7. BioBlocks: Programming Protocols in Biology Made Easier.

    Science.gov (United States)

    Gupta, Vishal; Irimia, Jesús; Pau, Iván; Rodríguez-Patón, Alfonso

    2017-07-21

    The methods to execute biological experiments are evolving. Affordable fluid handling robots and on-demand biology enterprises are making automating entire experiments a reality. Automation offers the benefit of high-throughput experimentation, rapid prototyping, and improved reproducibility of results. However, learning to automate and codify experiments is a difficult task as it requires programming expertise. Here, we present a web-based visual development environment called BioBlocks for describing experimental protocols in biology. It is based on Google's Blockly and Scratch, and requires little or no experience in computer programming to automate the execution of experiments. The experiments can be specified, saved, modified, and shared between multiple users in an easy manner. BioBlocks is open-source and can be customized to execute protocols on local robotic platforms or remotely, that is, in the cloud. It aims to serve as a de facto open standard for programming protocols in Biology.

  8. Identifying Watershed, Landscape, and Engineering Design Factors that Influence the Biotic Condition of Restored Streams

    Directory of Open Access Journals (Sweden)

    Barbara Doll

    2016-04-01

    Full Text Available Restored stream reaches at 79 sites across North Carolina were sampled for aquatic macroinvertebrates using a rapid bioassessment protocol. Morphological design parameters and geographic factors, including watershed and landscape parameters (e.g., valley slope, substrate, were also compiled for these streams. Principal component regression analyses revealed correlations between design and landscape variables with macroinvertebrate metrics. The correlations were strengthened by adding watershed variables. Ridge regression was used to find the best-fit model for predicting dominant taxa from the “pollution sensitive” orders of Ephemeroptera (mayflies, Plecoptera (stoneflies, and Trichoptera (caddisflies, or EPT taxa, resulting in coefficient weights that were most interpretable relative to site selection and design parameters. Results indicate that larger (wider streams located in the mountains and foothills where there are steeper valleys, larger substrate, and undeveloped watersheds are expected to have higher numbers of dominant EPT taxa. In addition, EPT taxa numbers are positively correlated with accessible floodplain width and negatively correlated with width-to-depth ratio and sinuosity. This study indicates that both site selection and design should be carefully considered in order to maximize the resulting biotic condition and associated potential ecological uplift of the stream.

  9. A rapid challenge protocol for determination of non-specific bronchial responsiveness

    DEFF Research Database (Denmark)

    Madsen, F; Nielsen, N H; Holstein-Rathlou, N H

    1986-01-01

    A rapid method for determination of non-specific bronchial hyperreactivity was developed. Resistance to breathing was determined by a modified expiratory airway interrupter technique and combined with a dosimeter-controlled nebulizer which made continuous determination of response possible during...... hyperreactivity since individual dose titration is easily performed, and the method could be valuable in epidemiological and occupational surveys as well.......A rapid method for determination of non-specific bronchial hyperreactivity was developed. Resistance to breathing was determined by a modified expiratory airway interrupter technique and combined with a dosimeter-controlled nebulizer which made continuous determination of response possible during...... challenge. The patients inhaled histamine chloride 8 mg/ml at every eighth breath until resistance to breathing (Rt) was increased by 60%. The number of inhalations (NI) or the provocative concentration (PC60-Rt) of histamine increasing Rt by 60% were determined in 68 patients. The new method correlated...

  10. Rapid Screening for Cognitive Impairment in Parkinson’s Disease: A Pilot Study

    Directory of Open Access Journals (Sweden)

    YanHong Dong

    2015-01-01

    Full Text Available Aim. This study sought to establish the discriminant validity of a rapid cognitive screen, that is, the National Institute of Neurological Disease and Stroke-Canadian Stroke Network (NINDS-CSN 5-minute protocol, and compare its discriminant validity to the Montreal Cognitive Assessment (MoCA and Mini Mental State Examination (MMSE in detecting cognitive impairment (CI in PD patients. Methods. One hundred and one PD patients were recruited from a movement disorders clinic in Singapore and they received the NINDS-CSN 5-minute protocol, MoCA, and MMSE. No cognitive impairment (NCI was defined as Clinical Dementia Rating (CDR = 0 and CI was defined as CDR ≥ 0.5. Results. Area under the receiver operating characteristic curve of NINDS-CSN 5-minute protocol was statistically equivalent to MoCA and larger than MMSE (0.86 versus 0.90, P=0.07; 0.86 versus 0.76, P=0.03. The sensitivity of NINDS-CSN 5-minute protocol (<9 was statistically equivalent to MoCA (<22 (0.77 versus 0.85, P=0.13 and superior to MMSE (<24 (0.77 versus 0.52, P<0.01 in detecting CI, while the specificity of NINDS-CSN 5-minute protocol (<9 was statistically equivalent to MoCA (<22 and MMSE (<24 (0.78 versus 0.88, P=0.34. Conclusion. The NINDS-CSN 5-minute protocol is time expeditious while remaining statistically equivalent to MoCA and superior to MMSE and therefore is suitable for rapid cognitive screening of CI in PD patients.

  11. Early warning systems and rapid response to the deteriorating patient in hospital: A realist evaluation.

    Science.gov (United States)

    McGaughey, Jennifer; O'Halloran, Peter; Porter, Sam; Trinder, John; Blackwood, Bronagh

    2017-12-01

    To test the Rapid Response Systems programme theory against actual practice components of the Rapid Response Systems implemented to identify those contexts and mechanisms which have an impact on the successful achievement of desired outcomes in practice. Rapid Response Systems allow deteriorating patients to be recognized using Early Warning Systems, referred early via escalation protocols and managed at the bedside by competent staff. Realist evaluation. The research design was an embedded multiple case study approach of four wards in two hospitals in Northern Ireland which followed the principles of Realist Evaluation. We used various mixed methods including individual and focus group interviews, observation of nursing practice between June-November 2010 and document analysis of Early Warning Systems audit data between May-October 2010 and hospital acute care training records over 4.5 years from 2003-2008. Data were analysed using NiVivo8 and SPPS. A cross-case analysis highlighted similar patterns of factors which enabled or constrained successful recognition, referral and response to deteriorating patients in practice. Key enabling factors were the use of clinical judgement by experienced nurses and the empowerment of nurses as a result of organizational change associated with implementation of Early Warning System protocols. Key constraining factors were low staffing and inappropriate skill mix levels, rigid implementation of protocols and culturally embedded suboptimal communication processes. Successful implementation of Rapid Response Systems was dependent on adopting organizational and cultural changes that facilitated staff empowerment, flexible implementation of protocols and ongoing experiential learning. © 2017 John Wiley & Sons Ltd.

  12. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  13. Efficiency of the SASS4 rapid bioassessment protocol in determining river health: A case study on the Mhlathuze River, KwaZulu-Natal, South Africa

    CSIR Research Space (South Africa)

    Vos, P

    2002-01-01

    Full Text Available the labour and time factors confronting freshwater ecologists, since the number of habitats examined and the replicated sample units taken per site are reduced (Chutter, 1994). Dallas (1995, 1997) addressed some of the uncertainties associated with SASS4... 3b 4l 4a 4b 5l 5a 5b 6l 6a 6b I II III VI V Number of taxa ASPT values 2c 2d 2e 3c 3d 3e 4c 4d 4e 5c5d 5e 6c 6d 6e I II III IV V VI VII 2f 2g 2h 3f 3g 3h 4f 4g 4h 5f5g 5h 6g 6h I II III IV V VI 2i 2j 2k 3i 3j 3k 4i4j 4k 5i 5j 5k 6i 6j6k I II III IV V...

  14. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  15. Quorum system and random based asynchronous rendezvous protocol for cognitive radio ad hoc networks

    Directory of Open Access Journals (Sweden)

    Sylwia Romaszko

    2013-12-01

    Full Text Available This paper proposes a rendezvous protocol for cognitive radio ad hoc networks, RAC2E-gQS, which utilizes (1 the asynchronous and randomness properties of the RAC2E protocol, and (2 channel mapping protocol, based on a grid Quorum System (gQS, and taking into account channel heterogeneity and asymmetric channel views. We show that the combination of the RAC2E protocol with the grid-quorum based channel mapping can yield a powerful RAC2E-gQS rendezvous protocol for asynchronous operation in a distributed environment assuring a rapid rendezvous between the cognitive radio nodes having available both symmetric and asymmetric channel views. We also propose an enhancement of the protocol, which uses a torus QS for a slot allocation, dealing with the worst case scenario, a large number of channels with opposite ranking lists.

  16. A rapid mini-prep DNA extraction method in rice (Oryza sativa)

    African Journals Online (AJOL)

    STORAGESEVER

    2009-01-19

    Jan 19, 2009 ... homogenizer with a plastic tip is incomplete, since the leaves of these plants .... mortar and pestle with liquid nitrogen and transferred to a tube. ... rapid DNA extraction protocols for gymnosperms for application in population ...

  17. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    Science.gov (United States)

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  18. A new rapid kindling variant for induction of cortical epileptogenesis in freely moving rats

    Directory of Open Access Journals (Sweden)

    Juan Carlos Morales

    2014-07-01

    Full Text Available Kindling, one of the most used models of experimental epilepsy is based on daily electrical stimulation in several brain structures. Unlike the classic or slow kindling protocols (SK, the rapid kindling types (RK described until now require continuous stimulation at suprathreshold intensities applied directly to the same brain structure used for subsequent electrophysiological and inmunohistochemical studies, usually the hippocampus. However, the cellular changes observed in these rapid protocols, such as astrogliosis and neuronal loss, could be due to experimental manipulation more than to epileptogenesis-related alterations. Here, we developed a new RK protocol in order to generate an improved model of temporal lobe epilepsy (TLE which allows gradual progression of the epilepsy as well as obtaining an epileptic hippocampus, thus avoiding direct surgical manipulation and electric stimulation over this structure. This new protocol consists of basolateral amygdala (BLA stimulation with 10 trains of biphasic pulses (10s;50Hz per day with 20 minutes-intervals, during 3 consecutive days, using a subconvulsive and subthreshold intensity, which guarantees tissue integrity. The progression of epileptic activity was evaluated in freely moving rats through EEG recordings from cortex and amygdala, accompanied with synchronized video recordings. Moreover, we assessed the effectiveness of RK protocol and the establishment of epilepsy by evaluating cellular alterations of hippocampal slices from kindled rats. RK protocol induced convulsive states similar to SK protocols but in 3 days, with persistently lowered threshold to seizure induction and epileptogenic-dependent cellular changes in amygdala projection areas. We concluded that this novel RK protocol introduces a new variant of the chronic epileptogenesis models in freely moving rats, which is faster, highly reproducible and causes minimum cell damage with respect to that observed in other experimental

  19. An approach for evaluating the repeatability of rapid wetland assessment methods: The effects of training and experience

    Science.gov (United States)

    We sampled 92 wetlands from four different basins in the United States to quantify observer repeatability in rapid wetland condition assessment using the Delaware Rapid Assessment Protocol (DERAP). In the Inland Bays basin of Delaware, 58 wetland sites were sampled by multiple ob...

  20. A rapid two step protocol of in vitro propagation of an important ...

    African Journals Online (AJOL)

    chandrakant tiwari

    2013-03-06

    Mar 6, 2013 ... Attempts were made to evolve a rapid in vitro technology ..... Values are given as mean ± standard error (SE) of three replicates; each replicate consisted of 24 .... Seminar on Herbal Conservation, Cultivation, Marketing and.

  1. Rapid and Easy Protocol for Quantification of Next-Generation Sequencing Libraries.

    Science.gov (United States)

    Hawkins, Steve F C; Guest, Paul C

    2018-01-01

    The emergence of next-generation sequencing (NGS) over the last 10 years has increased the efficiency of DNA sequencing in terms of speed, ease, and price. However, the exact quantification of a NGS library is crucial in order to obtain good data on sequencing platforms developed by the current market leader Illumina. Different approaches for DNA quantification are available currently and the most commonly used are based on analysis of the physical properties of the DNA through spectrophotometric or fluorometric methods. Although these methods are technically simple, they do not allow exact quantification as can be achieved using a real-time quantitative PCR (qPCR) approach. A qPCR protocol for DNA quantification with applications in NGS library preparation studies is presented here. This can be applied in various fields of study such as medical disorders resulting from nutritional programming disturbances.

  2. A PROPOSED MAPPING ARCHITECTURE BETWEEN IAX AND JINGLE PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Hadeel Saleh Haj Aliwi

    2016-03-01

    Full Text Available Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call even if they use different chatting applications. Providing the interoperability between different signaling protocols and multimedia applications takes the advantages of more than one protocol. Many mapping architectures have been proposed to ease exchanging the media between at least two users without facing any difficulties such as SIP-Jingle, IAX-RSW, H.323-MGCP, etc. However, the design of any of the existing mapping architectures has some weaknesses related to larger delay, time consuming, and security matters. The only way to overcome these problems is to propose an efficient mapping architecture. This paper proposed a new mapping architecture between Inter-Asterisk eXchange Protocol and Jingle Protocol. The proposed mapping architecture consists of IAX domain (IAX client, IAX server, IAX-to-Jingle gateway, and Jingle domain (Jingle client, Jingle server, Jingle-to-IAX gateway. The tasks of the translation gateways are represented by the URI conversion, media capability exchange, translator of call setup and teardown signals, and real time media transmission.

  3. Rancang Bangun Perangkat Lunak Billing dan Implementasi Voice Over Internet Protocol

    Directory of Open Access Journals (Sweden)

    Honni Honni

    2013-12-01

    Full Text Available The rapidly evolving communication system enables applications for telephone communication to be carried over the data network known as VoIP (voice over internet protocol. SIP (session initiation protocol as the signaling protocol is text-based VoIP which can be implemented easily in comparison with other signalingprotocols. The purpose of this paper is designing and implementing VoIP billing up to the company to provide additional facilities for enterprise customers. The methods start with data collection, analysis, design, development, and implementation. The result achieved is a system of VoIP with SIP and Asterisk software which has functions of PBX to provide additional facilities such as VoIP which is a plus for the company and customers. After implemented, the VoIP system and billing features are found work well.

  4. A Survey on Temperature-Aware Routing Protocols in Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sangman Moh

    2013-08-01

    Full Text Available The rapid growth of the elderly population in the world and the rising cost of healthcare impose big issues for healthcare and medical monitoring. A Wireless Body Sensor Network (WBSN is comprised of small sensor nodes attached inside, on or around a human body, the main purpose of which is to monitor the functions and surroundings of the human body. However, the heat generated by the node’s circuitry and antenna could cause damage to the human tissue. Therefore, in designing a routing protocol for WBSNs, it is important to reduce the heat by incorporating temperature into the routing metric. The main contribution of this paper is to survey existing temperature-aware routing protocols that have been proposed for WBSNs. In this paper, we present a brief overview of WBSNs, review the existing routing protocols comparatively and discuss challenging open issues in the design of routing protocols.

  5. Quantum feedback for rapid state preparation in the presence of control imperfections

    International Nuclear Information System (INIS)

    Combes, Joshua; Wiseman, Howard M

    2011-01-01

    Quantum feedback control protocols can improve the operation of quantum devices. Here we examine the performance of a purification protocol when there are imperfections in the controls. The ideal feedback protocol produces an x-eigenstate from a mixed state in the minimum time, and is known as rapid state preparation. The imperfections we examine include time delays in the feedback loop, finite strength feedback, calibration errors and inefficient detection. We analyse these imperfections using the Wiseman-Milburn feedback master equation and related formalism. We find that the protocol is most sensitive to time delays in the feedback loop. For systems with slow dynamics, however, our analysis suggests that inefficient detection would be the bigger problem. We also show how system imperfections, such as dephasing and damping, can be included in a model via the feedback master equation.

  6. FLIP: Federation support for Long range low power Internet of things Protocols

    OpenAIRE

    Delbruel, Stéphane; Small, Nicolas; Hughes, Danny

    2017-01-01

    There is growing interest in the Internet of Things (IoT) and especially Low-Power Wide Area Networks (LPWAN), which are rapidly being rolled-out globally. Within the LPWAN market, LoRaWAN is considered a leading solution which has achieved significant success. Despite the rapid uptake of LoRaWAN, scalability concerns arising from interference and contention are also growing. While the current LoRaWAN protocol includes basic techniques to deal with these problems, recent research has shown th...

  7. Determination of hydrazine in drinking water: Development and multivariate optimization of a rapid and simple solid phase microextraction-gas chromatography-triple quadrupole mass spectrometry protocol.

    Science.gov (United States)

    Gionfriddo, Emanuela; Naccarato, Attilio; Sindona, Giovanni; Tagarelli, Antonio

    2014-07-04

    In this work, the capabilities of solid phase microextraction were exploited in a fully optimized SPME-GC-QqQ-MS analytical approach for hydrazine assay. A rapid and easy method was obtained by a simple derivatization reaction with propyl chloroformate and pyridine carried out directly in water samples, followed by automated SPME analysis in the same vial without further sample handling. The affinity of the different derivatized compounds obtained towards five commercially available SPME coatings was evaluated, in order to achieve the best extraction efficiency. GC analyses were carried out using a GC-QqQ-MS instrument in selected reaction monitoring (SRM) acquisition mode which has allowed the achievement of high specificity by selecting appropriate precursor-product ion couples improving the capability in analyte identification. The multivariate approach of experimental design was crucial in order to optimize derivatization reaction, SPME process and tandem mass spectrometry parameters. Accuracy of the proposed protocol, tested at 60, 200 and 800 ng L(-1), provided satisfactory values (114.2%, 83.6% and 98.6%, respectively), whereas precision (RSD%) at the same concentration levels were of 10.9%, 7.9% and 7.7% respectively. Limit of detection and quantification of 4.4 and 8.3 ng L(-1) were obtained. The reliable application of the proposed protocol to real drinking water samples confirmed its capability to be used as analytical tool for routine analyses. Copyright © 2014 Elsevier B.V. All rights reserved.

  8. Advanced CUBIC protocols for whole-brain and whole-body clearing and imaging.

    Science.gov (United States)

    Susaki, Etsuo A; Tainaka, Kazuki; Perrin, Dimitri; Yukinaga, Hiroko; Kuno, Akihiro; Ueda, Hiroki R

    2015-11-01

    Here we describe a protocol for advanced CUBIC (Clear, Unobstructed Brain/Body Imaging Cocktails and Computational analysis). The CUBIC protocol enables simple and efficient organ clearing, rapid imaging by light-sheet microscopy and quantitative imaging analysis of multiple samples. The organ or body is cleared by immersion for 1-14 d, with the exact time required dependent on the sample type and the experimental purposes. A single imaging set can be completed in 30-60 min. Image processing and analysis can take whole-brain neural activities at single-cell resolution using Arc-dVenus transgenic (Tg) mice. CUBIC informatics calculated the Venus signal subtraction, comparing different brains at a whole-organ scale. These protocols provide a platform for organism-level systems biology by comprehensively detecting cells in a whole organ or body.

  9. Generating regionalized neuronal cells from pluripotency, a step-by-step protocol

    Directory of Open Access Journals (Sweden)

    Agnete eKirkeby

    2013-01-01

    Full Text Available Human pluripotent stem cells possess the potential to generate cells for regenerative therapies in patients with neurodegenerative diseases, and constitute an excellent cell source for studying human neural development and disease modeling. Protocols for neural differentiation of human pluripotent stem cells have undergone significant progress during recent years, allowing for rapid and synchronized neural conversion. Differentiation procedures can further be combined with accurate and efficient positional patterning to yield regionalized neural progenitors and subtype-specific neurons corresponding to different parts of the developing human brain. Here, we present a step-by-step protocol for neuralization and regionalization of human pluripotent cells for transplantation studies or in vitro analysis.

  10. A rapid two step protocol of in vitro propagation of an important ...

    African Journals Online (AJOL)

    Attempts were made to evolve a rapid in vitro technology to conserve, as well as, mass propagate this valuable medicinal herb in very short duration. The combinations of ... MS media supplemented with BAP with IBA (4:0.5 and 5:0.5) resulted in shooting, as well as, rooting simultaneously. Micro propagated plantlets were ...

  11. Industrial wireless sensor networks applications, protocols, and standards

    CERN Document Server

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  12. RApid Primary care Initiation of Drug treatment for Transient Ischaemic Attack (RAPID-TIA): study protocol for a pilot randomised controlled trial.

    Science.gov (United States)

    Edwards, Duncan; Fletcher, Kate; Deller, Rachel; McManus, Richard; Lasserson, Daniel; Giles, Matthew; Sims, Don; Norrie, John; McGuire, Graham; Cohn, Simon; Whittle, Fiona; Hobbs, Vikki; Weir, Christopher; Mant, Jonathan

    2013-07-02

    People who have a transient ischaemic attack (TIA) or minor stroke are at high risk of a recurrent stroke, particularly in the first week after the event. Early initiation of secondary prevention drugs is associated with an 80% reduction in risk of stroke recurrence. This raises the question as to whether these drugs should be given before being seen by a specialist--that is, in primary care or in the emergency department. The aims of the RAPID-TIA pilot trial are to determine the feasibility of a randomised controlled trial, to analyse cost effectiveness and to ask: Should general practitioners and emergency doctors (primary care physicians) initiate secondary preventative measures in addition to aspirin in people they see with suspected TIA or minor stroke at the time of referral to a specialist? This is a pilot randomised controlled trial with a sub-study of accuracy of primary care physician diagnosis of TIA. In the pilot trial, we aim to recruit 100 patients from 30 general practices (including out-of-hours general practice centres) and 1 emergency department whom the primary care physician diagnoses with TIA or minor stroke and randomly assign them to usual care (that is, initiation of aspirin and referral to a TIA clinic) or usual care plus additional early initiation of secondary prevention drugs (a blood-pressure lowering protocol, simvastatin 40 mg and dipyridamole 200 mg m/r bd). The primary outcome of the main study will be the number of strokes at 90 days. The diagnostic accuracy sub-study will include these 100 patients and an additional 70 patients in whom the primary care physician thinks the diagnosis of TIA is possible, rather than probable. For the pilot trial, we will report recruitment rate, follow-up rate, a preliminary estimate of the primary event rate and occurrence of any adverse events. For the diagnostic study, we will calculate sensitivity and specificity of primary care physician diagnosis using the final TIA clinic diagnosis as the

  13. Matrix-assisted laser desorption/ionization-time of flight mass spectrometry: protocol standardization and database expansion for rapid identification of clinically important molds.

    Science.gov (United States)

    Paul, Saikat; Singh, Pankaj; Rudramurthy, Shivaprakash M; Chakrabarti, Arunaloke; Ghosh, Anup K

    2017-12-01

    To standardize the matrix-assisted laser desorption ionization-time of flight mass spectrometry protocols and expansion of existing Bruker Biotyper database for mold identification. Four different sample preparation methods (protocol A, B, C and D) were evaluated. On analyzing each protein extraction method, reliable identification and best log scores were achieved through protocol D. The same protocol was used to identify 153 clinical isolates. Of these 153, 123 (80.3%) were accurately identified by using existing database and remaining 30 (19.7%) were not identified due to unavailability in database. On inclusion of missing main spectrum profile in existing database, all 153 isolates were identified. Matrix-assisted laser desorption ionization-time of flight mass spectrometry can be used for routine identification of clinically important molds.

  14. MALDI-TOF mass spectrometry for rapid diagnosis of postoperative endophthalmitis.

    Science.gov (United States)

    Mailhac, Adriane; Durand, Harmonie; Boisset, Sandrine; Maubon, Danièle; Berger, Francois; Maurin, Max; Chiquet, Christophe; Bidart, Marie

    2017-01-30

    This study describes an innovative strategy for rapid detection and identification of bacteria causing endophthalmitis, combining the use of an automated blood culture system with MALDI-TOF mass spectrometry methodology. Using this protocol, we could identify 96% of 45 bacterial strains isolated from vitreous samples collected in acute post-operative endophthalmitis patients. Copyright © 2016 Elsevier B.V. All rights reserved.

  15. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    Prayer, Daniela; Brugger, Peter Christian; Prayer, Lucas

    2004-01-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  16. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  17. Rapid analysis and exploration of fluorescence microscopy images.

    Science.gov (United States)

    Pavie, Benjamin; Rajaram, Satwik; Ouyang, Austin; Altschuler, Jason M; Steininger, Robert J; Wu, Lani F; Altschuler, Steven J

    2014-03-19

    Despite rapid advances in high-throughput microscopy, quantitative image-based assays still pose significant challenges. While a variety of specialized image analysis tools are available, most traditional image-analysis-based workflows have steep learning curves (for fine tuning of analysis parameters) and result in long turnaround times between imaging and analysis. In particular, cell segmentation, the process of identifying individual cells in an image, is a major bottleneck in this regard. Here we present an alternate, cell-segmentation-free workflow based on PhenoRipper, an open-source software platform designed for the rapid analysis and exploration of microscopy images. The pipeline presented here is optimized for immunofluorescence microscopy images of cell cultures and requires minimal user intervention. Within half an hour, PhenoRipper can analyze data from a typical 96-well experiment and generate image profiles. Users can then visually explore their data, perform quality control on their experiment, ensure response to perturbations and check reproducibility of replicates. This facilitates a rapid feedback cycle between analysis and experiment, which is crucial during assay optimization. This protocol is useful not just as a first pass analysis for quality control, but also may be used as an end-to-end solution, especially for screening. The workflow described here scales to large data sets such as those generated by high-throughput screens, and has been shown to group experimental conditions by phenotype accurately over a wide range of biological systems. The PhenoBrowser interface provides an intuitive framework to explore the phenotypic space and relate image properties to biological annotations. Taken together, the protocol described here will lower the barriers to adopting quantitative analysis of image based screens.

  18. A Simple, Rapid and Efficient One-pot Protocol for the Synthesis of 2 ...

    African Journals Online (AJOL)

    NJD

    A rapid and efficient condensation reaction of 2-aminothiophenol with various fatty acids in solvent-free conditions with or without microwave irradiation was ... heterocyclic compounds that have widespread applications in pharmaceutical and ... catalyzed reaction of aryl halides with o-aminothiophenol in presence of carbon ...

  19. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  20. An efficient regeneration and rapid micropropagation protocol for Almond using dormant axillary buds as explants.

    Science.gov (United States)

    Choudhary, Ravish; Chaudhury, Rekha; Malik, Surendra Kumar; Sharma, Kailash Chandra

    2015-07-01

    An efficient in vitro protocol was standardized for Almond (Prunus dulcis) propagation using dormant axillary buds as explants. Explants were cultured on Murashige and Skoog (MS) and woody plant medium (WPM) supplemented with different concentration/combination(s) of phytohormones. MS basal medium showed lowest shoot induction and took longest duration for shoot initiation. Multiple shoots were induced in MS medium supplemented with the combination of BAP (0.5 mgL(-1)). Cultures showed poor response for rooting in all combinations of plant growth regulators (PGRs) and took 90 days for initiation. Rooting was higher in half strength of MS than in full-strength. The highest root induction (33.33%) was recorded in half MS medium supplemented with 0.1 mgL(-1) IBA (indole-3-butyric acid) followed by full strength of MS medium (20%) supplemented with IBA (0.1 mgL(-1)). α-Naphthalene acetic acid (NAA) was less effective for rooting than IBA. The highest root induction (25%) was found in half strength of MS medium supplemented with 0.1 mgL(-1) NAA followed by full strength of MS medium (20%). The protocol developed would be of use in mass propagation of almond and also support in vitro conservation.

  1. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  2. EU-approved rapid tests for bovine spongiform encephalopathy detect atypical forms: a study for their sensitivities.

    Directory of Open Access Journals (Sweden)

    Daniela Meloni

    Full Text Available Since 2004 it become clear that atypical bovine spongiform encephalopthies (BSEs exist in cattle. Whenever their detection has relied on active surveillance plans implemented in Europe since 2001 by rapid tests, the overall and inter-laboratory performance of these diagnostic systems in the detection of the atypical strains has not been studied thoroughly to date. To fill this gap, the present study reports on the analytical sensitivity of the EU-approved rapid tests for atypical L- and H-type and classical BSE in parallel. Each test was challenged with two dilution series, one created from a positive pool of the three BSE forms according to the EURL standard method of homogenate preparation (50% w/v and the other as per the test kit manufacturer's instructions. Multilevel logistic models and simple logistic models with the rapid test as the only covariate were fitted for each BSE form analyzed as directed by the test manufacturer's dilution protocol. The same schemes, but excluding the BSE type, were then applied to compare test performance under the manufacturer's versus the water protocol. The IDEXX HerdChek ® BSE-scrapie short protocol test showed the highest sensitivity for all BSE forms. The IDEXX® HerdChek BSE-scrapie ultra short protocol, the Prionics®--Check WESTERN and the AJ Roboscreen® BetaPrion tests showed similar sensitivities, followed by the Roche® PrionScreen, the Bio-Rad® TeSeE™ SAP and the Prionics®--Check PrioSTRIP in descending order of analytical sensitivity. Despite these differences, the limit of detection of all seven rapid tests against the different classes of material set within a 2 log(10 range of the best-performing test, thus meeting the European Food Safety Authority requirement for BSE surveillance purposes. These findings indicate that not many atypical cases would have been missed surveillance since 2001 which is important for further epidemiological interpretations of the sporadic character of

  3. Development of a rapid and simplified protocol for direct bacterial identification from positive blood cultures by using matrix assisted laser desorption ionization time-of- flight mass spectrometry.

    Science.gov (United States)

    Jakovljev, Aleksandra; Bergh, Kåre

    2015-11-06

    Bloodstream infections represent serious conditions carrying a high mortality and morbidity rate. Rapid identification of microorganisms and prompt institution of adequate antimicrobial therapy is of utmost importance for a successful outcome. Aiming at the development of a rapid, simplified and efficient protocol, we developed and compared two in-house preparatory methods for the direct identification of bacteria from positive blood culture flasks (BD BACTEC FX system) by using matrix-assisted laser desorption ionization time-of-flight mass spectrometry (MALDI TOF MS). Both methods employed saponin and distilled water for erythrocyte lysis. In method A the cellular pellet was overlaid with formic acid on the MALDI TOF target plate for protein extraction, whereas in method B the pellet was exposed to formic acid followed by acetonitrile prior to placing on the target plate. Best results were obtained by method A. Direct identification was achieved for 81.9 % and 65.8 % (50.3 % and 26.2 % with scores >2.0) of organisms by method A and method B, respectively. Overall concordance with final identification was 100 % to genus and 97.9 % to species level. By applying a lower cut-off score value, the levels of identification obtained by method A and method B increased to 89.3 % and 77.8 % of organisms (81.9 % and 65.8 % identified with scores >1.7), respectively. Using the lowered score criteria, concordance with final results was obtained for 99.3 % of genus and 96.6 % of species identifications. The reliability of results, rapid performance (approximately 25 min) and applicability of in-house method A have contributed to implementation of this robust and cost-effective method in our laboratory.

  4. Rapid identification of DNA-binding proteins by mass spectrometry

    DEFF Research Database (Denmark)

    Nordhoff, E.; Korgsdam, A.-M.; Jørgensen, H.F.

    1999-01-01

    We report a protocol for the rapid identification of DNA-binding proteins. Immobilized DNA probes harboring a specific sequence motif are incubated with cell or nuclear extract. Proteins are analyzed directly off the solid support by matrix-assisted laser desorption/ionization time-of-flight mass...... was validated by the identification of known prokaryotic and eukaryotic DNA-binding proteins, and its use provided evidence that poly(ADP-ribose) polymerase exhibits DNA sequence-specific binding to DNA....

  5. Rapid deletion production in fungi via Agrobacterium mediated transformation of OSCAR deletion contructs.

    Science.gov (United States)

    Precise deletion of gene(s) of interest, while leaving the rest of the genome unchanged, provides the ideal product to determine that particular gene’s function in the living organism. In this protocol we describe the OSCAR method of precise and rapid deletion plasmid construction. OSCAR relies on t...

  6. The Virtual Insect Brain protocol: creating and comparing standardized neuroanatomy

    Science.gov (United States)

    Jenett, Arnim; Schindelin, Johannes E; Heisenberg, Martin

    2006-01-01

    Background In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. These diverse investigations on the function of the insect brain use gene expression patterns that can be visualized and provide the means for manipulating groups of neurons as a common ground. To take advantage of these patterns one needs to know their typical anatomy. Results This paper describes the Virtual Insect Brain (VIB) protocol, a script suite for the quantitative assessment, comparison, and presentation of neuroanatomical data. It is based on the 3D-reconstruction and visualization software Amira, version 3.x (Mercury Inc.) [1]. Besides its backbone, a standardization procedure which aligns individual 3D images (series of virtual sections obtained by confocal microscopy) to a common coordinate system and computes average intensities for each voxel (volume pixel) the VIB protocol provides an elaborate data management system for data administration. The VIB protocol facilitates direct comparison of gene expression patterns and describes their interindividual variability. It provides volumetry of brain regions and helps to characterize the phenotypes of brain structure mutants. Using the VIB protocol does not require any programming skills since all operations are carried out at an intuitively usable graphical user interface. Although the VIB protocol has been developed for the standardization of Drosophila neuroanatomy, the program structure can be used for the standardization of other 3D structures as well. Conclusion Standardizing brains and gene expression patterns is a new approach to biological shape and its variability. The VIB protocol provides a first set of tools supporting this endeavor in Drosophila. The script suite is freely available at [2] PMID:17196102

  7. A novel method for perceptual assessment of small room acoustics using rapid sensory analysis

    DEFF Research Database (Denmark)

    Kaplanis, Neofytos; Bech, Søren; Lokki, Tapio

    2016-01-01

    presented with auralized sound over a loudspeaker array and followed a rapid sensory analysis protocol. The elicited attributes and ratings are analyzed and possible links to the acoustical properties of these spaces are discussed. [This study is a part of Marie Curie Network on Dereverberation...

  8. Team Training and Institutional Protocols to Prevent Shoulder Dystocia Complications.

    Science.gov (United States)

    Smith, Samuel

    2016-12-01

    Shoulder dystocia is an obstetrical emergency that may result in significant neonatal complications. It requires rapid recognition and a coordinated response. Standardization of care, teamwork and communication, and clinical simulation are the key components of patient safety programs in obstetrics. Simulation-based team training and institutional protocols for the management of shoulder dystocia are emerging as integral components of many labor and delivery safety initiatives because of their impact on technical skills and team performance.

  9. [Castleman's disease: Rapid desensitization for hypersensitivity reaction to rituximab].

    Science.gov (United States)

    Boin, C; Lambert, S; Thomann, P; Aujoulat, O; Kieffer, P

    2016-06-01

    Rapid desensitization allows secure administration of a drug and is indicated when there is no therapeutic alternative. We report a 49-year-old patient who presented with a hypersensitivity reaction following an infusion of rituximab (375mg/m(2)) in the context of a Castleman's syndrome. After a clinical flare (splenomegaly, adenopathies) despite treatment with tocilizumab, anakinra and valganciclovir, the reintroduction of rituximab was decided, according to the rapid desensitization protocol. Four full dose desensitizations were successfully performed allowing immediate clinical improvement (apyrexia, loss of sweating and lymphadenopathy, splenomegaly partial regression) and biological (negativation of HHV8 viral load, and disappearance of neutropenia, anemia and thrombocytopenia). Rapid desensitization is a promising method for the pursuit of rituximab therapy after a hypersensitivity reaction and should be considered in patients with no acceptable therapeutic alternative. Copyright © 2015 Société Nationale Française de Médecine Interne (SNFMI). Published by Elsevier SAS. All rights reserved.

  10. Screening Protocol for Early Identification of Brazilian Children at Risk for Dyslexia

    Directory of Open Access Journals (Sweden)

    Giseli D. Germano

    2017-10-01

    Full Text Available Early identification of students at risk of dyslexia has been an educational challenge in the past years. This research had two main goals. First, we aimed to develop a screening protocol for early identification of Brazilian children at risk for dyslexia; second, we aimed to identify the predictive variables of this protocol using Principal Component Analysis. The major step involved in developing this protocol was the selection of variables, which were chosen based on the literature review and linguistic criteria. The screening protocol was composed of seven cognitive-linguistic skills: Letter naming; Phonological Awareness (which comprises the following subtests: Rhyme production, Rhyme identification, Syllabic segmentation, Production of words from a given phoneme, Phonemic Synthesis, and Phonemic analysis; Phonological Working memory, Rapid naming Speed; Silent reading; Reading of words and non-words; and Auditory Comprehension of sentences from pictures. A total of 149 children, aged from 6 years to 6 and 11, of both genders who were enrolled in the 1st grade of elementary public schools were submitted to the screening protocol. Principal Component Analysis revealed four factors, accounting for 64.45% of the variance of the Protocol variables: first factor (“pre-reading”, second factor (“decoding”, third factor (“Reading”, and fourth factor “Auditory processing.” The factors found corroborate those reported in the National and International literature and have been described as early signs of dyslexia and reading problems.

  11. Evaluation of a transposase protocol for rapid generation of shotgun high-throughput sequencing libraries from nanogram quantities of DNA.

    Science.gov (United States)

    Marine, Rachel; Polson, Shawn W; Ravel, Jacques; Hatfull, Graham; Russell, Daniel; Sullivan, Matthew; Syed, Fraz; Dumas, Michael; Wommack, K Eric

    2011-11-01

    Construction of DNA fragment libraries for next-generation sequencing can prove challenging, especially for samples with low DNA yield. Protocols devised to circumvent the problems associated with low starting quantities of DNA can result in amplification biases that skew the distribution of genomes in metagenomic data. Moreover, sample throughput can be slow, as current library construction techniques are time-consuming. This study evaluated Nextera, a new transposon-based method that is designed for quick production of DNA fragment libraries from a small quantity of DNA. The sequence read distribution across nine phage genomes in a mock viral assemblage met predictions for six of the least-abundant phages; however, the rank order of the most abundant phages differed slightly from predictions. De novo genome assemblies from Nextera libraries provided long contigs spanning over half of the phage genome; in four cases where full-length genome sequences were available for comparison, consensus sequences were found to match over 99% of the genome with near-perfect identity. Analysis of areas of low and high sequence coverage within phage genomes indicated that GC content may influence coverage of sequences from Nextera libraries. Comparisons of phage genomes prepared using both Nextera and a standard 454 FLX Titanium library preparation protocol suggested that the coverage biases according to GC content observed within the Nextera libraries were largely attributable to bias in the Nextera protocol rather than to the 454 sequencing technology. Nevertheless, given suitable sequence coverage, the Nextera protocol produced high-quality data for genomic studies. For metagenomics analyses, effects of GC amplification bias would need to be considered; however, the library preparation standardization that Nextera provides should benefit comparative metagenomic analyses.

  12. One-day pulsed-field gel electrophoresis protocol for rapid determination of emetic Bacillus cereus isolates.

    Science.gov (United States)

    Kaminska, Paulina S; Fiedoruk, Krzysztof; Jankowska, Dominika; Mahillon, Jacques; Nowosad, Karol; Drewicka, Ewa; Zambrzycka, Monika; Swiecicka, Izabela

    2015-04-01

    Bacillus cereus, the Gram-positive and spore-forming ubiquitous bacterium, may cause emesis as the result of food intoxication with cereulide, a heat-stable emetic toxin. Rapid determination of cereulide-positive B. cereus isolates is of highest importance due to consequences of this intoxication for human health and life. Here we present a 1-day pulsed-field gel electrophoresis for emetic B. cereus isolates, which allows rapid and efficient determination of their genomic relatedness and helps determining the source of intoxication in case of outbreaks caused by these bacilli. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. The Virtual Insect Brain protocol: creating and comparing standardized neuroanatomy

    Directory of Open Access Journals (Sweden)

    Schindelin Johannes E

    2006-12-01

    Full Text Available Abstract Background In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. These diverse investigations on the function of the insect brain use gene expression patterns that can be visualized and provide the means for manipulating groups of neurons as a common ground. To take advantage of these patterns one needs to know their typical anatomy. Results This paper describes the Virtual Insect Brain (VIB protocol, a script suite for the quantitative assessment, comparison, and presentation of neuroanatomical data. It is based on the 3D-reconstruction and visualization software Amira, version 3.x (Mercury Inc. 1. Besides its backbone, a standardization procedure which aligns individual 3D images (series of virtual sections obtained by confocal microscopy to a common coordinate system and computes average intensities for each voxel (volume pixel the VIB protocol provides an elaborate data management system for data administration. The VIB protocol facilitates direct comparison of gene expression patterns and describes their interindividual variability. It provides volumetry of brain regions and helps to characterize the phenotypes of brain structure mutants. Using the VIB protocol does not require any programming skills since all operations are carried out at an intuitively usable graphical user interface. Although the VIB protocol has been developed for the standardization of Drosophila neuroanatomy, the program structure can be used for the standardization of other 3D structures as well. Conclusion Standardizing brains and gene expression patterns is a new approach to biological shape and its variability. The VIB protocol provides a first set of tools supporting this endeavor in Drosophila. The script suite is freely available at http://www.neurofly.de2

  14. Protocol: An updated integrated methodology for analysis of metabolites and enzyme activities of ethylene biosynthesis

    Directory of Open Access Journals (Sweden)

    Geeraerd Annemie H

    2011-06-01

    Full Text Available Abstract Background The foundations for ethylene research were laid many years ago by researchers such as Lizada, Yang and Hoffman. Nowadays, most of the methods developed by them are still being used. Technological developments since then have led to small but significant improvements, contributing to a more efficient workflow. Despite this, many of these improvements have never been properly documented. Results This article provides an updated, integrated set of protocols suitable for the assembly of a complete picture of ethylene biosynthesis, including the measurement of ethylene itself. The original protocols for the metabolites 1-aminocyclopropane-1-carboxylic acid and 1-(malonylaminocyclopropane-1-carboxylic acid have been updated and downscaled, while protocols to determine in vitro activities of the key enzymes 1-aminocyclopropane-1-carboxylate synthase and 1-aminocyclopropane-1-carboxylate oxidase have been optimised for efficiency, repeatability and accuracy. All the protocols described were optimised for apple fruit, but have been proven to be suitable for the analysis of tomato fruit as well. Conclusions This work collates an integrated set of detailed protocols for the measurement of components of the ethylene biosynthetic pathway, starting from well-established methods. These protocols have been optimised for smaller sample volumes, increased efficiency, repeatability and accuracy. The detailed protocol allows other scientists to rapidly implement these methods in their own laboratories in a consistent and efficient way.

  15. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.

    Science.gov (United States)

    Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng

    2018-04-01

     With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated.  Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks.  The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS.  We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features

  16. Economics of "essential use exemptions" for metered-dose inhalers under the Montreal Protocol.

    Science.gov (United States)

    DeCanio, Stephen J; Norman, Catherine S

    2007-10-01

    The Montreal Protocol on Substances that Deplete the Ozone Layer has led to rapid reductions in the use of ozone-depleting substances worldwide. However, the Protocol provides for "essential use exemptions" (EUEs) if there are no "technically and economically feasible" alternatives. An application that might qualify as an "essential use" is CFC-powered medical metered-dose inhalers (MDIs) for the treatment of asthma and chronic obstructive pulmonary disease (COPD), and the US and other nations have applied for exemptions in this case. One concern is that exemptions are necessary to ensure access to medications for low-income uninsureds. We examine the consequences of granting or withholding such exemptions, and conclude that government policies and private-sector programs are available that make it economically feasible to phase out chlorofluorocarbons (CFCs) in this application, thereby furthering the global public health objectives of the Montreal Protocol without compromising the treatment of patients who currently receive medication by means of MDIs.

  17. Rapid methods for the extraction and archiving of molecular grade fungal genomic DNA.

    Science.gov (United States)

    Borman, Andrew M; Palmer, Michael; Johnson, Elizabeth M

    2013-01-01

    The rapid and inexpensive extraction of fungal genomic DNA that is of sufficient quality for molecular approaches is central to the molecular identification, epidemiological analysis, taxonomy, and strain typing of pathogenic fungi. Although many commercially available and in-house extraction procedures do eliminate the majority of contaminants that commonly inhibit molecular approaches, the inherent difficulties in breaking fungal cell walls lead to protocols that are labor intensive and that routinely take several hours to complete. Here we describe several methods that we have developed in our laboratory that allow the extremely rapid and inexpensive preparation of fungal genomic DNA.

  18. Perturbation of DNA replication and cell cycle progression by commonly used [3H]thymidine labeling protocols

    International Nuclear Information System (INIS)

    Hoy, C.A.; Lewis, E.D.; Schimke, R.T.

    1990-01-01

    The effect of tritiated thymidine incorporation on DNA replication was studied in Chinese hamster ovary cells. Rapidly eluting (small) DNA from cells labeled with 2 microCi of [ 3 H]thymidine per ml (200 microCi/mmol) for 60 min matured to a large nonelutable size within approximately 2 to 4 h, as measured by the alkaline elution technique. However, DNA from cells exposed to 10 microCi of [ 3 H]thymidine per ml (66 microCi/mmol) was more rapidly eluting initially and did not mature to a nonelutable size during subsequent incubation. Semiconservative DNA replication measured by cesium chloride gradient analysis of bromodeoxyuridine-substituted DNA was also found to be affected by the final specific activity of the [ 3 H]thymidine used in the labeling protocol. Dramatic cell cycle perturbations accompanied these effects on DNA replication, suggesting that labeling protocols commonly used to study DNA metabolism produce aberrant DNA replication and subsequent cell cycle perturbations

  19. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  20. Rapid control prototyping - new technologies and tools; Rapid Control Prototyping - neue Moeglichkeiten und Werkzeuge

    Energy Technology Data Exchange (ETDEWEB)

    Otterbach, R.; Eckmann, M.; Mertens, F. [dSPACE GmbH, Paderborn (Germany)

    2004-06-01

    The paper presents the status quo in rapid control prototyping (RCP) and discusses further developments of this technology. The complete functional chain, from sensors to data preprocessing and the real-time processor, right through to control of the actuators, is created as an integrated hardware and software solution. The greatest flexibility and configurability are achieved with a modular platform concept that includes signal conditioning and power stages. The architecture of modern microcontrollers and electronic control units (ECUs) result in new requirements in the field of bypassing. These are fulfilled by appropriate solutions based on on-chip debug interfaces and standardized data protocols on serial busses. RCP support for developing networked, time-triggered vehicle systems, and the particular requirements for the tool environment, are described using FlexRay as an example. (orig.)

  1. Development of a Competent and Trouble Free DNA Isolation Protocol for Downstream Genetic Analyses in Glycine Species

    Directory of Open Access Journals (Sweden)

    Muhammad Amjad Nawaz

    2016-08-01

    Full Text Available Extraction of deoxyribose nucleic acid (DNA from plants is preliminary step in molecular biology. Fast and cost effective genomic DNA isolation from Glycine species for downstream application is a major bottleneck. Here we report a high throughput and trouble free method for genomic DNA extraction from leaf and seeds of Glycine species with high quality and quantity. Protocol reports the optimization by employing different concentrations of CTAB and PVP in extraction buffer. Efficiency of optimized protocol was compared with frequently used DNA extraction methods. Wide adoptability and utility of this protocol was confirmed by DNA extraction from leaves as well as seeds of G. max, G. soja, G. tomentella and G. latifolia. Extracted DNA was successfully subjected to PCR amplification of five microsatellite markers and four putative glycosyltransferase genes. DNA extraction protocol is reproducible, trouble free, rapid and can be adopted for plant molecular biology applications.

  2. Rapid bioassay for oil-contaminated soil

    Energy Technology Data Exchange (ETDEWEB)

    Ashworth, J. [ALS Environmental, Edmonton, AB (Canada); Oosterbroek, L. [HydroQual, Calgary, AB (Canada)

    2010-07-01

    This PowerPoint presentation described a study conducted to develop a rapid bioassay for soils contaminated with oil. The bioassay method was designed for a weight of evidence (WoE) approach and eco-contact guideline derivation protocol. Microtox bioassays were conducted on cyclodextrin extracts of soil quantified by solvent extraction and gas chromatography. The method was demonstrated using straight {beta}-cyclodextrin soil extracts and activated {beta}-cyclodextrin soil extracts. An analysis of the methods showed that the activation step weakens or breaks the cyclodextrin and polycyclic hydrocarbon (PHC) inclusion complex. The released PHC became toxic to the microtox organism. Results from the bioassays were then correlated with earthworm reproduction bioassay results. tabs., figs.

  3. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    Science.gov (United States)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  4. Efficacy and safety of an insulin infusion protocol in a surgical ICU.

    Science.gov (United States)

    Taylor, Beth E; Schallom, Marilyn E; Sona, Carrie S; Buchman, Timothy G; Boyle, Walter A; Mazuski, John E; Schuerer, Douglas E; Thomas, James M; Kaiser, Christy; Huey, Way Y; Ward, Myrna R; Zack, Jeanne E; Coopersmith, Craig M

    2006-01-01

    Hyperglycemia is associated with complications in the surgical intensive care unit. The purpose of this study was to determine the efficacy and safety of nurse-driven insulin infusion protocols in lowering blood glucose (BG) in critical illness. All patients in a 24-bed surgical intensive care unit who required i.v. insulin infusions during 3 noncontiguous 6-month periods from 2002 to 2004 were evaluated. In the preintervention phase, 71 patients received a physician-initiated insulin infusion without a developed protocol. They were compared with 95 patients who received a nurse-driven insulin infusion protocol with a target BG of 120 to 150 mg/dL and to 119 patients who received a more stringent protocol with a target BG of 80 to 110 mg/dL. There was a stepwise decrease in average daily BG levels, from 190 to 163 to 132 mg/dL (p < 0.001). The less stringent protocol decreased the time to achieve a BG level < 150 mg/dL from 14.1 to 7.4 hours compared with physician-driven management (p < 0.05) resulting in similar time on an insulin infusion (53 versus 48 hours). The more intensive protocol brought BG levels < 150 mg/dL in 7.2 hours and < 111 mg/dL in 13.6 hours, but increased the length of time a patient was on an insulin infusion to 77 hours. The incidence of severe hypoglycemia (BG < 40 mg/dL) was statistically similar between the groups, ranging between 1.1% and 3.4%. Implementation of a nurse-driven protocol led to more rapid and more effective BG control in critically ill surgical patients compared with physician management. Tighter BG control can be obtained without a significant increase in hypoglycemia, although this is associated with increased time on an insulin infusion.

  5. Prehospital care training in a rapidly developing economy: a multi-institutional study.

    Science.gov (United States)

    Vyas, Dinesh; Hollis, Michael; Abraham, Rohit; Rustagi, Neeti; Chandra, Siddharth; Malhotra, Ajai; Rajpurohit, Vikas; Purohit, Harshada; Pal, Ranabir

    2016-06-01

    The trauma pandemic is one of the leading causes of death worldwide but especially in rapidly developing economies. Perhaps, a common cause of trauma-related mortality in these settings comes from the rapid expansion of motor vehicle ownership without the corresponding expansion of national prehospital training in developed countries. The resulting road traffic injuries often never make it to the hospital in time for effective treatment, resulting in preventable disability and death. The current article examines the development of a medical first responder training program that has the potential to reduce this unnecessary morbidity and mortality. An intensive training workshop has been differentiated into two progressive tiers: acute trauma training (ATT) and broad trauma training (BTT) protocols. These four-hour and two-day protocols, respectively, allow for the mass education of laypersons-such as police officials, fire brigade, and taxi and/or ambulance drivers-who are most likely to interact first with prehospital victims. Over 750 ATT participants and 168 BTT participants were trained across three Indian educational institutions at Jodhpur and Jaipur. Trainees were given didactic and hands-on education in a series of critical trauma topics, in addition to pretraining and post-training self-assessments to rate clinical confidence across curricular topics. Two-sample t-test statistical analyses were performed to compare pretraining and post-training confidence levels. Program development resulted in recruitment of a variety of career backgrounds for enrollment in both our ATT and BTT workshops. The workshops were run by local physicians from a wide spectrum of medical specialties and previously ATT-trained police officials. Statistically significant improvements in clinical confidence across all curricular topics for ATT and BTT protocols were identified (P developing settings. Program expansion can offer an exponential growth in the training rate of medical

  6. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    Science.gov (United States)

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  7. A statistical frame based TDMA protocol for human body communication.

    Science.gov (United States)

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-07-09

    Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidly to the burst traffic triggered by sensing events. Those burst traffic conditions include vital physical signal (electrocardiogram, electroencephalogram etc.) monitoring, human motion detection (fall detection, activity monitoring, gesture recognition, motion sensing etc.) and so on. To cope with aforementioned challenges, a statistical frame based TDMA (S-TDMA) protocol with multi-constrained (energy, delay, transmission efficiency and emergency management) service is proposed in this paper. The scenarios where burst traffic is often triggered rapidly with low power consumption and low delay is handled in our proposed S-TDMA. A beacon frame with the contained synchronous and poll information is designed to reduce the possibility of collisions of request frames. A statistical frame which broadcasts the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. Dynamic time slot allocation mechanism is presented to manage the burst traffic and reduce the active period in each beacon period. An emergency mechanism is proposed for vital signals to be transmitted. The theory analysis is proceed and the result is evaluated in the hardware platform. To verify its feasibility, S-TDMA was fully implemented on our independently-developed HBC platform where four sensor nodes and a coordinator are fastened on a human body. Experiment results show that S-TDMA costs 89.397 mJ every 20 s when the payload size is 122 bytes, 9.51% lower than Lightweight MAC

  8. NANOSIZED MAGNESIUM OXIDE AS CATALYST FOR THE RAPID AND GREEN SYNTHESIS OF SUBSTITUTED 2-AMINO-2-CHROMENES

    Science.gov (United States)

    A nanosized magnesium oxide catalyzed three-component condensation reaction of aldehyde, malononitrile and ¿-naphthol proceeded rapidly in water/PEG to afford corresponding 2-amino-2-chromenes in high yields at room temperature. The greener protocol was found to be fairly general...

  9. New protocol for construction of eyeglasses-supported provisional nasal prosthesis using CAD/CAM techniques.

    Science.gov (United States)

    Ciocca, Leonardo; Fantini, Massimiliano; De Crescenzio, Francesca; Persiani, Franco; Scotti, Roberto

    2010-01-01

    A new protocol for making an immediate provisional eyeglasses-supported nasal prosthesis is presented that uses laser scanning, computer-aided design/computer-aided manufacturing procedures, and rapid prototyping techniques, reducing time and costs while increasing the quality of the final product. With this protocol, the eyeglasses were digitized, and the relative position of the nasal prosthesis was planned and evaluated in a virtual environment without any try-in appointment. This innovative method saves time, reduces costs, and restores the patient's aesthetic appearance after a disfiguration caused by ablation of the nasal pyramid better than conventional restoration methods. Moreover, the digital model of the designed nasal epithesis can be used to develop a definitive prosthesis anchored to osseointegrated craniofacial implants.

  10. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  11. A Protocol for Rapid, Measurable Plant Tissue Culture Using Stem Disc Meristem Micropropagation of Garlic ("Allium Sativum L.")

    Science.gov (United States)

    Peat, Gerry; Jones, Meriel

    2012-01-01

    Plant tissue culture is becoming an important technique for the mass propagation of plants. Problems with existing techniques, such as slow growth and contamination, have restricted the practical work in plant tissue culture carried out in schools. The new protocol using garlic meristematic stem discs explained in this article addresses many of…

  12. Effect of a feed/fast protocol on pH in the proximal equine stomach.

    Science.gov (United States)

    Husted, L; Sanchez, L C; Baptiste, K E; Olsen, S N

    2009-09-01

    Risk factors for the development of gastric squamous ulcers include various management procedures, such as intermittent feed deprivation that can occur during weight management regimens or stall and dry lot confinement. To investigate the effect of intermittent feed deprivation relative to continuous feed intake on proximal intragastric pH, specifically in the region of the squamous mucosa of the lesser curvature. In 6 horses, pH electrodes were placed just inside of the oesophageal sphincter in the stomach for each of two 72 h protocols (A and B) in a randomised, cross-over design. Protocol A consisted of 12 h fed, 12 h fasted, 24 h fed and 24 h fasted, in sequence. Protocol B consisted of 72 h fed. During the fed periods of each protocol, horses had ad libitum access to coastal Bermuda hay and were fed sweet feed (1 kg, b.i.d.). Horses had ad libitum access to water at all times. Proximal intragastric pH was significantly lower during protocol A, than during protocol B. However, hourly mean pH was significantly different only during the day and evening hours between protocols. During protocol B, mean proximal pH decreased significantly from 03.00 to 09.00 compared to 19.00 to 23.00 h. A moderate positive correlation of hay intake vs. proximal gastric pH could be established. Intermittent feed deprivation decreased proximal gastric pH in horses relative to those horses for which feed was not restricted. However, the effect was only significant when fasting occurred during the day and evening hours, as a nocturnal decrease in pH occurred simultaneously in the fed horses. Episodes of daytime feed deprivation should be avoided if possible, as proximal gastric acid exposure rapidly increases during such events.

  13. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  14. Replacing the CCSDS Telecommand Protocol with the Next Generation Uplink (NGU)

    Science.gov (United States)

    Kazz, Greg J.; Greenberg, Ed; Burleigh, Scott C.

    2012-01-01

    The current CCSDS Telecommand (TC) Recommendations 1-3 have essentially been in use since the early 1960s. The purpose of this paper is to propose a successor protocol to TC. The current CCSDS recommendations can only accommodate telecommand rates up to approximately 1 mbit/s. However today's spacecraft are storehouses for software including software for Field Programmable Gate Arrays (FPGA) which are rapidly replacing unique hardware systems. Changes to flight software occasionally require uplinks to deliver very large volumes of data. In the opposite direction, high rate downlink missions that use acknowledged CCSDS File Delivery Protocol (CFDP)4 will increase the uplink data rate requirements. It is calculated that a 5 mbits/s downlink could saturate a 4 kbits/s uplink with CFDP downlink responses: negative acknowledgements (NAKs), FINISHs, End-of-File (EOF), Acknowledgements (ACKs). Moreover, it is anticipated that uplink rates of 10 to 20 mbits/s will be required to support manned missions. The current TC recommendations cannot meet these new demands. Specifically, they are very tightly coupled to the Bose-Chaudhuri-Hocquenghem (BCH) code in Ref. 2. This protocol requires that an uncorrectable BCH codeword delimit the TC frame and terminate the randomization process. This method greatly limits telecom performance since only the BCH code can support the protocol. More modern techniques such as the CCSDS Low Density Parity Check (LDPC)5 codes can provide a minimum performance gain of up to 6 times higher command data rates as long as sufficient power is available in the data. This paper will describe the proposed protocol format, trade-offs, and advantages offered, along with a discussion of how reliable communications takes place at higher nominal rates.

  15. A Good IDS Response Protocol of MANET Containment Strategies

    Science.gov (United States)

    Cheng, Bo-Chao; Chen, Huan; Tseng, Ryh-Yuh

    Much recent research concentrates on designing an Intrusion Detection System (IDS) to detect the misbehaviors of the malicious node in MANET with ad-hoc and mobility natures. However, without rapid and appropriate IDS response mechanisms performing follow-up management services, even the best IDS cannot achieve the desired primary goal of the incident response. A competent containment strategy is needed to limit the extent of an attack in the Incident Response Life Cycle. Inspired by the T-cell mechanisms in the human immune system, we propose an efficient MANET IDS response protocol (T-SecAODV) that can rapidly and accurately disseminate alerts of the malicious node attacks to other nodes so as to modify their AODV routing tables to isolate the malicious nodes. Simulations are conducted by the network simulator (Qualnet), and the experiment results indicate that T-SecAODV is able to spread alerts steadily while greatly reduce faulty rumors under simultaneous multiple malicious node attacks.

  16. Rapid Identification of Microorganisms from Positive Blood Culture by MALDI-TOF MS After Short-Term Incubation on Solid Medium.

    Science.gov (United States)

    Curtoni, Antonio; Cipriani, Raffaella; Marra, Elisa Simona; Barbui, Anna Maria; Cavallo, Rossana; Costa, Cristina

    2017-01-01

    Matrix-assisted laser-desorption/ionization time-of-flight (MALDI-TOF) mass spectrometry (MS) is a useful tool for rapid identification of microorganisms. Unfortunately, its direct application to positive blood culture is still lacking standardized procedures. In this study, we evaluated an easy- and rapid-to-perform protocol for MALDI-TOF MS direct identification of microorganisms from positive blood culture after a short-term incubation on solid medium. This protocol was used to evaluate direct identification of microorganisms from 162 positive monomicrobial blood cultures; at different incubation times (3, 5, 24 h), MALDI-TOF MS assay was performed from the growing microorganism patina. Overall, MALDI-TOF MS concordance with conventional methods at species level was 60.5, 80.2, and 93.8% at 3, 5, and 24 h, respectively. Considering only bacteria, the identification performances at species level were 64.1, 85.0, and 94.1% at 3, 5, and 24 h, respectively. This protocol applied to a commercially available MS typing system may represent, a fast and powerful diagnostic tool for pathogen direct identification and for a promptly and pathogen-driven antimicrobial therapy in selected cases.

  17. Rapid and efficient protocol for DNA extraction and molecular identification of the basidiomycete Crinipellis perniciosa.

    Science.gov (United States)

    Melo, S C O; Pungartnik, C; Cascardo, J C M; Brendel, M

    2006-12-14

    DNA isolation from some fungal organisms is difficult because they have cell walls or capsules that are relatively unsusceptible to lysis. Beginning with a yeast Saccharomyces cerevisiae genomic DNA isolation method, we developed a 30-min DNA isolation protocol for filamentous fungi by combining cell wall digestion with cell disruption by glass beads. High-quality DNA was isolated with good yield from the hyphae of Crinipellis perniciosa, which causes witches' broom disease in cacao, from three other filamentous fungi, Lentinus edodes, Agaricus blazei, Trichoderma stromaticum, and from the yeast S. cerevisiae. Genomic DNA was suitable for PCR of specific actin primers of C. perniciosa, allowing it to be differentiated from fungal contaminants, including its natural competitor, T. stromaticum.

  18. Establishment and optimization of NMR-based cell metabonomics study protocols for neonatal Sprague-Dawley rat cardiomyocytes.

    Science.gov (United States)

    Zhang, Ming; Sun, Bo; Zhang, Qi; Gao, Rong; Liu, Qiao; Dong, Fangting; Fang, Haiqin; Peng, Shuangqing; Li, Famei; Yan, Xianzhong

    2017-01-15

    A quenching, harvesting, and extraction protocol was optimized for cardiomyocytes NMR metabonomics analysis in this study. Trypsin treatment and direct scraping cells in acetonitrile were compared for sample harvesting. The results showed trypsin treatment cause normalized concentration increasing of phosphocholine and metabolites leakage, since the trypsin-induced membrane broken and long term harvesting procedures. Then the intracellular metabolite extraction efficiency of methanol and acetonitrile were compared. As a result, washing twice with phosphate buffer, direct scraping cells and extracting with acetonitrile were chosen to prepare cardiomyocytes extracts samples for metabonomics studies. This optimized protocol is rapid, effective, and exhibits greater metabolite retention. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. A rapid and economic in-house DNA purification method using glass syringe filters.

    Directory of Open Access Journals (Sweden)

    Yun-Cheol Kim

    Full Text Available BACKGROUND: Purity, yield, speed and cost are important considerations in plasmid purification, but it is difficult to achieve all of these at the same time. Currently, there are many protocols and kits for DNA purification, however none maximize all four considerations. METHODOLOGY/PRINCIPAL FINDINGS: We now describe a fast, efficient and economic in-house protocol for plasmid preparation using glass syringe filters. Plasmid yield and quality as determined by enzyme digestion and transfection efficiency were equivalent to the expensive commercial kits. Importantly, the time required for purification was much less than that required using a commercial kit. CONCLUSIONS/SIGNIFICANCE: This method provides DNA yield and quality similar to that obtained with commercial kits, but is more rapid and less costly.

  20. Rapid application development by KEKB accelerator operators using EPICS/Python

    International Nuclear Information System (INIS)

    Tanaka, M.; Satoh, Y.; Kitabayashi, T.

    2004-01-01

    In the KEKB accelerator facility, the control system is constructed based on the framework of EPICS. By using EPICS/Python API, which is originated from KEK, we can develop an EPICS channel access application based on simple Python technology with only a few knowledge of EPICS channel access protocols. The operator's new tuning ideas are quickly implemented to the control system. In this paper, we introduce the EPICS/Python API and report the effectiveness of rapid application development by the KEKB operators using the API. (author)

  1. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  2. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  3. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  4. Feasibility of Automatic Extraction of Electronic Health Data to Evaluate a Status Epilepticus Clinical Protocol.

    Science.gov (United States)

    Hafeez, Baria; Paolicchi, Juliann; Pon, Steven; Howell, Joy D; Grinspan, Zachary M

    2016-05-01

    Status epilepticus is a common neurologic emergency in children. Pediatric medical centers often develop protocols to standardize care. Widespread adoption of electronic health records by hospitals affords the opportunity for clinicians to rapidly, and electronically evaluate protocol adherence. We reviewed the clinical data of a small sample of 7 children with status epilepticus, in order to (1) qualitatively determine the feasibility of automated data extraction and (2) demonstrate a timeline-style visualization of each patient's first 24 hours of care. Qualitatively, our observations indicate that most clinical data are well labeled in structured fields within the electronic health record, though some important information, particularly electroencephalography (EEG) data, may require manual abstraction. We conclude that a visualization that clarifies a patient's clinical course can be automatically created using the patient's electronic clinical data, supplemented with some manually abstracted data. Future work could use this timeline to evaluate adherence to status epilepticus clinical protocols. © The Author(s) 2015.

  5. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  6. Towards identifying nurse educator competencies required for simulation-based learning: A systemised rapid review and synthesis

    DEFF Research Database (Denmark)

    Bøje, Rikke Buus; Topping, Annie; Rekola, Leena

    2015-01-01

    Objectives: This paper presents the results of a systemised rapid reviewand synthesis of the literature undertaken to identify competencies required by nurse educators to facilitate simulation-based learning (SBL). Design: An international collaboration undertook a protocol-based search, retrieva...... further development as a model for educators delivering SBL as part of nursing curricula....

  7. Rapid assessment of visual impairment (RAVI in marine fishing communities in South India - study protocol and main findings

    Directory of Open Access Journals (Sweden)

    Madala Sreenivas R

    2011-09-01

    Full Text Available Abstract Background Reliable data are a pre-requisite for planning eye care services. Though conventional cross sectional studies provide reliable information, they are resource intensive. A novel rapid assessment method was used to investigate the prevalence and causes of visual impairment and presbyopia in subjects aged 40 years and older. This paper describes the detailed methodology and study procedures of Rapid Assessment of Visual Impairment (RAVI project. Methods A population-based cross-sectional study was conducted using cluster random sampling in the coastal region of Prakasam district of Andhra Pradesh in India, predominantly inhabited by fishing communities. Unaided, aided and pinhole visual acuity (VA was assessed using a Snellen chart at a distance of 6 meters. The VA was re-assessed using a pinhole, if VA was Results The data collection was completed in Conclusion There is a high prevalence of visual impairment in marine fishing communities in Prakasam district in India. The data from this rapid assessment survey can now be used as a baseline to start eye care services in this region. The rapid assessment methodology (RAVI reported in this paper is robust, quick and has the potential to be replicated in other areas.

  8. Test Protocols for Advanced Inverter Interoperability Functions - Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not now required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already apparent as

  9. Rapid Inpatient Titration of Intravenous Treprostinil for Pulmonary Arterial Hypertension: Safe and Tolerable.

    Science.gov (United States)

    El-Kersh, Karim; Ruf, Kathryn M; Smith, J Shaun

    There is no standard protocol for intravenous treprostinil dose escalation. In most cases, slow up-titration is performed in the outpatient setting. However, rapid up-titration in an inpatient setting is an alternative that provides opportunity for aggressive treatment of common side effects experienced during dose escalation. In this study, we describe our experience with inpatient rapid up-titration of intravenous treprostinil. This was a single-center, retrospective study in which we reviewed the data of subjects with pulmonary arterial hypertension treated at our center who underwent inpatient rapid up-titration of intravenous treprostinil. Our treprostinil dose escalation protocol included initiation at 2 ng·kg·min with subsequent up-titration by 1 ng·kg·min every 6 to 8 hours as tolerated by side effects. A total of 16 subjects were identified. Thirteen subjects were treprostinil naive (naive group), and 3 subjects were receiving subcutaneous treprostinil but were hospitalized for further intravenous up-titration of treprostinil dose (nonnaive group). In the naive group, the median maximum dose achieved was 20 ng·kg·min with an interquartile range (IQR) of 20-23 ng·kg·min. The median up-titration interval was 6 days (IQR: 4-9). In the nonnaive group, the median maximum dose achieved was 20 ng·kg·min (range: 17-30). The median up-titration interval was 8.5 days (range: 1.5-11). Overall, the median maximum dose achieved was 20 ng·kg·min (IQR: 20-23.5), and the median up-titration interval was 6 days (IQR: 4.6-9.25), with no reported significant adverse hemodynamic events. In patients with pulmonary arterial hypertension, rapid inpatient titration of intravenous treprostinil is safe and tolerable.

  10. Development of a new CARD-FISH protocol for quantification of Legionella pneumophila and its application in two hospital cooling towers.

    Science.gov (United States)

    Kirschner, A K T; Rameder, A; Schrammel, B; Indra, A; Farnleitner, A H; Sommer, R

    2012-06-01

    Open cooling towers are frequent sources of infections with Legionella pneumophila. The gold standard for the detection of Leg. pneumophila is based on cultivation lasting up to 10 days and detecting only culturable cells. Alternative fluorescence in situ hybridization (FISH) protocols have been proposed, but they result in faint fluorescence signals and lack specificity because of cross-hybridization with other Legionella species. Our aim was thus to develop a new FISH protocol for rapid and specific detection of Leg. pneumophila in water samples. A novel catalysed reporter deposition FISH (CARD-FISH) protocol for the detection of Leg. pneumophila was developed, which significantly enhanced signal intensity as well as specificity of the probe through the use of a novel competitor probe. The developed protocol was compared with the culture method for monitoring the seasonal development of culturable and nonculturable Leg. pneumophila in two hospital cooling tower systems. Seasonal fluctuations of Leg. pneumophila concentrations detected via CARD-FISH were related to the development of the total bacterial community in both cooling towers, with temperature and biocide as the main factors controlling this development. Our results clearly showed that the majority of the Leg. pneumophila cells were in a nonculturable state. Thus, detection of Leg. pneumophila with culture methods may underestimate the total numbers of Leg. pneumophila present. Rapid, sensitive and specific detection and quantification of Leg. pneumophila in water systems is prerequisite for reliable risk estimation. The new protocol significantly improves current methodology and can be used to monitor and screen for Leg. pneumophila concentrations in cooling towers or other water systems. © 2012 The Authors. Journal of Applied Microbiology © 2012 The Society for Applied Microbiology.

  11. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  12. Rapid lung MRI in children with pulmonary infections: Time to change our diagnostic algorithms.

    Science.gov (United States)

    Sodhi, Kushaljit Singh; Khandelwal, Niranjan; Saxena, Akshay Kumar; Singh, Meenu; Agarwal, Ritesh; Bhatia, Anmol; Lee, Edward Y

    2016-05-01

    To determine the diagnostic utility of a new rapid MRI protocol, as compared with computed tomography (CT) for the detection of various pulmonary and mediastinal abnormalities in children with suspected pulmonary infections. Seventy-five children (age range of 5 to 15 years) with clinically suspected pulmonary infections were enrolled in this prospective study, which was approved by the institutional ethics committee. All patients underwent thoracic MRI (1.5T) and CT (64 detector) scan within 48 h of each other. The sensitivity, specificity, positive predictive value (PPV), and negative predictive value (NPV) of MRI were evaluated with CT as a standard of reference. Inter-observer agreement was measured with the kappa coefficient. MRI with a new rapid MRI protocol demonstrated sensitivity, specificity, PPV, and NPV of 100% for detecting pulmonary consolidation, nodules (>3 mm), cyst/cavity, hyperinflation, pleural effusion, and lymph nodes. The kappa-test showed almost perfect agreement between MRI and multidetector CT (MDCT) in detecting thoracic abnormalities (k = 0.9). No statistically significant difference was observed between MRI and MDCT for detecting thoracic abnormalities by the McNemar test (P = 0.125). Rapid lung MRI was found to be comparable to MDCT for detecting thoracic abnormalities in pediatric patients with clinically suspected pulmonary infections. It has a great potential as the first line cross-sectional imaging modality of choice in this patient population. However, further studies will be helpful for confirmation of our findings. © 2015 Wiley Periodicals, Inc.

  13. A protocol for generating a high-quality genome-scale metabolic reconstruction.

    Science.gov (United States)

    Thiele, Ines; Palsson, Bernhard Ø

    2010-01-01

    Network reconstructions are a common denominator in systems biology. Bottom-up metabolic network reconstructions have been developed over the last 10 years. These reconstructions represent structured knowledge bases that abstract pertinent information on the biochemical transformations taking place within specific target organisms. The conversion of a reconstruction into a mathematical format facilitates a myriad of computational biological studies, including evaluation of network content, hypothesis testing and generation, analysis of phenotypic characteristics and metabolic engineering. To date, genome-scale metabolic reconstructions for more than 30 organisms have been published and this number is expected to increase rapidly. However, these reconstructions differ in quality and coverage that may minimize their predictive potential and use as knowledge bases. Here we present a comprehensive protocol describing each step necessary to build a high-quality genome-scale metabolic reconstruction, as well as the common trials and tribulations. Therefore, this protocol provides a helpful manual for all stages of the reconstruction process.

  14. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  15. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  16. Toxoplasma gondii and pre-treatment protocols for polymerase chain reaction analysis of milk samples: a field trial in sheep from Southern Italy

    Directory of Open Access Journals (Sweden)

    Alice Vismarra

    2017-02-01

    Full Text Available Toxoplasmosis is a zoonotic disease caused by the protozoan Toxoplasma gondii. Ingestion of raw milk has been suggested as a risk for transmission to humans. Here the authors evaluated pre-treatment protocols for DNA extraction on T. gondii tachyzoite-spiked sheep milk with the aim of identifying the method that resulted in the most rapid and reliable polymerase chain reaction (PCR positivity. This protocol was then used to analyse milk samples from sheep of three different farms in Southern Italy, including real time PCR for DNA quantification and PCR-restriction fragment length polymorphism for genotyping. The pre-treatment protocol using ethylenediaminetetraacetic acid and Tris-HCl to remove casein gave the best results in the least amount of time compared to the others on spiked milk samples. One sample of 21 collected from sheep farms was positive on one-step PCR, real time PCR and resulted in a Type I genotype at one locus (SAG3. Milk usually contains a low number of tachyzoites and this could be a limiting factor for molecular identification. Our preliminary data has evaluated a rapid, cost-effective and sensitive protocol to treat milk before DNA extraction. The results of the present study also confirm the possibility of T. gondii transmission through consumption of raw milk and its unpasteurised derivatives.

  17. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  18. An evaluation of rapid methods for monitoring vegetation characteristics of wetland bird habitat

    Science.gov (United States)

    Tavernia, Brian G.; Lyons, James E.; Loges, Brian W.; Wilson, Andrew; Collazo, Jaime A.; Runge, Michael C.

    2016-01-01

    Wetland managers benefit from monitoring data of sufficient precision and accuracy to assess wildlife habitat conditions and to evaluate and learn from past management decisions. For large-scale monitoring programs focused on waterbirds (waterfowl, wading birds, secretive marsh birds, and shorebirds), precision and accuracy of habitat measurements must be balanced with fiscal and logistic constraints. We evaluated a set of protocols for rapid, visual estimates of key waterbird habitat characteristics made from the wetland perimeter against estimates from (1) plots sampled within wetlands, and (2) cover maps made from aerial photographs. Estimated percent cover of annuals and perennials using a perimeter-based protocol fell within 10 percent of plot-based estimates, and percent cover estimates for seven vegetation height classes were within 20 % of plot-based estimates. Perimeter-based estimates of total emergent vegetation cover did not differ significantly from cover map estimates. Post-hoc analyses revealed evidence for observer effects in estimates of annual and perennial covers and vegetation height. Median time required to complete perimeter-based methods was less than 7 percent of the time needed for intensive plot-based methods. Our results show that rapid, perimeter-based assessments, which increase sample size and efficiency, provide vegetation estimates comparable to more intensive methods.

  19. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  20. Cactus and Visapult: A case study of ultra-high performance distributed visualization using connectionless protocols

    Energy Technology Data Exchange (ETDEWEB)

    Shalf, John; Bethel, E. Wes

    2002-05-07

    This past decade has seen rapid growth in the size, resolution, and complexity of Grand Challenge simulation codes. Many such problems still require interactive visualization tools to make sense of multi-terabyte data stores. Visapult is a parallel volume rendering tool that employs distributed components, latency tolerant algorithms, and high performance network I/O for effective remote visualization of massive datasets. In this paper we discuss using connectionless protocols to accelerate Visapult network I/O and interfacing Visapult to the Cactus General Relativity code to enable scalable remote monitoring and steering capabilities. With these modifications, network utilization has moved from 25 percent of line-rate using tuned multi-streamed TCP to sustaining 88 percent of line rate using the new UDP-based transport protocol.

  1. The protocols for the 10/66 dementia research group population-based research programme

    OpenAIRE

    Salas Aquiles; Rodriguez Juan; McKeigue Paul; Jacob KS; Krishnamoorthy ES; Huang Yueqin; Guerra Mariella; Gavrilova Svetlana I; Dewey Michael; Arizaga Raul; Albanese Emiliano; Acosta Daisy; Ferri Cleusa P; Prince Martin; Sosa Ana

    2007-01-01

    Abstract Background Latin America, China and India are experiencing unprecedentedly rapid demographic ageing with an increasing number of people with dementia. The 10/66 Dementia Research Group's title refers to the 66% of people with dementia that live in developing countries and the less than one tenth of population-based research carried out in those settings. This paper describes the protocols for the 10/66 population-based and intervention studies that aim to redress this imbalance. Meth...

  2. Network Layer Protocol Activation for Packet Data Access in UMTS WCDMA Laboratory Network

    OpenAIRE

    Lakkisto, Erkka

    2011-01-01

    The purpose of this Bachelor’s Thesis was to set up the UMTS WCDMA network in the laboratory environment of Helsinki Metropolia University of Applied Sciences and to study the network layer protocol activation for packet data access. The development of 3G technology has been very rapid and it can be considered as one of the main technologies in telecommunication. Implementing the laboratory network in Metropolia enables teaching and researching of the modern network technology. Labora...

  3. A Guide to Writing a Qualitative Systematic Review Protocol to Enhance Evidence-Based Practice in Nursing and Health Care.

    Science.gov (United States)

    Butler, Ashleigh; Hall, Helen; Copnell, Beverley

    2016-06-01

    The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the

  4. The efficacy of maxillary protraction protocols with the micro-implant-assisted rapid palatal expander (MARPE) and the novel N2 mini-implant-a finite element study.

    Science.gov (United States)

    Moon, Won; Wu, Kimberley W; MacGinnis, Matthew; Sung, Jay; Chu, Howard; Youssef, George; Machado, Andre

    2015-01-01

    Maxillary protraction with the novel N2 mini-implant- and micro-implant-assisted rapid palatal expander (MARPE) can potentially provide significant skeletal effects without surgery, even in older patients where conventional facemask therapy has limited skeletal effects. However, the skeletal effects of altering the location and direction of force from mini-implant-assisted maxillary protraction have not been extensively analyzed. In this study, the application of the novel N2 mini-implant as an orthopedic anchorage device is explored in its ability to treat patients with class III malocclusions. A 3D cranial mesh model with associated sutures was developed from CT images and Mimics modeling software. Utilizing ANSYS simulation software, protraction forces were applied at different locations and directions to simulate conventional facemask therapy and seven maxillary protraction protocols utilizing the novel N2 mini-implant. Stress distribution and displacement were analyzed. Video animations and superimpositions were created. By changing the vector of force and location of N2 mini-implant, the maxilla was displaced differentially. Varying degrees of forward, downward, and rotational movements were observed in each case. For brachyfacial patients, anterior micro-implant-supported protraction at -45° or intermaxillary class III elastics at -45° are recommended. For dolicofacial patients, either anterior micro-implants at -15° or an intermaxillary spring at +30° is recommended. For mesofacial patients with favorable vertical maxillary position, palatal micro-implants at -30° are recommended; anterior micro-implants at -30° are preferred for shallow bites. For patients with a severe mid-facial deficiency, intermaxillary class III elastics at -30° are most effective in promoting anterior growth of the maxilla. By varying the location of N2 mini-implants and vector of class III mechanics, clinicians can differentially alter the magnitude of forward, downward, and

  5. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  6. Rapid gated Thallium-201 perfusion SPECT - clinically feasible?

    International Nuclear Information System (INIS)

    Wadhwa, S.S.; Mansberg, R.; Fernandes, V.B.; Wilkinson, D.; Abatti, D.

    1998-01-01

    Full text: Standard dose energy window optimised Thallium-201 (Tl-201) SPECT has about half the counts of a standard dose from Technetium-99m Sestamibi (Tc99m-Mibi) gated perfusion SPECT. This study investigates the clinical feasibility of rapid energy window optimised Tl-201 gated perfusion SPECT (gated-TI) and compares quantitative left ventricular ejection fraction (LVEF) and visually assessed image quality for wall motion and thickening to analogous values obtained from Tc99m-Mibi gated perfusion SPECT (gated - mibi). Methods: We studied 60 patients with a rest gated Tl-201 SPECT (100 MBq, 77KeV peak, 34% window, 20 sec/projection) followed by a post stress gated Sestamibi SPECT (1GBq, 140KeV, 20% window, 20 sec/projection) separate dual isotope protocol. LVEF quantitation was performed using commercially available software (SPECTEF, General Electric). Visual grading of image quality for wall thickening and motion was performed using a three-point scale (excellent, good and poor). Results: LVEF for gated Tl-201 SPECT was 59.6 ± 12.0% (Mean ± SD). LVEF for gated Sestamibi SPECT was 60.4 ±11.4% (Mean ± SD). These were not significantly different (P=0.27, T-Test). There was good correlation (r=0.9) between gated-TI and gated-mibi LVEF values. The quality of gated-Tl images was ranked as excellent, good and poor in 12, 50 and 38% of the patients respectively. Image quality was better in gated-mibi SPECT, with ratings of 12, 62 and 26% respectively. Conclusion: Rapid gated Thallium-201 acquisition with energy window optimisation can be effectively performed on majority of patients and offers the opportunity to assess not only myocardial perfusion and function, as with Technetium based agents, but also viability using a single day one isotope protocol

  7. An improved protocol for efficient transformation and regeneration of diverse indica rice cultivars

    Directory of Open Access Journals (Sweden)

    Sahoo Khirod K

    2011-12-01

    Full Text Available Abstract Background Rice genome sequencing projects have generated remarkable amount of information about genes and genome architecture having tremendous potential to be utilized in both basic and applied research. Success in transgenics is paving the way for preparing a road map of functional genomics which is expected to correlate action of a gene to a trait in cellular and organismal context. However, the lack of a simple and efficient method for transformation and regeneration is a major constraint for such studies in this important cereal crop. Results In the present study, we have developed an easy, rapid and highly efficient transformation and regeneration protocol using mature seeds as explants and found its successful applicability to a choice of elite indica rice genotypes. We have optimized various steps of transformation and standardized different components of the regeneration medium including growth hormones and the gelling agent. The modified regeneration medium triggers production of large number of shoots from smaller number of calli and promotes their faster growth, hence significantly advantageous over the existing protocols where the regeneration step requires maximum time. Using this protocol, significantly higher transformation efficiency (up to 46% and regeneration frequency (up to 92% for the untransformed calli and 59% for the transformed calli were achieved for the four tested cultivars. We have used this protocol to produce hundreds of independent transgenic lines of different indica rice genotypes. Upon maturity, these transgenic lines were fertile thereby indicating that faster regeneration during tissue culture did not affect their reproductive potential. Conclusions This speedy, yet less labor-intensive, protocol overcomes major limitations associated with genetic manipulation in rice. Moreover, our protocol uses mature seeds as the explant, which can easily be obtained in quantity throughout the year and kept

  8. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  9. The cumulative effect of multiple critical care protocols on length of stay in a geriatric trauma population.

    Science.gov (United States)

    Frederickson, Tiffany A; Renner, Catherine Hackett; Swegle, James R; Sahr, Sheryl M

    2013-01-01

    The elderly individuals are the most rapidly growing cohort within the US population, and a corresponding increase is being seen in elderly trauma patients. Elderly patients are more likely to have a hospital length of stay (LOS) in excess of 10 days. They account for 60% of total ICU days. Length of stay is frequently used as a proxy measure for improvement in injury outcomes, changes in quality of care, and hospital outcomes. Patient care protocols are typically created from evidence-based guidelines that serve to reduce variation in care from patient to patient. Patient care protocols have been found to positively impact patient care with reduced duration of mechanical ventilation, shorter LOS in the ICU and shorter overall hospitalization time, reduced mortality, and reduced health care costs. The following study was designed to assess the impact of the implementation of 4 patient care protocols within an elderly trauma population. We hypothesized that the implementation of these protocols would have a beneficial impact on patient care that could be measured by a decrease in hospital LOS. An archival, retrospective pretest/posttest study was performed on elderly trauma patients. The new protocols helped guide practical changes in care that resulted in a 32% decrease in LOS for our elderly trauma patients which exceeds the 25% decrease found in other studies. Additionally, the "Other" category for each variable was less frequently used in the post-protocol phase than in the pre-protocol phase, suggesting a spillover effect on the level of detail recorded in the patient chart. With less variation in practices in the post-protocol phase, Injury Severity score, and admission systolic blood pressure emerged as significant predictors of LOS.

  10. Development of a new protocol for rapid bacterial identification and susceptibility testing directly from urine samples.

    Science.gov (United States)

    Zboromyrska, Y; Rubio, E; Alejo, I; Vergara, A; Mons, A; Campo, I; Bosch, J; Marco, F; Vila, J

    2016-06-01

    The current gold standard method for the diagnosis of urinary tract infections (UTI) is urine culture that requires 18-48 h for the identification of the causative microorganisms and an additional 24 h until the results of antimicrobial susceptibility testing (AST) are available. The aim of this study was to shorten the time of urine sample processing by a combination of flow cytometry for screening and matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF-MS) for bacterial identification followed by AST directly from urine. The study was divided into two parts. During the first part, 675 urine samples were processed by a flow cytometry device and a cut-off value of bacterial count was determined to select samples for direct identification by MALDI-TOF-MS at ≥5 × 10(6) bacteria/mL. During the second part, 163 of 1029 processed samples reached the cut-off value. The sample preparation protocol for direct identification included two centrifugation and two washing steps. Direct AST was performed by the disc diffusion method if a reliable direct identification was obtained. Direct MALDI-TOF-MS identification was performed in 140 urine samples; 125 of the samples were positive by urine culture, 12 were contaminated and 3 were negative. Reliable direct identification was obtained in 108 (86.4%) of the 125 positive samples. AST was performed in 102 identified samples, and the results were fully concordant with the routine method among 83 monomicrobial infections. In conclusion, the turnaround time of the protocol described to diagnose UTI was about 1 h for microbial identification and 18-24 h for AST. Copyright © 2016 European Society of Clinical Microbiology and Infectious Diseases. Published by Elsevier Ltd. All rights reserved.

  11. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  12. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  13. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  14. Age-Dependent Effects of Topiramate on the Acquisition and the Retention of Rapid Kindling

    Science.gov (United States)

    Mazarati, Andréy; Shin, Don; Auvin, Stéphane; Sankar, Raman

    2008-01-01

    Summary Purpose To examine antiepileptogenic, disease-modifying, and anticonvulsant effects of topiramate under conditions of rapid kindling at different stages of development. Methods Afterdischarge threshold (ADT) and duration (ADD) were examined in two-, three-, and five-week old Wistar rats before and after administration of topiramate (200 mg/kg). Animals underwent a rapid kindling protocol (sixty 10 second trains, bipolar 20 Hz square wave pulses delivered every five minutes). The progression of behavioral and electrographic seizures, and responses to test stimulations 24 hours after the protocol were compared between topiramate and vehicle treated control rats. In addition, rats that were previously given vehicle only prior to kindling, were then given topiramate to examine the effect on established kindled seizures. Results In two-week old animals, topiramate affected neither the baseline afterdischarge, nor the progression of kindled seizures. In three-week old rats, topiramate did not modify the baseline afterdischarge, but significantly delayed the occurrence of full motor seizures in response to repeated stimulations. Topiramate treatment of five-week old rats increased baseline ADT, shortened ADD, and delayed the progression of kindled seizures. Twenty four hours after the last kindling stimulation, animals of all ages exhibited a decreased ADT, an increase ADD, and developed behavioral seizures in response to threshold stimulation. Vehicle treated kindled rats that were then given topiramate displayed significantly attenuated behavioral seizures induced by the threshold stimulation. Conclusions Topiramate exhibited age-dependent disease-modifying effects under conditions of rapid kindling, but failed to block epileptogenesis. Topiramate also inhibited kindled seizures with equal efficacy across the three ages. PMID:17319916

  15. The role of basiliximab in the evolving renal transplantation immunosuppression protocol

    Directory of Open Access Journals (Sweden)

    Paola Salis

    2008-06-01

    Full Text Available Paola Salis, Chiara Caccamo, Roberto Verzaro, Salvatore Gruttadauria, Mary ArteroDivision of Nephrology and Division of Abdominal Transplantation, Istituto Mediterraneo per i Trapianti e Terapie ad Alta Specializzazione, Palermo, ItalyAbstract: Basiliximab is a chimeric mouse-human monoclonal antibody directed against the alpha chain of the interleukin-2 (IL-2 receptor on activated T lymphocytes. It was shown in phase III trials to reduce the number and severity of acute rejection episodes in the first year following renal transplantation in adults and children, with a reasonable cost-benefit ratio. The drug does not increase the incidence of opportunistic infections or malignancies above baseline in patients treated with conventional calcineurin inhibitor-based immunosuppression. In the field of renal transplantation, basiliximab does not increase kidney or patient survival, despite the reduction in the number of rejection episodes. Basiliximab may reduce the incidence of delayed graft function. In comparison with lymphocyte-depleting antibodies basiliximab appears to have equal efficacy in standard immunological risk patients. Recently, IL-2 receptor monoclonal antibodies have been used with the objective of reducing or eliminating the more toxic elements of the standard immunosuppression protocol. Several trials have incorporated basiliximab in protocols designed to avoid or withdraw rapidly corticosteroids, as well as protocols which substitute target-of-rapamycin (TOR inhibitors for calcineurin inhibitors.Keywords: basiliximab, renal transplantation, IL-2 receptor antagonists, induction, immunosuppression, corticosteroids, calcineurin inhibitors

  16. A rapid tattoo removal technique using a combination of pulsed Er:YAG and Q-Switched Nd:YAG in a split lesion protocol.

    Science.gov (United States)

    Sardana, Kabir; Ranjan, Rashmi; Kochhar, Atul M; Mahajan, Khushbu Goel; Garg, Vijay K

    2015-01-01

    Tattoo removal has evolved over the years and though Q-switched laser is the 'workhorse' laser, it invariably requires multiple sittings, which are dependent on numerous factors, including the skin colour, location of the tattoo, age of the tattoo, colour of pigment used, associated fibrosis and the kind of tattoo treated. Though ablative lasers, both pulsed CO2 and Er:YAG, have been used for recalcitrant tattoos, very few studies have been done comparing them with pigment-specific lasers. Our study was based on the premise that ablating the epidermis overlying the tattoo pigment with Er:YAG could help in gaining better access to the pigment which would enable the Q-switched laser to work effectively with less beam scattering. A study of rapid tattoo removal (RTR) technique using a combination of pulsed Er:YAG and Q-Switched Nd:YAG in a split lesion protocol. This prospective study was undertaken during 2010-13 at a laser Clinic in the Maulana Azad Medical College, New Delhi. A total of 10 patients were recruited, 5 of amateur tattoo and 5 of professional tattoo. After informed consent each tattoo was arbitrarily 'split' into two parts. One part was treated with QS Nd:YAG laser(1064 nm) and the other part with Er:YAG laser immediately followed by the QS Nd:YAG. The laser treatments were repeated at 6-week intervals until the tattoo pigment had cleared. On the combination side in subsequent sittings only the QS Nd:YAG was used, to minimize repetitive ablation. To ensure consistency in the intervention methods a trained dermatologist who was independent of the treatment delivery randomly rated 10% of the procedures. The mean improvement achieved by the Q-switched laser (2.93) was less than the combination laser (3.85) side (p = 0.001) and needed more sessions (3.8 vs. 1.6; p = 0.001). There was a statistically significant difference in the improvement on the combination side till the second session. On the combination side patients required a maximum of 2 sessions

  17. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  18. Beyond communication: the role of standardized protocols in a changing health care environment.

    Science.gov (United States)

    Vardaman, James M; Cornell, Paul; Gondo, Maria B; Amis, John M; Townsend-Gervis, Mary; Thetford, Carol

    2012-01-01

    Communication errors have grave consequences in health care settings. The situation-background-assessment-recommendation (SBAR) protocol has been theorized to improve communication by creating a common language between nurses and physicians in acute care situations. This practice is gaining acceptance across the health care field. However, as yet, there has been little investigation of the ways in which SBAR may have an impact on how health care professionals operate beyond the creation of a common language. The purposes of the study were to explore the implementation of the SBAR protocol and investigate the potential impact of SBAR on the day-to-day experiences of nurses. We performed a qualitative case study of 2 hospitals that were implementing the SBAR protocol. We collected data from 80 semistructured interviews with nurses, nurse manager, and physicians; observation of nursing and other hospital activities; and documents that pertained to the implementation of the SBAR protocol. Data were analyzed using a thematic approach. Our analysis revealed 4 dimensions of impact that SBAR has beyond its use as a communication tool: schema formation, development of legitimacy, development of social capital, and reinforcement of dominant logics. The results indicate that SBAR may function as more than a tool to standardize communication among nurses and physicians. Rather, the findings indicate that SBAR may aid in schema development that allows rapid decision making by nurses, provide social capital and legitimacy for less-tenured nurses, and reinforce a move toward standardization in the nursing profession. Our findings further suggest that standardized protocols such as SBAR may be a cost-effective method for hospital managers and administrators to accelerate the socialization of nurses, particularly new hires.

  19. Hypersensitivity and desensitization to antineoplastic agents: outcomes of 189 procedures with a new short protocol and novel diagnostic tools assessment.

    Science.gov (United States)

    Madrigal-Burgaleta, R; Berges-Gimeno, M P; Angel-Pereira, D; Ferreiro-Monteagudo, R; Guillen-Ponce, C; Pueyo, C; Gomez de Salazar, E; Alvarez-Cuesta, E

    2013-07-01

    Desensitization to antineoplastic agents is becoming a standard of care. Efforts to establish and improve these techniques are being made at many institutions. Our aims are to evaluate a new rapid desensitization protocol designed to be shorter (approximately 4 h) and safer (reducing hazardous drugs exposure risks) and to assess the oxaliplatin-specific immunoglobulin E (IgE) as a novel diagnostic tool. Prospective, observational, longitudinal study with patients who, for a 1-year period, suffered reactions to antineoplastic agents and were referred to the Desensitization Program at Ramon y Cajal University Hospital (RCUH). Patients were included or excluded as desensitization candidates after anamnesis, skin testing, risk assessment, and graded challenge. Specific IgE was determined in oxaliplatin-reactive patients. Candidate patients were desensitized using the new RCUH rapid desensitization protocol. Of 189 intravenous rapid desensitizations, 188 were successfully accomplished in the 23 patients who met inclusion criteria for desensitization (of 58 referred patients). No breakthrough reactions occurred in 94% of desensitizations, and most breakthrough reactions were mild. In 10 oxaliplatin-reactive patients, 38 desensitizations were successfully accomplished. Sensitivity for oxaliplatin-specific IgE was 38% (0.35UI/l cutoff point) and 54% (0.10UI/l cutoff point); specificity was 100% for both cutoff points. In the hands of a Desensitization Program, managed by drug desensitization experts, this new protocol has proven an effective therapeutic tool for hypersensitivity to several antineoplastic agents (oxaliplatin, carboplatin, paclitaxel, docetaxel, cyclophosphamide, and rituximab); moreover, it improves safety handling of hazardous drugs. We report the first large series of oxaliplatin desensitizations. Oxaliplatin-specific IgE determination could be helpful. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  20. A rapid protection switching method in carrier ethernet ring networks

    Science.gov (United States)

    Yuan, Liang; Ji, Meng

    2008-11-01

    Abstract: Ethernet is the most important Local Area Network (LAN) technology since more than 90% data traffic in access layer is carried on Ethernet. From 10M to 10G, the improving Ethernet technology can be not only used in LAN, but also a good choice for MAN even WAN. MAN are always constructed in ring topology because the ring network could provide resilient path protection by using less resource (fibre or cable) than other network topologies. In layer 2 data networks, spanning tree protocol (STP) is always used to protect transmit link and preventing the formation of logic loop in networks. However, STP cannot guarantee the efficiency of service convergence when link fault happened. In fact, convergent time of networks with STP is about several minutes. Though Rapid Spanning Tree Protocol (RSTP) and Multi-Spanning Tree Protocol (MSTP) improve the STP technology, they still need a couple of seconds to achieve convergence, and can not provide sub-50ms protection switching. This paper presents a novel rapid ring protection method (RRPM) for carrier Ethernet. Unlike other link-fault detection method, it adopts distributed algorithm to detect link fault rapidly (sub-50ms). When networks restore from link fault, it can revert to the original working state. RRPM can provide single ring protection and interconnected ring protection without the formation of super loop. In normal operation, the master node blocks the secondary port for all non-RRPM Ethernet frames belonging to the given RRPM Ring, thereby avoiding a loop in the ring. When link fault happens, the node on which the failure happens moves from the "ring normal" state to the "ring fault" state. It also sends "link down" frame immediately to other nodes and blocks broken port and flushes its forwarding database. Those who receive "link down" frame will flush forwarding database and master node should unblock its secondary port. When the failure restores, the whole ring will revert to the normal state. That is

  1. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  2. A DNA 'barcode blitz': rapid digitization and sequencing of a natural history collection.

    Science.gov (United States)

    Hebert, Paul D N; Dewaard, Jeremy R; Zakharov, Evgeny V; Prosser, Sean W J; Sones, Jayme E; McKeown, Jaclyn T A; Mantle, Beth; La Salle, John

    2013-01-01

    DNA barcoding protocols require the linkage of each sequence record to a voucher specimen that has, whenever possible, been authoritatively identified. Natural history collections would seem an ideal resource for barcode library construction, but they have never seen large-scale analysis because of concerns linked to DNA degradation. The present study examines the strength of this barrier, carrying out a comprehensive analysis of moth and butterfly (Lepidoptera) species in the Australian National Insect Collection. Protocols were developed that enabled tissue samples, specimen data, and images to be assembled rapidly. Using these methods, a five-person team processed 41,650 specimens representing 12,699 species in 14 weeks. Subsequent molecular analysis took about six months, reflecting the need for multiple rounds of PCR as sequence recovery was impacted by age, body size, and collection protocols. Despite these variables and the fact that specimens averaged 30.4 years old, barcode records were obtained from 86% of the species. In fact, one or more barcode compliant sequences (>487 bp) were recovered from virtually all species represented by five or more individuals, even when the youngest was 50 years old. By assembling specimen images, distributional data, and DNA barcode sequences on a web-accessible informatics platform, this study has greatly advanced accessibility to information on thousands of species. Moreover, much of the specimen data became publically accessible within days of its acquisition, while most sequence results saw release within three months. As such, this study reveals the speed with which DNA barcode workflows can mobilize biodiversity data, often providing the first web-accessible information for a species. These results further suggest that existing collections can enable the rapid development of a comprehensive DNA barcode library for the most diverse compartment of terrestrial biodiversity - insects.

  3. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  4. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  5. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  6. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  7. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  8. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  9. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  10. Semi-automated, occupationally safe immunofluorescence microtip sensor for rapid detection of Mycobacterium cells in sputum.

    Directory of Open Access Journals (Sweden)

    Shinnosuke Inoue

    Full Text Available An occupationally safe (biosafe sputum liquefaction protocol was developed for use with a semi-automated antibody-based microtip immunofluorescence sensor. The protocol effectively liquefied sputum and inactivated microorganisms including Mycobacterium tuberculosis, while preserving the antibody-binding activity of Mycobacterium cell surface antigens. Sputum was treated with a synergistic chemical-thermal protocol that included moderate concentrations of NaOH and detergent at 60°C for 5 to 10 min. Samples spiked with M. tuberculosis complex cells showed approximately 10(6-fold inactivation of the pathogen after treatment. Antibody binding was retained post-treatment, as determined by analysis with a microtip immunosensor. The sensor correctly distinguished between Mycobacterium species and other cell types naturally present in biosafe-treated sputum, with a detection limit of 100 CFU/mL for M. tuberculosis, in a 30-minute sample-to-result process. The microtip device was also semi-automated and shown to be compatible with low-cost, LED-powered fluorescence microscopy. The device and biosafe sputum liquefaction method opens the door to rapid detection of tuberculosis in settings with limited laboratory infrastructure.

  11. Rapid survey protocol that provides dynamic information on reef condition to managers of the Great Barrier Reef.

    Science.gov (United States)

    Beeden, R J; Turner, M A; Dryden, J; Merida, F; Goudkamp, K; Malone, C; Marshall, P A; Birtles, A; Maynard, J A

    2014-12-01

    Managing to support coral reef resilience as the climate changes requires strategic and responsive actions that reduce anthropogenic stress. Managers can only target and tailor these actions if they regularly receive information on system condition and impact severity. In large coral reef areas like the Great Barrier Reef Marine Park (GBRMP), acquiring condition and impact data with good spatial and temporal coverage requires using a large network of observers. Here, we describe the result of ~10 years of evolving and refining participatory monitoring programs used in the GBR that have rangers, tourism operators and members of the public as observers. Participants complete Reef Health and Impact Surveys (RHIS) using a protocol that meets coral reef managers' needs for up-to-date information on the following: benthic community composition, reef condition and impacts including coral diseases, damage, predation and the presence of rubbish. Training programs ensure that the information gathered is sufficiently precise to inform management decisions. Participants regularly report because the demands of the survey methodology have been matched to their time availability. Undertaking the RHIS protocol we describe involves three ~20 min surveys at each site. Participants enter data into an online data management system that can create reports for managers and participants within minutes of data being submitted. Since 2009, 211 participants have completed a total of more than 10,415 surveys at more than 625 different reefs. The two-way exchange of information between managers and participants increases the capacity to manage reefs adaptively, meets education and outreach objectives and can increase stewardship. The general approach used and the survey methodology are both sufficiently adaptable to be used in all reef regions.

  12. [Evaluation of a new blood gas analysis system: RapidPoint 500(®)].

    Science.gov (United States)

    Nicolas, Thierry; Cabrolier, Nadège; Bardonnet, Karine; Davani, Siamak

    2013-01-01

    We present here evaluation of a new blood gas analysis system, RapidPoint 500(®) (Siemens Healthcare Diagnostics). The aim of this research was to compare the ergonomics and analytical performances of this analyser with those of the RapidLab 1265 for the following parameters: pH, partial oxygen pressure, partial carbon dioxide pressure, sodium, potassium, ionized calcium, lactate and the CO-oximetry parameters: hemoglobin, oxyhemoglobin, carboxyhemoglobin, methemoglobin, reduced hemoglobin, neonatal bilirubin; as well as with the Dimension Vista 500 results for chloride and glucose. The Valtec protocol, recommended by the French Society of Clinical Biology (SFBC), was used to analyze the study results. The experiment was carried out over a period of one month in the Department of medical biochemistry. One hundred sixty five samples from adult patients admitted to the ER or hospitalized in intensive care were tested. The RapidPoint 500(®) was highly satisfactory from an ergonomic point of view. Intra-and inter- assay coefficients of variation (CV) with the three control levels were below those recommended by the SFBC for all parameters, and the comparative study gave coefficients of determination higher than 0.91. Taken together, the RapidPoint 500(®) appears fully satisfactory in terms of ergonomics and analytical performance.

  13. Bactec™ blood culture bottles allied to MALDI-TOF mass spectrometry: rapid etiologic diagnosis of bacterial endophthalmitis.

    Science.gov (United States)

    Tanaka, Tatiana; Oliveira, Luiza Manhezi de Freitas; Ferreira, Bruno Fortaleza de Aquino; Kato, Juliana Mika; Rossi, Flavia; Correa, Karoline de Lemes Giuntini; Pimentel, Sergio Luis Gianotti; Yamamoto, Joyce Hisae; Almeida Junior, João Nóbrega

    2017-07-01

    Matrix-assisted laser desorption ionization-time of flight (MALDI-TOF) mass spectrometry (MS) has been used for direct identification of pathogens from blood-inoculated blood culture bottles (BCBs). We showed that MALDI-TOF MS is an useful technique for rapid identification of the causative agents of endophthalmitis from vitreous humor-inoculated BCBs with a simple protocol. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Rapid measurement of residual dipolar couplings for fast fold elucidation of proteins

    Energy Technology Data Exchange (ETDEWEB)

    Rasia, Rodolfo M. [Jean-Pierre Ebel CNRS/CEA/UJF, Institut de Biologie Structurale (France); Lescop, Ewen [CNRS, Institut de Chimie des Substances Naturelles (France); Palatnik, Javier F. [Universidad Nacional de Rosario, Instituto de Biologia Molecular y Celular de Rosario, Facultad de Ciencias Bioquimicas y Farmaceuticas (Argentina); Boisbouvier, Jerome, E-mail: jerome.boisbouvier@ibs.fr; Brutscher, Bernhard, E-mail: Bernhard.brutscher@ibs.fr [Jean-Pierre Ebel CNRS/CEA/UJF, Institut de Biologie Structurale (France)

    2011-11-15

    It has been demonstrated that protein folds can be determined using appropriate computational protocols with NMR chemical shifts as the sole source of experimental restraints. While such approaches are very promising they still suffer from low convergence resulting in long computation times to achieve accurate results. Here we present a suite of time- and sensitivity optimized NMR experiments for rapid measurement of up to six RDCs per residue. Including such an RDC data set, measured in less than 24 h on a single aligned protein sample, greatly improves convergence of the Rosetta-NMR protocol, allowing for overnight fold calculation of small proteins. We demonstrate the performance of our fast fold calculation approach for ubiquitin as a test case, and for two RNA-binding domains of the plant protein HYL1. Structure calculations based on simulated RDC data highlight the importance of an accurate and precise set of several complementary RDCs as additional input restraints for high-quality de novo structure determination.

  15. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  16. COMPARATIVE EVALUATION OF CONVENTIONAL VERSUS RAPID METHODS FOR AMPLIFIABLE GENOMIC DNA ISOLATION OF CULTURED Azospirillum sp. JG3

    Directory of Open Access Journals (Sweden)

    Stalis Norma Ethica

    2013-12-01

    Full Text Available As an initial attempt to reveal genetic information of Azospirillum sp. JG3 strain, which is still absence despite of the strains' ability in producing valued enzymes, two groups of conventional methods: lysis-enzyme and column-kit; and two rapid methods: thermal disruption and intact colony were evaluated. The aim is to determine the most practical method for obtaining high-grade PCR product using degenerate primers as part of routine-basis protocols for studying the molecular genetics of the Azospirillal bacteria. The evaluation includes the assessment of electrophoresis gel visualization, pellet appearance, preparation time, and PCR result of extracted genomic DNA from each method. Our results confirmed that the conventional methods were more superior to the rapid methods in generating genomic DNA isolates visible on electrophoresis gel. However, modification made in the previously developed DNA isolation protocol giving the simplest and most rapid method of all methods used in this study for extracting PCR-amplifiable DNA of Azospirillum sp. JG3. Intact bacterial cells (intact colony loaded on electrophoresis gel could present genomic DNA band, but could not be completely amplified by PCR without thermal treatment. It can also be inferred from our result that the 3 to 5-min heating in dH2O step is critical for the pre-treatment of colony PCR of Azospirillal cells.

  17. [Professional divers: analysis of critical issues and proposal of a health protocol for work fitness].

    Science.gov (United States)

    Pedata, Paola; Corvino, Anna Rita; Napolitano, Raffaele Carmine; Garzillo, Elpidio Maria; Furfaro, Ciro; Lamberti, Monica

    2016-01-20

    From many years now, thanks to the development of modern diving techniques, there has been a rapid spread of diving activities everywhere. In fact, divers are ever more numerous both among the Armed Forces and civilians who dive for work, like fishing, biological research and archeology. The aim of the study was to propose a health protocol for work fitness of professional divers keeping in mind the peculiar work activity, existing Italian legislation that is almost out of date and the technical and scientific evolution in this occupational field. We performed an analysis of the most frequently occurring diseases among professional divers and of the clinical investigation and imaging techniques used for work fitness assessment of professional divers. From analysis of the health protocol recommended by D.M. 13 January 1979 (Ministerial Decree), that is most used by occupational health physician, several critical issues emerged. Very often the clinical investigation and imaging techniques still used are almost obsolete, ignoring the execution of simple and inexpensive investigations that are more useful for work fitness assessment. Considering the out-dated legislation concerning diving disciplines, it is necessary to draw up a common health protocol that takes into account clinical and scientific knowledge and skills acquired in this area. This protocol's aim is to propose a useful tool for occupational health physicians who work in this sector.

  18. Rapid Quantification of Abscisic Acid by GC-MS/MS for Studies of Abiotic Stress Response.

    Science.gov (United States)

    Verslues, Paul E

    2017-01-01

    Drought and low water potential induce large increases in Abscisic Acid (ABA ) content of plant tissue. This increased ABA content is essential to regulate downstream stress resistance responses; however, the mechanisms regulating ABA accumulation are incompletely known. Thus, the ability to accurately quantify ABA at high throughput and low cost is important for plant stress research. We have combined and modified several previously published protocols to establish a rapid ABA analysis protocol using gas chromatography-tandem mass spectrometry (GC-MS/MS). Derivatization of ABA is performed with (trimethylsilyl)-diazomethane rather than the harder to prepare diazomethane. Sensitivity of the analysis is sufficient that small samples of low water potential treated Arabidopsis thaliana seedlings can be routinely analyzed in reverse genetic studies of putative stress regulators as well as studies of natural variation in ABA accumulation.

  19. Fast-track protocols in devascularization for cirrhotic portal hypertension

    Directory of Open Access Journals (Sweden)

    Yang Fei

    2015-06-01

    Full Text Available Summary Introduction/objective: fast-tract surgery (FTS has been rapidly embraced by surgeons as a mechanism for improving patient care and driving down complications and costs. The aim of this study was to determine if any improvement in outcomes occurred after FTS protocol for selective double portazygous disconnection with preserving vagus (SDPDPV compared with non-FTS postoperative care. Methods: patients eligible for SDPDPV in the period January 2012-April 2014 were randomly selected for the FTS group or non-FTS group. A designed protocol was used in the FTS group with emphasis on an interdisciplinary approach. The non-FTS group was treated using previously established standard procedures. The number of postoperative complications, time of functional recovery and duration of hospital stay were recorded. Results: patients in the FTS group (n=59 and non-FTS group (n=57 did not differ in terms of preoperative data and operative details (p>0.05. The FTS procedure led to significantly better control and faster restoration of gastrointestinal functions, food tolerance, rehabilitation and hospital discharge (p<0.05. Postoperative complications, including nausea/vomiting, severe ascites, wound infection, urinary tract infection and pulmonary infection were all significantly lower in the FTS group (p<0.05. According to the postoperative morbidity classification used by Clavien, overall complications and grade I complications were both significantly lower in the FTS group compared with the non-FTS group (p<0.05. Conclusion: adopting the FTS protocol helped to recover gastrointestinal functions, to reduce frequency of postoperative complications and to reduce hospital stay. The FTS strategy is safe and effective in improving postoperative outcomes.

  20. Test Protocols for Advanced Inverter Interoperability Functions – Main Document

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not currently required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already

  1. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  2. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  3. Optimized exosome isolation protocol for cell culture supernatant and human plasma

    Directory of Open Access Journals (Sweden)

    Richard J. Lobb

    2015-07-01

    Full Text Available Extracellular vesicles represent a rich source of novel biomarkers in the diagnosis and prognosis of disease. However, there is currently limited information elucidating the most efficient methods for obtaining high yields of pure exosomes, a subset of extracellular vesicles, from cell culture supernatant and complex biological fluids such as plasma. To this end, we comprehensively characterize a variety of exosome isolation protocols for their efficiency, yield and purity of isolated exosomes. Repeated ultracentrifugation steps can reduce the quality of exosome preparations leading to lower exosome yield. We show that concentration of cell culture conditioned media using ultrafiltration devices results in increased vesicle isolation when compared to traditional ultracentrifugation protocols. However, our data on using conditioned media isolated from the Non-Small-Cell Lung Cancer (NSCLC SK-MES-1 cell line demonstrates that the choice of concentrating device can greatly impact the yield of isolated exosomes. We find that centrifuge-based concentrating methods are more appropriate than pressure-driven concentrating devices and allow the rapid isolation of exosomes from both NSCLC cell culture conditioned media and complex biological fluids. In fact to date, no protocol detailing exosome isolation utilizing current commercial methods from both cells and patient samples has been described. Utilizing tunable resistive pulse sensing and protein analysis, we provide a comparative analysis of 4 exosome isolation techniques, indicating their efficacy and preparation purity. Our results demonstrate that current precipitation protocols for the isolation of exosomes from cell culture conditioned media and plasma provide the least pure preparations of exosomes, whereas size exclusion isolation is comparable to density gradient purification of exosomes. We have identified current shortcomings in common extracellular vesicle isolation methods and provide a

  4. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  5. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  6. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  7. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  8. ASSESSMENT OF RIP-V1 AND OSPF-V2 PROTOCOL WITH CONSIDERATION OF CONVERGENCE CRITERIA AND SENDING PROTOCOLS TRAFFIC

    Directory of Open Access Journals (Sweden)

    Hamed Jelodar

    2014-03-01

    Full Text Available Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.

  9. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  10. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  11. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  12. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  13. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  14. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  15. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  16. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  17. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  18. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  19. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  20. Rapid lentiviral transduction preserves the engraftment potential of Fanca(-/-) hematopoietic stem cells.

    Science.gov (United States)

    Müller, Lars U W; Milsom, Michael D; Kim, Mi-Ok; Schambach, Axel; Schuesler, Todd; Williams, David A

    2008-06-01

    Fanconi anemia (FA) is a rare recessive syndrome, characterized by congenital anomalies, bone marrow failure, and predisposition to cancer. Two earlier clinical trials utilizing gamma-retroviral vectors for the transduction of autologous FA hematopoietic stem cells (HSCs) required extensive in vitro manipulation and failed to achieve detectable long-term engraftment of transduced HSCs. As a strategy for minimizing ex vivo manipulation, we investigated the use of a "rapid" lentiviral transduction protocol in a murine Fanca(-/-) model. Importantly, while this and most murine models of FA fail to completely mimic the human hematopoietic phenotype, we observed a high incidence of HSC transplant engraftment failure and low donor chimerism after conventional transduction (CT) of Fanca(-/-) donor cells. In contrast, rapid transduction (RT) of Fanca(-/-) HSCs preserved engraftment to the level achieved in wild-type cells, resulting in long-term multilineage engraftment of gene-modified cells. We also demonstrate the correction of the characteristic hypersensitivity of FA cells against the cross-linking agent mitomycin C (MMC), and provide evidence for the advantage of using pharmacoselection as a means of further increasing gene-modified cells after RT. Collectively, these data support the use of rapid lentiviral transduction for gene therapy in FA.

  1. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  2. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Jingwei Liu

    2016-05-01

    Full Text Available Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  3. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  4. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  5. Establishment of minimal positive-control conditions to ensure brain safety during rapid development of emergency vaccines.

    Science.gov (United States)

    Baek, Hyekyung; Kim, Kwang Ho; Park, Min Young; Kim, Kyeongryun; Ko, Bokyeong; Seo, Hyung Seok; Kim, Byoung Soo; Hahn, Tae-Wook; Yi, Sun Shin

    2017-08-31

    With the increase in international human and material exchanges, contagious and infectious epidemics are occurring. One of the effective methods of epidemic inhibition is the rapid development and supply of vaccines. Considering the safety of the brain during vaccine development is very important. However, manuals for brain safety assays for new vaccines are not uniform or effective globally. Therefore, the aim of this study is to establish a positive-control protocol for an effective brain safety test to enhance rapid vaccine development. The blood-brain barrier's tight junctions provide selective defense of the brain; however, it is possible to destroy these important microstructures by administering lipopolysaccharides (LPSs), thereby artificially increasing the permeability of brain parenchyma. In this study, test conditions are established so that the degree of brain penetration or brain destruction of newly developed vaccines can be quantitatively identified. The most effective conditions were suggested by measuring time-dependent expressions of tight junction biomarkers (zonula occludens-1 [ZO-1] and occludin) in two types of mice (C57BL/6 and ICR) following exposure to two types of LPS ( Salmonella and Escherichia ). In the future, we hope that use of the developed positive-control protocol will help speed up the determination of brain safety of novel vaccines.

  6. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  7. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  8. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  9. Development of a multiplex polymerase chain reaction protocol for the simultaneous detection of Salmonella enterica serovar Typhi and Class 1 integron

    Directory of Open Access Journals (Sweden)

    Juthika Mandal

    2014-09-01

    Full Text Available Objective: To develop a multiplex polymerase chain reaction (PCR protocol for the simultaneous detection of Salmonella enterica serovar Typhi (S. Typhi and Class 1 integron, so as to aid rapid diagnosis of S. Typhi cases and help in the selection of treatment options based on the presence of the Class 1 integron that can carry resistance cassettes to a range of antibiotics. Methods: PCR for amplification of specific regions was done using fliC-d and intl primers and agarose gel electrophoresis was used for resolution of PCR products. Results: The fliC-d primer (S. Typhi specific amplified a 587 bp region and the intl primer (Class 1 integron specific amplified two bands approximately 500 and 550 bps. The developed method was specific for S. Typhi and did not amplify any products with Salmonella enterica serovar Typhimurium ATCC 14028, Salmonella enterica serovar Paratyphi and Escherichia coli O157:H7. Conclusions: The developed multiplex PCR protocol can be used for rapid diagnosis and aid in proper treatment strategies for patients infected with S. Typhi.

  10. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  11. New Protocol Based on UHPLC-MS/MS for Quantitation of Metabolites in Xylose-Fermenting Yeasts

    Science.gov (United States)

    Campos, Christiane Gonçalves; Veras, Henrique César Teixeira; de Aquino Ribeiro, José Antônio; Costa, Patrícia Pinto Kalil Gonçalves; Araújo, Katiúscia Pereira; Rodrigues, Clenilson Martins; de Almeida, João Ricardo Moreira; Abdelnur, Patrícia Verardi

    2017-12-01

    Xylose fermentation is a bottleneck in second-generation ethanol production. As such, a comprehensive understanding of xylose metabolism in naturally xylose-fermenting yeasts is essential for prospection and construction of recombinant yeast strains. The objective of the current study was to establish a reliable metabolomics protocol for quantification of key metabolites of xylose catabolism pathways in yeast, and to apply this protocol to Spathaspora arborariae. Ultra-high performance liquid chromatography coupled to tandem mass spectrometry (UHPLC-MS/MS) was used to quantify metabolites, and afterwards, sample preparation was optimized to examine yeast intracellular metabolites. S. arborariae was cultivated using xylose as a carbon source under aerobic and oxygen-limited conditions. Ion pair chromatography (IPC) and hydrophilic interaction liquid chromatography-tandem mass spectrometry (HILIC-MS/MS) were shown to efficiently quantify 14 and 5 metabolites, respectively, in a more rapid chromatographic protocol than previously described. Thirteen and eleven metabolites were quantified in S. arborariae under aerobic and oxygen-limited conditions, respectively. This targeted metabolomics protocol is shown here to quantify a total of 19 metabolites, including sugars, phosphates, coenzymes, monosaccharides, and alcohols, from xylose catabolism pathways (glycolysis, pentose phosphate pathway, and tricarboxylic acid cycle) in yeast. Furthermore, to our knowledge, this is the first time that intracellular metabolites have been quantified in S. arborariae after xylose consumption. The results indicated that fine control of oxygen levels during fermentation is necessary to optimize ethanol production by S. arborariae. The protocol presented here may be applied to other yeast species and could support yeast genetic engineering to improve second generation ethanol production. [Figure not available: see fulltext.

  12. A novel screening method based on menadione mediated rapid reduction of tetrazolium salt for testing of anti-mycobacterial agents.

    Science.gov (United States)

    Singh, Upasana; Akhtar, Shamim; Mishra, Abhishek; Sarkar, Dhiman

    2011-02-01

    A microplate-based rapid, inexpensive and robust technique is developed by using tetrazolium salt 2,3-bis[2-methyloxy-4-nitro-5-sulfophenyl]-2H-tetrazolium-5-carboxanilide (XTT) and menadione to determine the viability of Mycobacterium tuberculosis, Mycobacterium bovis BCG and Mycobacterium smegmatis bacilli in microplate format. In general, XTT reduction is an extremely slow process which takes almost 24 h to produce a detectable signal. Menadione could drastically induce this reduction to an almost equal extent within a few minutes in a dose dependent manner. The reduction of XTT is directly proportional to the cell concentration in the presence of menadione. The standardized protocol used 200 μM of XTT and 60 μM of menadione in 250 μl of cell suspension grown either in aerobic or anaerobic conditions. The cell suspension of M. bovis BCG and M. tuberculosis were incubated for 40 min before reading the optical density at 470 nm whereas M. smegmatis was incubated for 20 min. Calculated Signal/Noise (S/N) ratios obtained by applying this protocol were 5.4, 6.4 and 9.4 using M. bovis BCG, M. tuberculosis and M. smegmatis respectively. The calculated Z' factors were >0.8 for all mycobacterium bacilli indicating the robustness of the XTT Reduction Menadione Assay (XRMA) for rapid screening of inhibitors. The assay protocol was validated by applying 10 standard anti-tubercular agents on M. tuberculosis, M. bovis BCG and M. smegmatis. The Minimum Inhibitory Concentration (MIC) values were found to be similar to reported values from Colony Forming Unit (CFU) and REMA (resazurin microplate assay) assays. Altogether, XRMA is providing a novel anti-tubercular screening protocol which could be useful in high throughput screening programs against different physiological stages of the bacilli. Copyright © 2010 Elsevier B.V. All rights reserved.

  13. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  14. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  15. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  16. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  17. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  18. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  19. Rapid manufacturing of low-noise membranes for nanopore sensors by trans-chip illumination lithography

    International Nuclear Information System (INIS)

    Janssen, Xander J A; Jonsson, Magnus P; Plesa, Calin; Soni, Gautam V; Dekker, Cees; Dekker, Nynke H

    2012-01-01

    In recent years, the concept of nanopore sensing has matured from a proof-of-principle method to a widespread, versatile technique for the study of biomolecular properties and interactions. While traditional nanopore devices based on a nanopore in a single layer membrane supported on a silicon chip can be rapidly fabricated using standard microfabrication methods, chips with additional insulating layers beyond the membrane region can provide significantly lower noise levels, but at the expense of requiring more costly and time-consuming fabrication steps. Here we present a novel fabrication protocol that overcomes this issue by enabling rapid and reproducible manufacturing of low-noise membranes for nanopore experiments. The fabrication protocol, termed trans-chip illumination lithography, is based on illuminating a membrane-containing wafer from its backside such that a photoresist (applied on the wafer’s top side) is exposed exclusively in the membrane regions. Trans-chip illumination lithography permits the local modification of membrane regions and hence the fabrication of nanopore chips containing locally patterned insulating layers. This is achieved while maintaining a well-defined area containing a single thin membrane for nanopore drilling. The trans-chip illumination lithography method achieves this without relying on separate masks, thereby eliminating time-consuming alignment steps as well as the need for a mask aligner. Using the presented approach, we demonstrate rapid and reproducible fabrication of nanopore chips that contain small (12 μm × 12 μm) free-standing silicon nitride membranes surrounded by insulating layers. The electrical noise characteristics of these nanopore chips are shown to be superior to those of simpler designs without insulating layers and comparable in quality to more complex designs that are more challenging to fabricate. (paper)

  20. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  1. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  2. Five days of successful oral alimentation for hospitalized patients based upon passing the Yale Swallow Protocol.

    Science.gov (United States)

    Leder, Steven B; Suiter, Debra M

    2014-09-01

    This study aimed to determine the success of oral alimentation and patient retention rate 1 to 5 days after passing the Yale Swallow Protocol. Participants were 200 consecutive acute care inpatients referred for swallow assessment. Inclusion criteria were adequate cognitive abilities to participate safely, completing an oral mechanism examination, and passing the 3-ounce water swallow challenge. Exclusion criteria were altered mental status, failing the 3-ounce challenge, preadmission dysphagia, head-of-bed restrictions alimentation and retention rate. All patients who remained medically and neurologically stable drank thin liquids and ate successfully 1 to 5 days after passing the protocol. Mean (SD) volume of liquid ingested per day was 474.2 (435.5) cc. Patient retention declined steadily from day of testing (n = 200) through post-testing day 5 (n = 95). Passing the Yale Swallow Protocol allowed for initial determination of aspiration risk followed by successful oral alimentation for 1 to 5 days in medically and neurologically stable acute care hospitalized patients and without the need for instrumental dysphagia testing. The decline in patient retention was expected because of increasingly rapid transit through the acute care setting, which often renders longer follow-up problematic. © The Author(s) 2014.

  3. Pelvic Muscle Rehabilitation: A Standardized Protocol for Pelvic Floor Dysfunction

    Directory of Open Access Journals (Sweden)

    Rodrigo Pedraza

    2014-01-01

    Full Text Available Introduction. Pelvic floor dysfunction syndromes present with voiding, sexual, and anorectal disturbances, which may be associated with one another, resulting in complex presentation. Thus, an integrated diagnosis and management approach may be required. Pelvic muscle rehabilitation (PMR is a noninvasive modality involving cognitive reeducation, modification, and retraining of the pelvic floor and associated musculature. We describe our standardized PMR protocol for the management of pelvic floor dysfunction syndromes. Pelvic Muscle Rehabilitation Program. The diagnostic assessment includes electromyography and manometry analyzed in 4 phases: (1 initial baseline phase; (2 rapid contraction phase; (3 tonic contraction and endurance phase; and (4 late baseline phase. This evaluation is performed at the onset of every session. PMR management consists of 6 possible therapeutic modalities, employed depending on the diagnostic evaluation: (1 down-training; (2 accessory muscle isolation; (3 discrimination training; (4 muscle strengthening; (5 endurance training; and (6 electrical stimulation. Eight to ten sessions are performed at one-week intervals with integration of home exercises and lifestyle modifications. Conclusions. The PMR protocol offers a standardized approach to diagnose and manage pelvic floor dysfunction syndromes with potential advantages over traditional biofeedback, involving additional interventions and a continuous pelvic floor assessment with management modifications over the clinical course.

  4. Rapid Characterization of Constituents in Tribulus terrestris from Different Habitats by UHPLC/Q-TOF MS

    Science.gov (United States)

    Zheng, Wei; Wang, Fangxu; Zhao, Yang; Sun, Xinguang; Kang, Liping; Fan, Ziquan; Qiao, Lirui; Yan, Renyi; Liu, Shuchen; Ma, Baiping

    2017-08-01

    A strategy for rapid identification of the chemical constituents from crude extracts of Tribulus terrestris was proposed using an informatics platform for the UHPLC/Q-TOF MSE data analyses. This strategy mainly utilizes neutral losses, characteristic fragments, and in-house library to rapidly identify the structure of the compounds. With this strategy, rapid characterization of the chemical components of T. terrestris from Beijing, China was successfully achieved. A total of 82 steroidal saponins and nine flavonoids were identified or tentatively identified from T. terrestris. Among them, 15 new components were deduced based on retention times and characteristic MS fragmentation patterns. Furthermore, the chemical components of T. terrestris, including the other two samples from Xinjiang Uygur Autonomous region, China, and Rome, Italy, were also identified with this strategy. Altogether, 141 chemical components were identified from these three samples, of which 39 components were identified or tentatively identified as new compounds, including 35 groups of isomers. It demonstrated that this strategy provided an efficient protocol for the rapid identification of chemical constituents in complex samples such as traditional Chinese medicines (TCMs) by UHPLC/Q-TOF MSE with informatics platform. [Figure not available: see fulltext.

  5. Impact of a Newly Implemented Burn Protocol on Surgically Managed Partial Thickness Burns at a Specialized Burns Center in Singapore.

    Science.gov (United States)

    Tay, Khwee-Soon Vincent; Chong, Si-Jack; Tan, Bien-Keem

    2016-03-01

    This study evaluated the impact of a newly implemented protocol for superficial to mid-dermal partial thickness burns which involves early surgery and rapid coverage with biosynthetic dressing in a specialized national burns center in Singapore. Consecutive patients with 5% or greater total body surface area (TBSA) superficial to mid-dermal partial thickness burns injury admitted to the Burns Centre at the Singapore General Hospital between August and December 2014 for surgery within 48 hours of injury were prospectively recruited into the study to form the protocol group. Comparable historical cases from the year 2013 retrieved from the burns center audit database were used to form the historical control group. Demographics (age, sex), type and depth of burns, %TBSA burnt, number of operative sessions, and length of stay were recorded for each patient of both cohorts. Thirty-nine burns patients managed under the new protocol were compared with historical control (n = 39) comparable in age and extensiveness of burns. A significantly shorter length of stay (P burns was observed in the new protocol group (0.74 day/%TBSA) versus historical control (1.55 day/%TBSA). Fewer operative sessions were needed under the new protocol for burns 10% or greater TBSA burns (P protocol for surgically managed burns patients which involves early surgery and appropriate use of biosynthetic dressing on superficial to mid-dermal partial thickness burns. Clinically, shorter lengths of stay, fewer operative sessions, and decreased need for skin grafting of burns patient were observed.

  6. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  7. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  8. Quantitative analysis of topoisomerase IIα to rapidly evaluate cell proliferation in brain tumors

    International Nuclear Information System (INIS)

    Oda, Masashi; Arakawa, Yoshiki; Kano, Hideyuki; Kawabata, Yasuhiro; Katsuki, Takahisa; Shirahata, Mitsuaki; Ono, Makoto; Yamana, Norikazu; Hashimoto, Nobuo; Takahashi, Jun A.

    2005-01-01

    Immunohistochemical cell proliferation analyses have come into wide use for evaluation of tumor malignancy. Topoisomerase IIα (topo IIα), an essential nuclear enzyme, has been known to have cell cycle coupled expression. We here show the usefulness of quantitative analysis of topo IIα mRNA to rapidly evaluate cell proliferation in brain tumors. A protocol to quantify topo IIα mRNA was developed with a real-time RT-PCR. It took only 3 h to quantify from a specimen. A total of 28 brain tumors were analyzed, and the level of topo IIα mRNA was significantly correlated with its immuno-staining index (p < 0.0001, r = 0.9077). Furthermore, it sharply detected that topo IIα mRNA decreased in growth-inhibited glioma cell. These results support that topo IIα mRNA may be a good and rapid indicator to evaluate cell proliferate potential in brain tumors

  9. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  10. Assessment of four protocols for rapid bacterial identification from positive blood culture pellets by matrix-assisted laser desorption ionization-time of flight mass spectrometry (Vitek® MS).

    Science.gov (United States)

    Thomin, Jean; Aubin, Guillaume Ghislain; Foubert, Fabrice; Corvec, Stéphane

    2015-08-01

    In this study, we developed and compared four protocols to prepare a bacterial pellet from 944 positive blood cultures for direct MALDI-TOF mass spectrometry Vitek® MS analysis. Protocol 4, tested on 200 monomicrobial samples, allowed 83% of bacterial identification. This easy, fast, cheap and accurate method is promising in daily practice, especially to limit broad range antibiotic treatment. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  12. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  13. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  14. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  15. Scientific Research & Subsistence: Protocols to Ensure Co-Existence

    Science.gov (United States)

    Nachman, C.; Holman, A.; DeMaster, D.

    2017-12-01

    Commercial, industrial, and research interests in the Arctic are expanding rapidly. Potentials are numerous and exciting, giving rise to the need for guidelines to ensure interactions among waterway users do not conflict. Of particular concern is the potential for adverse impacts to U.S. Arctic coastal communities that rely on living marine resources for nutritional and cultural health, through subsistence hunts from small craft, ice edges, and shore. Recent events raised concerns over research surveys potentially interfering with subsistence hunts in the Bering, Chukchi, and Beaufort Seas. Incidents led to calls by Native Alaskan communities to restrict science activities with a mixed response from the scientific community (i.e., some sympathetic, some defensive). With a common goal of wanting to mitigate this potential interaction, Federal agencies made a commitment in the National Strategy for the Arctic Region to coordinate and consult with Alaska Natives and also to pursue responsible Arctic stewardship, with understanding through scientific research and traditional knowledge. The effort to create a "Standard of Care" for research surveys incorporates years of experience by subsistence hunters working to mitigate impacts of other anthropogenic activities in the region, as well as best practices by many in the research community. The protocols are designed to ensure potential conflicts between the scientific research community and subsistence hunters are avoided and to encourage mutual assistance and collaboration between researchers and hunters. The guidelines focus on enhancing communication between researchers and subsistence hunters before, during, and after research occurs. The best management practices outlined in the Standard of Care assist those overseeing and funding scientific research in making decisions about how best to accomplish the goals of the research while ensuring protection of the Alaska subsistence lifestyle. These protocols could also be

  16. Scanning and contrast enhancement protocols for multi-slice CT in evaluation of the upper abdomen

    International Nuclear Information System (INIS)

    Awai, Kazuo; Onishi, Hiromitsu; Takada, Koichi; Yamaguchi, Yasuo; Eguchi, Nobuko; Hiraishi, Kumiko; Hori, Shinichi

    2000-01-01

    The advent of multi-slice CT is one of the quantum leaps in computed tomography since the introduction of helical CT. Multi-slice CT can rapidly scan a large longitudinal (z-axis) volume with high longitudinal resolution and low image artifacts. The rapid volume coverage speed of multi-slice CT can increase the difficulty in optimizing the delay time between the beginning of contrast material injection and the acquisition of images and we need accurate knowledge about optimal temporal window for adequate contrast enhancement. High z-axis resolution of multi-slice can improve the quality of three-dimensional images and MPR images and we must select adequate slice thickness and slice intervals in each case. We discuss basic considerations for adequate contrast enhancement and scanning protocols by multi-slice CT scanner in the upper abdomen. (author)

  17. New method development in prehistoric stone tool research: evaluating use duration and data analysis protocols.

    Science.gov (United States)

    Evans, Adrian A; Macdonald, Danielle A; Giusca, Claudiu L; Leach, Richard K

    2014-10-01

    Lithic microwear is a research field of prehistoric stone tool (lithic) analysis that has been developed with the aim to identify how stone tools were used. It has been shown that laser scanning confocal microscopy has the potential to be a useful quantitative tool in the study of prehistoric stone tool function. In this paper, two important lines of inquiry are investigated: (1) whether the texture of worn surfaces is constant under varying durations of tool use, and (2) the development of rapid objective data analysis protocols. This study reports on the attempt to further develop these areas of study and results in a better understanding of the complexities underlying the development of flexible analytical algorithms for surface analysis. The results show that when sampling is optimised, surface texture may be linked to contact material type, independent of use duration. Further research is needed to validate this finding and test an expanded range of contact materials. The use of automated analytical protocols has shown promise but is only reliable if sampling location and scale are defined. Results suggest that the sampling protocol reports on the degree of worn surface invasiveness, complicating the ability to investigate duration related textural characterisation. Copyright © 2014. Published by Elsevier Ltd.

  18. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  19. Improved method for rapid and accurate isolation and identification of Streptococcus mutans and Streptococcus sobrinus from human plaque samples.

    Science.gov (United States)

    Villhauer, Alissa L; Lynch, David J; Drake, David R

    2017-08-01

    Mutans streptococci (MS), specifically Streptococcus mutans (SM) and Streptococcus sobrinus (SS), are bacterial species frequently targeted for investigation due to their role in the etiology of dental caries. Differentiation of S. mutans and S. sobrinus is an essential part of exploring the role of these organisms in disease progression and the impact of the presence of either/both on a subject's caries experience. Of vital importance to the study of these organisms is an identification protocol that allows us to distinguish between the two species in an easy, accurate, and timely manner. While conducting a 5-year birth cohort study in a Northern Plains American Indian tribe, the need for a more rapid procedure for isolating and identifying high volumes of MS was recognized. We report here on the development of an accurate and rapid method for MS identification. Accuracy, ease of use, and material and time requirements for morphological differentiation on selective agar, biochemical tests, and various combinations of PCR primers were compared. The final protocol included preliminary identification based on colony morphology followed by PCR confirmation of species identification using primers targeting regions of the glucosyltransferase (gtf) genes of SM and SS. This method of isolation and identification was found to be highly accurate, more rapid than the previous methodology used, and easily learned. It resulted in more efficient use of both time and material resources. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  1. Effect of Rapid Maxillary Expansion on Glenoid Fossa and Condyle-Fossa Relationship in Growing Patients (MEGP): Study Protocol for a Controlled Clinical Trial

    Science.gov (United States)

    Ghoussoub, Mona Sayegh; Rifai, Khaldoun; Garcia, Robert; Sleilaty, Ghassan

    2018-01-01

    Aims and Objectives: Rapid maxillary expansion (RME) is an orthodontic nonsurgical procedure aiming at increasing the width of the maxilla by opening mainly the intermaxillary suture in patients presenting a transverse maxillary skeletal deficiency. The objectives of the current prospective controlled clinical and radiographic study are to evaluate the hypothesis that RME in growing patients will result in radiographic changes at the level of interglenoid fossa distance, condyle-fossa relationship, and nasal cavity widths compared to the group who received no treatment initially and served as untreated control. Materials and Methods: In this prospective controlled clinical and radiographic study, forty healthy growing patients selected from a school-based population following a large screening campaign, ranging in age between 8 and 13 years, presenting a maxillary constriction with bilateral crossbite, and candidates for RME are being recruited. The first group will include participants willing to undergo treatment (n = 25) and the other group will include those inclined to postpone (n = 15). Results: The primary outcome is to compare radiologically the interglenoid fossa distance and the condyle-fossa relationship; nasal cavity width will be a secondary outcome. A multivariable analysis of Covariance model will be used, with the assessment of the time by group interaction, using age as covariate. The project protocol was reviewed and approved by the Ethics Committee of the Lebanese University, National Institute in Lebanon (CUEMB process number 31/04/2015). The study is funded by the Lebanese University and Centre National de Recherche Scientifique, Lebanon (Number: 652 on 14/04/2016). Conclusion: This prospective controlled clinical trial will give information about the effect of RME on the glenoid fossa and condyle-fossa relationship and its impact on the nasal cavity width. Trial Registration: Retrospectively registered in BioMed Central (DOI10.1186/ISRCTN

  2. Simplified Method for Rapid Purification of Soluble Histones

    Directory of Open Access Journals (Sweden)

    Nives Ivić

    2016-06-01

    Full Text Available Functional and structural studies of histone-chaperone complexes, nucleosome modifications, their interactions with remodelers and regulatory proteins rely on obtaining recombinant histones from bacteria. In the present study, we show that co-expression of Xenopus laevis histone pairs leads to production of soluble H2AH2B heterodimer and (H3H42 heterotetramer. The soluble histone complexes are purified by simple chromatographic techniques. Obtained H2AH2B dimer and H3H4 tetramer are proficient in histone chaperone binding and histone octamer and nucleosome formation. Our optimized protocol enables rapid purification of multiple soluble histone variants with a remarkable high yield and simplifies histone octamer preparation. We expect that this simple approach will contribute to the histone chaperone and chromatin research. This work is licensed under a Creative Commons Attribution 4.0 International License.

  3. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  4. ADNP-CSMA Random Multiple Access protocol application with the function of monitoring in Ad Hoc network

    Directory of Open Access Journals (Sweden)

    Zhan Gang

    2016-01-01

    Full Text Available In Ad Hoc networks,the net work of mobile nodes exchange information with their wireless transceiver equipment,the network throughput is in increased,compared to other such multiple hops network.Moreover along with the rapid development of modern information,communication business also will be increase.However,the access and adaptive of previous CSMA protocol are insufficient.According to these properties,this paper presents a kind of adaptive dual clock with monitoring function P-CSMA random multiple access protocol(ADNP-CSMA,and discusses two kinds of P-CSMA.ACK with monitoring function is introduced to maintain the stability of the whole system,and the introduction of dual clock mechanism reduces the channel of idle period.It calculate the system throughput expression through the method of average period,and the simulation results show that the system is constant in the case of high load throughput.

  5. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  6. Rapid Extraction of Genomic DNA from Medically Important Yeasts and Filamentous Fungi by High-Speed Cell Disruption

    OpenAIRE

    Müller, Frank-Michael C.; Werner, Katherine E.; Kasai, Miki; Francesconi, Andrea; Chanock, Stephen J.; Walsh, Thomas J.

    1998-01-01

    Current methods of DNA extraction from different fungal pathogens are often time-consuming and require the use of toxic chemicals. DNA isolation from some fungal organisms is difficult due to cell walls or capsules that are not readily susceptible to lysis. We therefore investigated a new and rapid DNA isolation method using high-speed cell disruption (HSCD) incorporating chaotropic reagents and lysing matrices in comparison to standard phenol-chloroform (PC) extraction protocols for isolatio...

  7. Dose Specification and Quality Assurance of Radiation Therapy Oncology Group Protocol 95-17; a Cooperative Group Study of Iridium-192 Breast Implants as Sole Therapy

    International Nuclear Information System (INIS)

    Ibbott, Geoffrey S.; Hanson, W.F.; O'Meara, Elizabeth; Kuske, Robert R.; Arthur, Douglas; Rabinovitch, Rachel; White, Julia; Wilenzick, Raymond M.; Harris, Irene; Tailor, Ramesh C.

    2007-01-01

    Purpose: The Radiation Therapy Oncology Group (RTOG) protocol 95-17 was a Phase I/II trial to evaluate multicatheter brachytherapy as the sole method of adjuvant breast radiotherapy for Stage I/II breast carcinoma after breast-conserving surgery. Low- or high-dose-rate sources were allowed. Dose prescription and treatment evaluation were based on recommendations in the International Commission on Radiation Units and Measurements (ICRU), Report 58 and included the parameters mean central dose (MCD), average peripheral dose, dose homogeneity index (DHI), and the dimensions of the low- and high-dose regions. Methods and Materials: Three levels of quality assurance were implemented: (1) credentialing of institutions was required before entering patients into the study; (2) rapid review of each treatment plan was conducted before treatment; and (3) retrospective review was performed by the Radiological Physics Center in conjunction with the study chairman and RTOG dosimetry staff. Results: Credentialing focused on the accuracy of dose calculation algorithm and compliance with protocol guidelines. Rapid review was designed to identify and correct deviations from the protocol before treatment. The retrospective review involved recalculation of dosimetry parameters and review of dose distributions to evaluate the treatment. Specifying both central and peripheral doses resulted in uniform dose distributions, with a mean dose homogeneity index of 0.83 ± 0.06. Conclusions: Vigorous quality assurance resulted in a high-quality study with few deviations; only 4 of 100 patients were judged as representing minor variations from protocol, and no patient was judged as representing major deviation. This study should be considered a model for quality assurance of future trials

  8. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  9. An improved protocol for the preparation of total genomic DNA from isolates of yeast and mould using Whatman FTA filter papers.

    Science.gov (United States)

    Borman, Andrew M; Fraser, Mark; Linton, Christopher J; Palmer, Michael D; Johnson, Elizabeth M

    2010-06-01

    Here, we present a significantly improved version of our previously published method for the extraction of fungal genomic DNA from pure cultures using Whatman FTA filter paper matrix technology. This modified protocol is extremely rapid, significantly more cost effective than our original method, and importantly, substantially reduces the problem of potential cross-contamination between sequential filters when employing FTA technology.

  10. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  11. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  12. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  13. A Game Theory-Based Obstacle Avoidance Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shujun Bi

    2011-09-01

    Full Text Available The obstacle avoidance problem in geographic forwarding is an important issue for location-based routing in wireless sensor networks. The presence of an obstacle leads to several geographic routing problems such as excessive energy consumption and data congestion. Obstacles are hard to avoid in realistic environments. To bypass obstacles, most routing protocols tend to forward packets along the obstacle boundaries. This leads to a situation where the nodes at the boundaries exhaust their energy rapidly and the obstacle area is diffused. In this paper, we introduce a novel routing algorithm to solve the obstacle problem in wireless sensor networks based on a game-theory model. Our algorithm forms a concave region that cannot forward packets to achieve the aim of improving the transmission success rate and decreasing packet transmission delays. We consider the residual energy, out-degree and forwarding angle to determine the forwarding probability and payoff function of forwarding candidates. This achieves the aim of load balance and reduces network energy consumption. Simulation results show that based on the average delivery delay, energy consumption and packet delivery ratio performances our protocol is superior to other traditional schemes.

  14. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  15. Optimizing the magnetization-prepared rapid gradient-echo (MP-RAGE sequence.

    Directory of Open Access Journals (Sweden)

    Jinghua Wang

    Full Text Available The three-dimension (3D magnetization-prepared rapid gradient-echo (MP-RAGE sequence is one of the most popular sequences for structural brain imaging in clinical and research settings. The sequence captures high tissue contrast and provides high spatial resolution with whole brain coverage in a short scan time. In this paper, we first computed the optimal k-space sampling by optimizing the contrast of simulated images acquired with the MP-RAGE sequence at 3.0 Tesla using computer simulations. Because the software of our scanner has only limited settings for k-space sampling, we then determined the optimal k-space sampling for settings that can be realized on our scanner. Subsequently we optimized several major imaging parameters to maximize normal brain tissue contrasts under the optimal k-space sampling. The optimal parameters are flip angle of 12°, effective inversion time within 900 to 1100 ms, and delay time of 0 ms. In vivo experiments showed that the quality of images acquired with our optimal protocol was significantly higher than that of images obtained using recommended protocols in prior publications. The optimization of k-spacing sampling and imaging parameters significantly improved the quality and detection sensitivity of brain images acquired with MP-RAGE.

  16. Effects of Rapid Intravenous Rehydration in Children With Mild-to-Moderate Dehydration.

    Science.gov (United States)

    Janet, Sophie; Molina, Juan Carlos; Marañón, Rafael; García-Ros, Marta

    2015-08-01

    New guidelines for "rapid or ultrarapid" intravenous rehydration are being developed in different emergency departments. These new guidelines propose a faster administration of fluids and electrolytes than in traditional protocols. However, there is still insufficient evidence to establish a standard protocol. Our objective was to determine the effects of an outpatient rapid intravenous rehydration regimen based on the administration of 0.9% saline + 2.5% dextrose, at a rate of 20 mL/kg per hour for 2 hours, in children with mild-to-moderate isonatremic dehydration resulting from acute gastroenteritis. We performed a 2-institution, prospective, observational, descriptive study. Eighty-three patients were included in the study. All patients underwent a first evaluation, including physical examination, laboratory tests, and assessment of clinical degree of dehydration. After this initial evaluation, all children received our intravenous rehydration regimen. A second evaluation including the same items as in the first one was made after in all the children. Intravenous rehydration was successful in 69 patients (83.1%). It failed in 14 patients (16.8%), who required hospitalization because of persistent vomiting in 9 patients and poor general appearance in 5 patients. After intravenous rehydration, we observed a statistically significant decrease in the levels of ketonemia and uremia and in the Gorelick scale score. However, no significant changes were observed in sodium, chloride, potassium, and osmolarity values. We conclude that, in children with mild-to-moderate dehydration, the administration of 20 mL/kg per hour for 2 hours of 0.9% saline solution + 2.5% glucose improved clinical scores and may be used as an alternative and safe way for intravenous rehydration.

  17. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  18. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  19. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  20. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  1. Evaluation of sample preparation protocols for spider venom profiling by MALDI-TOF MS.

    Science.gov (United States)

    Bočánek, Ondřej; Šedo, Ondrej; Pekár, Stano; Zdráhal, Zbyněk

    2017-07-01

    Spider venoms are highly complex mixtures containing biologically active substances with potential for use in biotechnology or pharmacology. Fingerprinting of venoms by Matrix-Assisted Laser Desorption-Ionization - Time of Flight Mass Spectrometry (MALDI-TOF MS) is a thriving technology, enabling the rapid detection of peptide/protein components that can provide comparative information. In this study, we evaluated the effects of sample preparation procedures on MALDI-TOF mass spectral quality to establish a protocol providing the most reliable analytical outputs. We adopted initial sample preparation conditions from studies already published in this field. Three different MALDI matrixes, three matrix solvents, two sample deposition methods, and different acid concentrations were tested. As a model sample, venom from Brachypelma albopilosa was used. The mass spectra were evaluated on the basis of absolute and relative signal intensities, and signal resolution. By conducting three series of analyses at three weekly intervals, the reproducibility of the mass spectra were assessed as a crucial factor in the selection for optimum conditions. A sample preparation protocol based on the use of an HCCA matrix dissolved in 50% acetonitrile with 2.5% TFA deposited onto the target by the dried-droplet method was found to provide the best results in terms of information yield and repeatability. We propose that this protocol should be followed as a standard procedure, enabling the comparative assessment of MALDI-TOF MS spider venom fingerprints. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Controlled cooling versus rapid freezing of teratozoospermic semen samples: Impact on sperm chromatin integrity

    Directory of Open Access Journals (Sweden)

    Shivananda N Kalludi

    2011-01-01

    Full Text Available Aim: The present study evaluates the impact of controlled slow cooling and rapid freezing techniques on the sperm chromatin integrity in teratozoospermic and normozoospermic samples. Setting: The study was done in a university infertility clinic, which is a tertiary healthcare center serving the general population. Design: It was a prospective study designed in vitro. Materials and Methods: Semen samples from normozoospermic (N=16 and teratozoospermic (N=13 infertile men were cryopreserved using controlled cooling and rapid freezing techniques. The sperm chromatin integrity was analyzed in fresh and frozen-thawed samples. Statistical Analysis Used: Data were reported as mean and standard error (mean ± SEM of mean. The difference between two techniques was determined by a paired t-test. Results: The freeze-thaw induced chromatin denaturation was significantly (P<0.01 elevated in the post-thaw samples of normozoospermic and teratozoospermic groups. Compared to rapid freezing, there was no difference in the number of red sperms (with DNA damage by the controlled slow cooling method in both normozoospermic and teratozoospermic groups. Freeze-thaw induced sperm chromatin denaturation in teratozoospermic samples did not vary between controlled slow cooling and rapid freezing techniques. Conclusions: Since the controlled slow cooling technique involves the use of expensive instrument and is a time consuming protocol, rapid freezing can be a good alternative technique for teratozoospermic and normozoospermic samples when sperm DNA damage is a concern.

  3. Loop-mediated isothermal amplification assay for rapid detection of Streptococcus agalactiae (group B streptococcus) in vaginal swabs - a proof of concept study.

    Science.gov (United States)

    McKenna, James Patrick; Cox, Ciara; Fairley, Derek John; Burke, Rachael; Shields, Michael D; Watt, Alison; Coyle, Peter Valentine

    2017-03-01

    Neonatal sepsis caused by Streptococcus agalactiae [group B streptococcus (GBS)] is a life-threatening condition, which is preventable if colonized mothers are identified and given antibiotic prophylaxis during labour. Conventional culture is time consuming and unreliable, and many available non-culture diagnostics are too complex to implement routinely at point of care. Loop-mediated isothermal amplification (LAMP) is a method that, enables the rapid and specific detection of target nucleic acid sequences in clinical materials without the requirement for extensive sample preparation. A prototype LAMP assay targeting GBS sip gene is described. The assay was 100 % specific for GBS, with a limit of detection of 14 genome copies per reaction. The clinical utility of the LAMP assay for rapid direct molecular detection of GBS was determined by testing a total of 157 vaginal swabs with minimal sample processing using a rapid lysis solution. Compared to a reference quantitative real-time PCR assay, the direct LAMP protocol had a sensitivity and specificity of 95.4 and 100 %, respectively, with positive and negative predictive values of 100 and 98.3 %, respectively. Positive and negative likelihood ratios were infinity and 0.05, respectively. The direct LAMP method required a mean time of 45 min from the receipt of a swab to generation of a confirmed result, compared to 2 h 30 min for the reference quantitative real-time PCR test. The direct LAMP protocol described is easy to perform, facilitating rapid and accurate detection of GBS in vaginal swabs. This test has a potential for use at point of care.

  4. Polarization control of spontaneous emission for rapid quantum-state initialization

    Science.gov (United States)

    DiLoreto, C. S.; Rangan, C.

    2017-04-01

    We propose an efficient method to selectively enhance the spontaneous emission rate of a quantum system by changing the polarization of an incident control field, and exploiting the polarization dependence of the system's spontaneous emission rate. This differs from the usual Purcell enhancement of spontaneous emission rates as it can be selectively turned on and off. Using a three-level Λ system in a quantum dot placed in between two silver nanoparticles and a linearly polarized, monochromatic driving field, we present a protocol for rapid quantum state initialization, while maintaining long coherence times for control operations. This process increases the overall amount of time that a quantum system can be effectively utilized for quantum operations, and presents a key advance in quantum computing.

  5. Importance of sampling frequency when collecting diatoms

    KAUST Repository

    Wu, Naicheng; Faber, Claas; Sun, Xiuming; Qu, Yueming; Wang, Chao; Ivetic, Snjezana; Riis, Tenna; Ulrich, Uta; Fohrer, Nicola

    2016-01-01

    There has been increasing interest in diatom-based bio-assessment but we still lack a comprehensive understanding of how to capture diatoms’ temporal dynamics with an appropriate sampling frequency (ASF). To cover this research gap, we collected

  6. A Novel Load Balancing Scheme for Multipath Routing Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Kokilamani Mounagurusamy

    2016-09-01

    Full Text Available The recent advancements in information and communication technology create a great demand for multipath routing protocols. In MANET, nodes can be arbitrarily located and can move freely at any given time. The topology of MANET can change rapidly and unpredictably. Because wireless link capacities are usually limited, congestion is possible in MANETs. Hence, balancing the load in a MANET is important since nodes with high load will deplete their batteries quickly, thereby increasing the probability of disconnecting or partitioning the network. To overcome these, the multipath protocol should be aware of load at route discovery phase. The main objective of the proposed article is to balance the load on a node and to extend the lifetime of the node due to the congestion, energy depletion and link failures. This article describes a novel load and congestion aware scheme called Path Efficient Ad-hoc On-demand Multipath Distance Vector (PE-AOMDV protocol to increase the performance of routing process in MANET in terms of congestion, end-to-end delay and load balancing. A new threshold value and a counter variable are introduced to limit the number of communication paths passing over a node in route discovery phase. For every new request the counter variable is incremented by one and the threshold value is compared to see whether the maximum number of connections has been reached or not. The proposed method is network simulator ns-2 and it is found that there is a significant improvement in the proposed scheme. It reduces the energy consumption, average end-to-end delay and normalized routing overhead. Also the proposed scheme increases packet delivery ratio, throughput and minimizes routing overheads.

  7. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  8. A rapid method for counting nucleated erythrocytes on stained blood smears by digital image analysis

    Science.gov (United States)

    Gering, E.; Atkinson, C.T.

    2004-01-01

    Measures of parasitemia by intraerythrocytic hematozoan parasites are normally expressed as the number of infected erythrocytes per n erythrocytes and are notoriously tedious and time consuming to measure. We describe a protocol for generating rapid counts of nucleated erythrocytes from digital micrographs of thin blood smears that can be used to estimate intensity of hematozoan infections in nonmammalian vertebrate hosts. This method takes advantage of the bold contrast and relatively uniform size and morphology of erythrocyte nuclei on Giemsa-stained blood smears and uses ImageJ, a java-based image analysis program developed at the U.S. National Institutes of Health and available on the internet, to recognize and count these nuclei. This technique makes feasible rapid and accurate counts of total erythrocytes in large numbers of microscope fields, which can be used in the calculation of peripheral parasitemias in low-intensity infections.

  9. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  10. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  11. Modified protocol for genomic DNA extraction from newly plucked feathers of lophura leucomelana hamiltoni (Galliformes) for genetic studies and its endo-restriction analysis

    International Nuclear Information System (INIS)

    Andleeb, S.; Shamim, S.; Minhas, R.A.

    2012-01-01

    A rapid and accurate protocol was used first time to isolate the high-quality genomic DNA from newly plucked feathers of Lophura leucomelana. Two different lysis protocols were used depending on the feather size and it was observed that 55 deg. C for 3 to 4 days showed better results of feathers lysis as compared with the 37 deg. C for overnight with gentle shaking. Purification of genomic DNA was also performed with phenol: chloroform: isoamyl alcohol and 100% absolute ethanol precipitation methods. By using this protocol, a significant amount of high-quality genomic DNA was obtained and the purity of DNA was analyzed through endo-restriction analysis. Genomic DNA isolated with this modified method will be used for Southern blotting and also in several polymerase chain reaction systems devoted to sex determination and paternity testing and the evolutionary relationships among the other pheasants. (author)

  12. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  13. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  14. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  15. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  16. Interlaboratory comparison of real-time pcr protocols for quantification of general fecal indicator bacteria

    Science.gov (United States)

    Shanks, O.C.; Sivaganesan, M.; Peed, L.; Kelty, C.A.; Blackwood, A.D.; Greene, M.R.; Noble, R.T.; Bushon, R.N.; Stelzer, E.A.; Kinzelman, J.; Anan'Eva, T.; Sinigalliano, C.; Wanless, D.; Griffith, J.; Cao, Y.; Weisberg, S.; Harwood, V.J.; Staley, C.; Oshima, K.H.; Varma, M.; Haugland, R.A.

    2012-01-01

    The application of quantitative real-time PCR (qPCR) technologies for the rapid identification of fecal bacteria in environmental waters is being considered for use as a national water quality metric in the United States. The transition from research tool to a standardized protocol requires information on the reproducibility and sources of variation associated with qPCR methodology across laboratories. This study examines interlaboratory variability in the measurement of enterococci and Bacteroidales concentrations from standardized, spiked, and environmental sources of DNA using the Entero1a and GenBac3 qPCR methods, respectively. Comparisons are based on data generated from eight different research facilities. Special attention was placed on the influence of the DNA isolation step and effect of simplex and multiplex amplification approaches on interlaboratory variability. Results suggest that a crude lysate is sufficient for DNA isolation unless environmental samples contain substances that can inhibit qPCR amplification. No appreciable difference was observed between simplex and multiplex amplification approaches. Overall, interlaboratory variability levels remained low (<10% coefficient of variation) regardless of qPCR protocol. ?? 2011 American Chemical Society.

  17. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  18. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  19. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  20. Methodology for benzodiazepine receptor binding assays at physiological temperature. Rapid change in equilibrium with falling temperature

    International Nuclear Information System (INIS)

    Dawson, R.M.

    1986-01-01

    Benzodiazepine receptors of rat cerebellum were assayed with [ 3 H]-labeled flunitrazepam at 37 0 C, and assays were terminated by filtration in a cold room according to one of three protocols: keeping each sample at 37 degrees C until ready for filtration, taking the batch of samples (30) into the cold room and filtering sequentially in the order 1-30, and taking the batch of 30 samples into the cold room and filtering sequentially in the order 30-1. the results for each protocol were substantially different from each other, indicating that rapid disruption of equilibrium occurred as the samples cooled in the cold room while waiting to be filtered. Positive or negative cooperativity of binding was apparent, and misleading effects of gamma-aminobutyric acid on the affinity of diazepam were observed, unless each sample was kept at 37 0 C until just prior to filtration

  1. Rapid and Sensitive Determination of Lipid Oxidation Using the Reagent Kit Based on Spectrophotometry (FOODLABfat System

    Directory of Open Access Journals (Sweden)

    Chang Woo Kwon

    2016-01-01

    Full Text Available The reliability and availability of FOODLABfat system for determining acid value (AV and peroxide value (POV were assessed during the hydrolytic rancidification and lipid oxidation of edible oils. This reagent kit based on spectrophotometry was compared to the official methods (ISO 660 and 3960 protocols based on manual titration employing the standard mixture for the simulated oxidation models and edible oils during the thermally induced oxidation at 180°C. The linear regression line of standard mixture and the significant difference of thermally oxidized time course study determined between them showed high correlations (R2=0.998 and p<0.05 in both AVs and POVs. Considering ISO protocols with a probability of human error in manual titration, the rapidness and simplicity of the reagent kit based on spectrophotometry make it a promising alternative to monitor the lipid oxidation of edible oils and lipid-containing foods.

  2. Protocol for the administration of haemofiltration fluids and using patient group electrolytes direction.

    Science.gov (United States)

    Kingston, Diana; Sykes, Siobhan; Raper, Sarah

    2002-01-01

    A patient group direction (PGD) is a specific written instruction for the supply or administration of named medicines in an identified clinical situation The introduction of a PGD must demonstrate a benefit for patients Haemofiltration is widely accepted as the treatment of choice when caring for critically ill patients in acute renal failure on an intensive care unit The haemofiltration PGD improves patient care by providing standardisation in administration of fluids and electrolytes and enabling nurses to respond rapidly to changes in biochemistry during haemofiltration This paper describes the development and implementation of a protocol to enable nurses to administer haemofiltration fluids and electrolytes under a patient group direction.

  3. Validation of a Rapid Bacteria Endospore Enumeration System for Planetary Protection Application

    Science.gov (United States)

    Chen, Fei; Kern, Roger; Kazarians, Gayane; Venkateswaran, Kasthuri

    NASA monitors spacecraft surfaces to assure that the presence of bacterial endospores meets strict criteria at launch, to minimize the risk of inadvertent contamination of the surface of Mars. Currently, the only approved method for enumerating the spores is a culture based assay that requires three days to produce results. In order to meet the demanding schedules of spacecraft assembly, a more rapid spore detection assay is being considered as an alternate method to the NASA standard culture-based assay. The Millipore Rapid Microbiology Detection System (RMDS) has been used successfully for rapid bioburden enumeration in the pharmaceutical and food industries. The RMDS is rapid and simple, shows high sensitivity (to 1 colony forming unit [CFU]/sample), and correlates well with traditional culture-based methods. It combines membrane filtration, adenosine triphosphate (ATP) bioluminescence chemistry, and image analysis based on photon detection with a Charge Coupled Device (CCD) camera. In this study, we have optimized the assay conditions and evaluated the use of the RMDS as a rapid spore detection tool for NASA applications. In order to select for spores, the samples were subjected to a heat shock step before proceeding with the RMDS incubation protocol. Seven species of Bacillus (nine strains) that have been repeatedly isolated from clean room environments were assayed. All strains were detected by the RMDS in 5 hours and these assay times were repeatedly demonstrated along with low image background noise. Validation experiments to compare the Rapid Sore Assay (RSA) and NASA standard assay (NSA) were also performed. The evaluation criteria were modeled after the FDA Guideline of Process Validation, and Analytical Test Methods. This body of research demonstrates that the Rapid Spore Assay (RSA) is quick, and of equivalent sensitivity to the NASA standard assay, potentially reducing the assay time for bacterial endospores from over 72 hours to less than 8 hours

  4. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  5. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  6. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  7. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  8. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  9. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  10. Rapid assessment of iron in blood plasma and serum by spectrophotometry with cloud-point extraction [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Tatyana Samarina

    2015-08-01

    Full Text Available Rapid photometric assessment of iron in blood plasma and serum by a simple procedure after the extraction of iron(II complex with 1-nitroso-2-naphthol in the micellar phase of a nonionic surfactant at the cloud point upon heating (pH range is 4.5–6.3 is proposed. The procedure trueness was verified using a standard reference protocol using bathophenanthroline. The advantages of the procedure are higher sensitivity than the reference protocol: the limit of detection is 0.03 μg/mL, the limit of quantitation is 0.1 μg/mL, the determination range is 0.1 – 2.8 μg/mL (RSD 0.02–0.10. Copper does not interfere with the iron assessment.

  11. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  12. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  13. Simplified immunoassay for rapid Dengue serotype diagnosis, revealing insensitivity to non-specific binding interference

    Directory of Open Access Journals (Sweden)

    Fernanda C.C.L. Loureiro

    2017-04-01

    Full Text Available Proof of concept of an immunoassay, which is easy to implement, for rapid Dengue virus (DENV serotype diagnosis, in the early infection stage, is reported. The four-layer assay is immobilized onto a thin gold film and relies on a low cost, disposable polymer biochip for optical surface plasmon resonance sensing and detection. The protocol comprises Neutravidin-Biotin mediated monoclonal antibody (MAB attachment as the functionalized sensing element. Formation of the MAB-DENV complex results in a pronounced thickness change that is optically recorded in real time, employing a microfluidic set-up. Virus presence is confirmed by atomic force microscopy from the same sample. Serum samples were collected from a patient in acute febrile state. Simultaneous serological analysis by means of the reverse transcription polymerase chain reaction, independently, confirmed presence of DENV2 and DENV3. The protocol proved applicable in presence of strong non-specific binding interference that originates from, and is caused by, various blood, serum and other body fluid constituents. False positive indications for both, negative serum and blood control samples were not observed. The achievable limit of detection was estimated to be 2×104 particles/ml. Eventually, the method can be modified towards detection of other viruses by using the same protocol. Keywords: Immuno-assay, Dengue virus detection, Non-specific binding

  14. Fabrication of Biomolecule Microarrays Using Rapid Photochemical Surface Patterning in Thiol-Ene-Based Microfluidic Devices.

    Science.gov (United States)

    Jönsson, Alexander; Lafleur, Josiane P

    2018-01-01

    In many biochip applications, it is advantageous to be able to immobilize biomolecules at specific locations on the surface of solid supports. In this protocol, we describe a photochemical surface patterning procedure based on thiol-ene/yne photochemistry which allows for the simple and rapid selective patterning of biomolecules on thiol-ene solid supports. We describe the preparation of solid supports which are required for the immobilization, including porous monoliths, as well as two different immobilization schemes based on biotin-streptavidin interactions and covalent linkage via free amino groups respectively.

  15. Rapid non-contrast magnetic resonance imaging for post appendectomy intra-abdominal abscess in children

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Megan H. [Washington University School of Medicine in St. Louis, Mallinckrodt Institute of Radiology, St. Louis, MO (United States); Eutsler, Eric P.; Khanna, Geetika [Washington University School of Medicine in St. Louis, Pediatric Radiology, Mallinckrodt Institute of Radiology, St. Louis, MO (United States); Sheybani, Elizabeth F. [Mercy Hospital St. Louis, Department of Radiology, St. Louis, MO (United States)

    2017-07-15

    Acute appendicitis, especially if perforated at presentation, is often complicated by postoperative abscess formation. The detection of a postoperative abscess relies primarily on imaging. This has traditionally been done with contrast-enhanced computed tomography. Non-contrast magnetic resonance imaging (MRI) has the potential to accurately detect intra-abdominal abscesses, especially with the use of diffusion-weighted imaging (DWI). To evaluate our single-center experience with a rapid non-contrast MRI protocol evaluating post-appendectomy abscesses in children with persistent postsurgical symptoms. In this retrospective, institutional review board-approved study, all patients underwent a clinically indicated non-contrast 1.5- or 3-Tesla abdomen/pelvis MRI consisting of single-shot fast spin echo, inversion recovery and DWI sequences. All MRI studies were reviewed by two blinded pediatric radiologists to identify the presence of a drainable fluid collection. Each fluid collection was further characterized as accessible or not accessible for percutaneous or transrectal drainage. Imaging findings were compared to clinical outcome. Seven of the 15 patients had a clinically significant fluid collection, and 5 of these patients were treated with percutaneous drain placement or exploratory laparotomy. The other patients had a phlegmon or a clinically insignificant fluid collection and were discharged home within 48 h. Rapid non-contrast MRI utilizing fluid-sensitive and DWI sequences can be used to identify drainable fluid collections in post-appendectomy patients. This protocol can be used to triage patients between conservative management vs. abscess drainage without oral/intravenous contrast or exposure to ionizing radiation. (orig.)

  16. Rapid non-contrast magnetic resonance imaging for post appendectomy intra-abdominal abscess in children

    International Nuclear Information System (INIS)

    Lee, Megan H.; Eutsler, Eric P.; Khanna, Geetika; Sheybani, Elizabeth F.

    2017-01-01

    Acute appendicitis, especially if perforated at presentation, is often complicated by postoperative abscess formation. The detection of a postoperative abscess relies primarily on imaging. This has traditionally been done with contrast-enhanced computed tomography. Non-contrast magnetic resonance imaging (MRI) has the potential to accurately detect intra-abdominal abscesses, especially with the use of diffusion-weighted imaging (DWI). To evaluate our single-center experience with a rapid non-contrast MRI protocol evaluating post-appendectomy abscesses in children with persistent postsurgical symptoms. In this retrospective, institutional review board-approved study, all patients underwent a clinically indicated non-contrast 1.5- or 3-Tesla abdomen/pelvis MRI consisting of single-shot fast spin echo, inversion recovery and DWI sequences. All MRI studies were reviewed by two blinded pediatric radiologists to identify the presence of a drainable fluid collection. Each fluid collection was further characterized as accessible or not accessible for percutaneous or transrectal drainage. Imaging findings were compared to clinical outcome. Seven of the 15 patients had a clinically significant fluid collection, and 5 of these patients were treated with percutaneous drain placement or exploratory laparotomy. The other patients had a phlegmon or a clinically insignificant fluid collection and were discharged home within 48 h. Rapid non-contrast MRI utilizing fluid-sensitive and DWI sequences can be used to identify drainable fluid collections in post-appendectomy patients. This protocol can be used to triage patients between conservative management vs. abscess drainage without oral/intravenous contrast or exposure to ionizing radiation. (orig.)

  17. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  18. Towards a rapid assessment protocol for identifying pit lakes worthy of restoration.

    Science.gov (United States)

    de Lange, W J; Genthe, B; Hill, L; Oberholster, P J

    2018-01-15

    Before the introduction of reclamation legislation in South Africa, final cut lakes in mining areas were left without any restoration while the final excavation was not back filled. Characteristics of these lacustrine water bodies vary considerably, but they are often linear in shape, large (1-30 ha), deep (2-30 m) and have poorly developed littoral zones. With water tables often near the surface; a variety of vascular hydrophytes can colonize these bodies, thus establishing emerging wetland type ecosystems. These, man-made aquatic structures that are (unintentionally) created potentially offers some realistic and inexpensive mitigation options for some of the negative impacts associated with mining, i.e. these water bodies can become useful by yielding potentially valuable services. However, no method currently exists to compare and rank these water bodies according ecological integrity and the expected monetary value to be derived from them in order to select sites for restoration. To answer this need, we applied an index to determine the ability of these water bodies to provide useful services in their current state. The index was then used to derive estimates of the monetary value of potential services in order to allow comparison with the cost of restoring the water body in question or to compare with other pit lakes. We present a South African case study to illustrate the method. As far as could be established, this is the first attempt towards creating a rapid assessment tool as standardised way of comparing pit lakes that allows for the ranking and identification of those pit lakes worthy of restoration. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. A rapid method for the preparation of 99Tcm hexametazime-labelled leucocytes

    International Nuclear Information System (INIS)

    Solanki, K.K.; Mather, S.J.; Janabi, M.A.; Britton, K.E.

    1988-01-01

    99 Tc m (±)-hexamethylpropyleneamineoxime (HMPAO) ( 99 Tc m Hexametazime) has been recently reported as an alternative for labelling leucocytes. This technique has been modified to give a simpler routine in-house labelling technique. It has three advantages: only about 20 ml of blood is required, the labelling time is just under 1 h and high yields of labelled leucocytes are obtained (mean of 500 MBq per injection dose). The properties of labelled leucocytes using this modified method are; 80% granulocyte-bound radioactivity, a rapid lung transit and a blood granulocyte recovery of 40% at 30 min similar to those described previously. The viability of the labelled leucocytes was tested and confirmed in vitro using a migration technique and in vivo by showing no lung retention on early imaging and high splenic uptake. A rapid in-process chromatography assessment procedure for regulating the protocol has been developed. Successful abscess imaging by 4 h has been achieved in 21 patients with normal results in another 22 patients without abscesses. This simpler method should encourage a more widespread application of scintigraphy using radiolabelled granulocytes. (author)

  20. Protocols for second-generation business satellites systems

    Science.gov (United States)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  1. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  2. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  3. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  4. A differential centrifugation protocol and validation criterion for enhancing mass spectrometry (MALDI-TOF) results in microbial identification using blood culture growth bottles.

    Science.gov (United States)

    March-Rosselló, G A; Muñoz-Moreno, M F; García-Loygorri-Jordán de Urriés, M C; Bratos-Pérez, M A

    2013-05-01

    Matrix-assisted laser desorption/ionization-time-of-flight mass spectrometry (MALDI-TOF) is a widely used tool in clinical microbiology for rapidly identifying microorganisms. This technique can be applied directly on positive blood cultures without the need for its culturing, thereby, reducing the time required for microbiological diagnosis. The present study proposes an innovative identification protocol applied to positive blood culture bottles using MALDI-TOF. We have processed 100 positive blood culture bottles, of which 36 of 37 Gram-negative bacteria (97.3 %) were correctly identified directly with 100 % of Enterobacteriaceae and other Gram-negative rods and 87.5 % of non-fermenting Gram-negative rods. We also correctly identified directly 62 of 63 of Gram-positive bacteria (98.4 %) with 100 % of Streptococcus, Enterococcus, and Gram-positive bacilli and 98 % of Staphylococcus. Applying the differential centrifugation protocol at the moment the automatic blood culture incubation system gives a positive reading together with the proposed validation criterion offers 98 % sensitivity (95 % confidence interval: 95.2-100 %). The MALDI-TOF system, thus, provides a rapid and reliable system for identifying microorganisms from blood culture growth bottles.

  5. Rapid mounting of adult Drosophila structures in Hoyer's medium.

    Science.gov (United States)

    Stern, David L; Sucena, Elio

    2012-01-01

    The Drosophila cuticle carries a rich array of morphological details. Thus, cuticle examination has had a central role in the history of genetics. This protocol describes a procedure for mounting adult cuticles in Hoyer's medium, a useful mountant for both larval and adult cuticles. The medium digests soft tissues rapidly, leaving the cuticle cleared for observation. In addition, samples can be transferred directly from water to Hoyer's medium. However, specimens mounted in Hoyer's medium degrade over time. For example, the fine denticles on the larval dorsum are best observed soon after mounting; they begin to fade after 1 week, and can disappear completely after several months. More robust features, such as the ventral denticle belts, will persist for a longer period of time. Because adults cannot profitably be mounted whole in Hoyer's medium, some dissection is necessary.

  6. Transcranial Alternating Current Stimulation (tACS Mechanisms and Protocols

    Directory of Open Access Journals (Sweden)

    Amir V. Tavakoli

    2017-09-01

    Full Text Available Perception, cognition and consciousness can be modulated as a function of oscillating neural activity, while ongoing neuronal dynamics are influenced by synaptic activity and membrane potential. Consequently, transcranial alternating current stimulation (tACS may be used for neurological intervention. The advantageous features of tACS include the biphasic and sinusoidal tACS currents, the ability to entrain large neuronal populations, and subtle control over somatic effects. Through neuromodulation of phasic, neural activity, tACS is a powerful tool to investigate the neural correlates of cognition. The rapid development in this area requires clarity about best practices. Here we briefly introduce tACS and review the most compelling findings in the literature to provide a starting point for using tACS. We suggest that tACS protocols be based on functional brain mechanisms and appropriate control experiments, including active sham and condition blinding.

  7. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  8. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  9. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  10. Do DNA barcoding delimitation methods affect our view of stream biodiversity?

    Science.gov (United States)

    How we delimit molecular operational taxonomic units (MOTUs) is an important aspect in the use of DNA barcoding for bioassessment. Four delimitation methods were examined to gain an understanding of their relative strengths at organizing data from 5300 specimens collected during ...

  11. Rapid bioassessment methods for assessing vegetation toxicity at the Savannah River Site - germination tests and root elongation trials

    Energy Technology Data Exchange (ETDEWEB)

    Specht, W.L.; Klaine, S.J.; Hook, D.D. [and others

    1996-01-01

    Plants form the basis of all ecosystems including wetlands. Although they are the most abundant life form and are the primary producers for all other organisms, they have received the least attention when it comes to environmental matters. Higher plants have rarely been used in ecotoxicity testing and may not respond in the same manner as algae, which have been used more frequently. The introduction of hazardous waste materials into wetland areas has the potential to alter and damage the ecological processes in these ecosystems. Measuring the impact of these contaminants on higher plants is therefore important and needs further research. Higher plants are useful for detecting both herbicidal toxicity and heavy metal toxicity. For phytotoxicity tests to be practical they must be simple, inexpensive, yet sensitive to a variety of contaminants. A difference between seed germination and root elongation tests is that seed germination tests measure toxicity associated with soils directly, while root elongation tests consider the indirect effects of water-soluble constituents that may be present in site samples.

  12. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  13. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  14. Survey of protocols for the manual segmentation of the hippocampus: preparatory steps towards a joint EADC-ADNI harmonized protocol.

    Science.gov (United States)

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G; de Leon, Mony J; deToledo-Morrell, Leyla; Killiany, Ronald J; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C; Soininen, H; Watson, Craig; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B

    2011-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer's disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols' interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol.

  15. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  16. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  17. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  18. The Gothenburg Protocol: NOx emissions problematic for Norway

    International Nuclear Information System (INIS)

    Lind, Oddvar

    2000-01-01

    The Gothenburg Protocol concerns long-range air pollution and is a continuation of earlier protocols and agreements. Its recommendations are based on calculations of where the greatest possible health- and environmental impact is obtained per dollar invested. European countries have done much to reduce the emission of sulphur dioxide. Norway and most other countries, however, have difficulties reducing their emissions of nitrogen oxides. In Norway, the emission of sulphur dioxide must also be substantially reduced, as the tolerance limit for SO2 in nature is low. It is socio-economically profitable for Norway to conform to the Gothenburg Protocol. One of the largest environmental problems in Norway is acid rain and death of fish. Although it is difficult to calculate the exact values of fishing-lakes and of reduced health injuries when the emissions of harmful waste gases are reduced, the profit is very high. 90% of the SO2 pollution in Norway is long-range transported from abroad. Yet Norway must reduce the domestic emissions from 30 000 to 22 000 tonnes the next 10 years. Most of the present emission of SO2 in Norway comes from the production of metals. The reduction goal can be achieved by a combination of improving industrial processes, SO2 cleaning, and reducing the sulphur content of oil. In many European countries, the greatest problem is the increasing emission of NOx and formation of ozone at the ground, which is largely due to the rapidly increasing motor traffic. In Norway, most of the NOx emission comes from the coastal traffic and the fishing fleet, followed by the motor traffic, the petroleum industry and the processing industry. The most cost-effective NOx reductions can be obtained in the North Sea by installing low-NOx gas turbines. In ships, catalytic cleaning of NOx and engine improvements will contribute. On land, the goods traffic can be made more efficient. Most of the emission of ammonia comes from agriculture, where special measures are

  19. Development of a vitrification-based cryopreservation protocol for the storage of saltcedar (Tamarix boveana Bunge).

    Science.gov (United States)

    Cano-Castillo, M; Casas, J L

    2012-01-01

    We cryopreserved in vitro shoot tips of saltcedar (Tamarix boveana Bunge) using the vitrification technique. The success of the cryopreservation protocol was strongly affected by preculture, loading duration, dehydration duration in plant vitrification solution 2 (PVS2), and medium composition during post-warming regrowth. The highest explant regrowth (50 percent) occurred when the following conditions were employed: preculture in 0.4 M glycerol; treatment with a loading solution (LS) consisting of 2 M glycerol + 0.4 M sucrose in culture medium for 40 min at room temperature; and dehydration in PVS2 at 0 degree C for 45 min before rapid immersion in liquid nitrogen (LN). Rewarming was performed in a water-bath at 40 degree C for 2 min. Explants were then immersed in unloading solution for 10 min before plating on recovery medium supplemented with 0.01 mg per liter thidiazuron (TDZ). TDZ was progressively eliminated from the medium over a period of 6 weeks. Plantlets were transferred to a double-layer medium to enhance rooting. This protocol was successfully applied to three individuals of T. boveana harvested from the wild.

  20. Analysis of Intracellular Metabolites from Microorganisms: Quenching and Extraction Protocols.

    Science.gov (United States)

    Pinu, Farhana R; Villas-Boas, Silas G; Aggio, Raphael

    2017-10-23

    Sample preparation is one of the most important steps in metabolome analysis. The challenges of determining microbial metabolome have been well discussed within the research community and many improvements have already been achieved in last decade. The analysis of intracellular metabolites is particularly challenging. Environmental perturbations may considerably affect microbial metabolism, which results in intracellular metabolites being rapidly degraded or metabolized by enzymatic reactions. Therefore, quenching or the complete stop of cell metabolism is a pre-requisite for accurate intracellular metabolite analysis. After quenching, metabolites need to be extracted from the intracellular compartment. The choice of the most suitable metabolite extraction method/s is another crucial step. The literature indicates that specific classes of metabolites are better extracted by different extraction protocols. In this review, we discuss the technical aspects and advancements of quenching and extraction of intracellular metabolite analysis from microbial cells.

  1. Protocol to the 1991 Co-operation Agreement between CERN and the Department of Atomic Energy of the Government of India (DAE)

    CERN Document Server

    2005-01-01

    CERN has signed a Cooperation Agreement with the Department of Atomic Energy of India (DAE) in 1991, followed in 1996 by a Protocol for collaboration within the framework of the LHC project. The work by way of Indian in-kind contributions to the LHC was coordinated by the DAE, and was compensated by CERN through payments into the 'LHC India Fund'. These payments were calculated at the level of half of the estimated European value of the in-kind contributions received. The collaboration was highly successful and was extended in 2003. In the previous year India had been granted Observer Status by the CERN Council. As the LHC Project approaches completion, the collaborations under the 1996 Protocol and the 2003 Extension are now coming to an end. With India rapidly developing into one of the world's most active and advanced accelerator centres, it seems fitting that CERN and India should continue their collaborative efforts in other accelerator areas of mutual interest. The Protocol proposed in this document has...

  2. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  3. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  4. Q-Learning and p-persistent CSMA based rendezvous protocol for cognitive radio networks operating with shared spectrum activity

    Science.gov (United States)

    Watson, Clifton L.; Biswas, Subir

    2014-06-01

    With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.

  5. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  6. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  7. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  8. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  9. Rapid detection of Salmonella in meat: Comparative and collaborative validation of a non-complex and cost effective pre-PCR protocol

    DEFF Research Database (Denmark)

    Löfström, Charlotta; Hansen, F.; Mansdal, S.

    2011-01-01

    samples using a real-time PCR method. The protocol included incubation in buffered peptone water, centrifugation of an aliquot and a boiling procedure. The validation study included comparative and collaborative trials recommended by the Nordic Organization for Validation of Alternative Methods (NordVal......). The comparative trial was performed against a culture based reference method (NMKL187, 2007) and a previously NordVal approved PCR method with a semi-automated magnetic bead-based DNA extraction step using 122 artificially contaminated samples. The limit of detection (LOD50) was found to be 3.0, 3.2 and 3.4 CFU...

  10. Prosthesis Prescription Protocol of the Arm (PPP-Arm) : The implementation of a national prosthesis prescription protocol

    NARCIS (Netherlands)

    Wijdenes, Paula; Brouwers, Michael; van der Sluis, Corry K

    BACKGROUND AND AIM: In order to create more uniformity in the prescription of upper limb prostheses by Dutch rehabilitation teams, the development and implementation of a Prosthesis Prescription Protocol of the upper limb (PPP-Arm) was initiated. The aim was to create a national digital protocol to

  11. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  12. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  13. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  14. Comparison of a new whole-body continuous-table-movement protocol versus a standard whole-body MR protocol for the assessment of multiple myeloma

    International Nuclear Information System (INIS)

    Weckbach, S.; Michaely, H.J.; Schoenberg, S.O.; Dinter, D.J.; Stemmer, A.

    2010-01-01

    To evaluate a whole body (WB) continuous-table-movement (CTM) MR protocol for the assessment of multiple myeloma (MM) in comparison to a step-by-step WB protocol. Eighteen patients with MM were examined at 1.5T using a WB CTM protocol (axial T2-w fs BLADE, T1-w GRE sequence) and a step-by-step WB protocol including coronal/sagittal T1-w SE and STIR sequences as reference. Protocol time was assessed. Image quality, artefacts, liver/spleen assessability, and the ability to depict bone marrow lesions less than or greater than 1 cm as well as diffuse infiltration and soft tissue lesions were rated. Potential changes in the Durie and Salmon Plus stage and the detectability of complications were assessed. Mean protocol time was 6:38 min (CTM) compared to 24:32 min (standard). Image quality was comparable. Artefacts were more prominent using the CTM protocol (P = 0.0039). Organ assessability was better using the CTM protocol (P < 0.001). Depiction of bone marrow and soft tissue lesions was identical without a staging shift. Vertebral fractures were not detected using the CTM protocol. The new protocol allows a higher patient throughput and facilitates the depiction of extramedullary lesions. However, as long as vertebral fractures are not detectable, the protocol cannot be safely used for clinical routine without the acquisition of an additional sagittal sequence. (orig.)

  15. RFID Cryptographic Protocol Based on Cyclic Redundancy Check for High Efficiency

    Directory of Open Access Journals (Sweden)

    Nian Liu

    2014-04-01

    Full Text Available In this paper, RFID encryption protocol is proposed based on the security problems in wireless signal channel. In order to solve the privacy issues of electronic tags, the most commonly way is to improve algorithms based on Hash function. However, there are some problems that can only play roles in some specific domains. Due to the limitations in various kinds of algorithms, in this paper we put forward a new kind of agreement. When it is required to locate target labels accurately and rapidly in a movement environment, using this agreement can achieve high efficiency through combining the Hash function, the two division search algorithm and CRC check. The results show that this algorithm can accurately identify the tags with merits of low cost, execution rate and anti-attack ability etc.

  16. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  17. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  18. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  19. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  20. Oral breathing: new early treatment protocol

    Directory of Open Access Journals (Sweden)

    Gloria Denotti

    2014-01-01

    Full Text Available Oral breathing is a respiratory dysfunction that affects approximately 10-15% of child population. It is responsable of local effects and systemic effects, both immediate and long-term. They affect the growth of the subject and his physical health in many ways: pediatric, psycho-behavioral and cognitive. The etiology is multifactorial. It’s important the establishment of a vicious circle involving more areas and it is essential to stop it as soon as possible. In order to correct this anomaly, the pediatric dentist must be able to make a correct diagnosis to treat early the disfunction and to avoid the onset of cascade mechanisms. Who plays a central role is the pediatrician who first and frequently come into contact with little patients. He can identify the anomalies, and therefore collaborate with other specialists, including the dentist. The key aspect that guides us in the diagnosis, and allows us to identify the oral respirator, is the “adenoid facies”. The purpose of the study is to highlight the importance and benefits of an early and multidisciplinary intervention (pediatric, orthopedic-orthodontic-functional. A sample of 20 patients was selected with the following inclusion criteria: mouth breathing, transverse discrepancy > 4 mm, early mixed dentition, central and lateral permenent incisors, overjet increased, lip and nasal incompetence, snoring and/or sleep apnea episodes. The protocol of intervention includes the use of the following devices and procedures: a maxillary rapid expander (to correct the transverse discrepancy, to increase the amplitude of the upper respiratory airway and to reduce nasal resistances tract in association with myo-functional devices (nasal stimulator and oral obturator. They allow the reconstruction of a physiological balance between the perioral musculature and tongue, the acquisition of nasal and lips competence and the reduction of overjet. This protocol speeds up and stabilizes the results. The

  1. THE EVALUATION OF METHODS FOR CREATING DEFENSIBLE, REPEATABLE, OBJECTIVE AND ACCURATE TOLERANCE VALUES

    Science.gov (United States)

    In the field of bioassessment, tolerance has traditionally referred to the degree to which organisms can withstand environmental degradation. This concept has been around for many years and its use is widespread. In numerous cases, tolerance values (TVs) have been assigned to i...

  2. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  3. FLIP: An Internetwork Protocol for Supporting Distributed Systems

    NARCIS (Netherlands)

    Kaashoek, M.F.; van Renesse, R.; van Staveren, H.; Tanenbaum, A.S.

    1993-01-01

    Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements 1993. Instead of using ad hoc protocols to meet each of the new requirements, we have designed a new protocol,

  4. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  5. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  6. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  7. Rapid screening method for male DNA by using the loop-mediated isothermal amplification assay.

    Science.gov (United States)

    Kitamura, Masashi; Kubo, Seiji; Tanaka, Jin; Adachi, Tatsushi

    2017-08-12

    Screening for male-derived biological material from collected samples plays an important role in criminal investigations, especially those involving sexual assaults. We have developed a loop-mediated isothermal amplification (LAMP) assay targeting multi-repeat sequences of the Y chromosome for detecting male DNA. Successful amplification occurred with 0.5 ng of male DNA under isothermal conditions of 61 to 67 °C, but no amplification occurred with up to 10 ng of female DNA. Under the optimized conditions, the LAMP reaction initiated amplification within 10 min and amplified for 20 min. The LAMP reaction was sensitive at levels as low as 1-pg male DNA, and a quantitative LAMP assay could be developed because of the strong correlation between the reaction time and the amount of template DNA in the range of 10 pg to 10 ng. Furthermore, to apply the LAMP assay to on-site screening for male-derived samples, we evaluated a protocol using a simple DNA extraction method and a colorimetric intercalating dye that allows detection of the LAMP reaction by evaluating the change in color of the solution. Using this protocol, samples of male-derived blood and saliva stains were processed in approximately 30 min from DNA extraction to detection. Because our protocol does not require much hands-on time or special equipment, this LAMP assay promises to become a rapid and simple screening method for male-derived samples in forensic investigations.

  8. Rapid multiple immunoenzyme assay of mycotoxins.

    Science.gov (United States)

    Urusov, Alexandr E; Zherdev, Anatoly V; Petrakova, Alina V; Sadykhov, Elchin G; Koroleva, Olga V; Dzantiev, Boris B

    2015-01-27

    Mycotoxins are low molecular weight fungal metabolites that pose a threat as toxic contaminants of food products, thereby necessitating their effective monitoring and control. Microplate ELISA can be used for this purpose, but this method is characteristically time consuming, with a duration extending to several hours. This report proposes a variant of the ELISA method for the detection and quantification of three mycotoxins, ochratoxin A, aflatoxin B1 and zearalenone, in the kinetic regime. The main requirement for the proposed kinetic protocol was to provide a rapid method that combined sensitivity and accuracy. The use of biotin with an extended spacer together with a streptavidin-polyperoxidase conjugate provided high signal levels, despite these interactions occurring under non-equilibrium conditions. Duration of the individual mycotoxin assays was 20 min, whereas the analysis of all three mycotoxins in parallel reached a maximum duration of 25 min. Recovery of at least 95% mycotoxins in water-organic extracts was shown. The developed assays were successfully validated using poultry processing products and corn samples spiked with known quantities of mycotoxins. The detection limits for aflatoxin B1, ochratoxin A and zearalenone in these substances were 0.24, 1.2 and 3 ng/g, respectively.

  9. Implementation of a population-based epidemiological rare disease registry: study protocol of the amyotrophic lateral sclerosis (ALS) - registry Swabia

    OpenAIRE

    Nagel, Gabriele; ?nal, Hatice; Rosenbohm, Angela; Ludolph, Albert C; Rothenbacher, Dietrich

    2013-01-01

    Abstract Background The social and medical impact of rare diseases is increasingly recognized. Amyotrophic lateral sclerosis (ALS) is the most prevalent of the motor neuron diseases. It is characterized by rapidly progressive damage to the motor neurons with a survival of 2–5 years for the majority of patients. The objective of this work is to describe the study protocol and the implementation steps of the amyotrophic lateral sclerosis (ALS) registry Swabia, located in the South of Germany. M...

  10. A protocol for expression of foreign genes in chloroplasts.

    Science.gov (United States)

    Verma, Dheeraj; Samson, Nalapalli P; Koya, Vijay; Daniell, Henry

    2008-01-01

    Several major costs associated with the production of biopharmaceuticals or vaccines in fermentation-based systems could be minimized by using plant chloroplasts as bioreactors, which facilitates rapid scale-up. Oral delivery of chloroplast-derived therapeutic proteins through plant cells eliminates expensive purification steps, low temperature storage, transportation and sterile injections for their delivery. Chloroplast transformation technology (CTT) has also been successfully used to engineer valuable agronomic traits and for the production of industrial enzymes and biomaterials. Here, we provide a detailed protocol for the construction of chloroplast expression and integration vectors, selection and regeneration of transformants, evaluation of transgene integration and inheritance, confirmation of transgene expression and extraction, and quantitation and purification of foreign proteins. Integration of appropriate transgenes into chloroplast genomes and the resulting high levels of functional protein expression can be achieved in approximately 6 months in lettuce and tobacco. CTT is eco-friendly because transgenes are maternally inherited in most crop plants.

  11. The effect of rapid screening for methicillin-resistant Staphylococcus aureus (MRSA) on the identification and earlier isolation of MRSA-positive patients.

    LENUS (Irish Health Repository)

    Creamer, Eilish

    2010-04-01

    (1) To determine whether rapid screening with polymerase chain reaction (PCR) assays leads to the earlier isolation of patients at risk for methicillin-resistant Staphylococcus aureus (MRSA) colonization, (2) to assess compliance with routine MRSA screening protocols, (3) to confirm the diagnostic accuracy of the Xpert MRSA real-time PCR assay (Cepheid) by comparison with culture, and (4) to compare turnaround times for PCR assay results with those for culture results.

  12. Impact of the rapid antigen detection test in diagnosis and treatment of acute pharyngotonsillitis in a pediatric emergency room.

    Science.gov (United States)

    Cardoso, Débora Morais; Gilio, Alfredo Elias; Hsin, Shieh Huei; Machado, Beatriz Marcondes; de Paulis, Milena; Lotufo, João Paulo B; Martinez, Marina Baquerizo; Grisi, Sandra Josefina E

    2013-01-01

    To evaluate the impact of the routine use of rapid antigen detection test in the diagnosis and treatment of acute pharyngotonsillitis in children. This is a prospective and observational study, with a protocol compliance design established at the Emergency Unit of the University Hospital of Universidade de São Paulo for the care of children and adolescents diagnosed with acute pharyngitis. 650 children and adolescents were enrolled. Based on clinical findings, antibiotics would be prescribed for 389 patients (59.8%); using the rapid antigen detection test, they were prescribed for 286 patients (44.0%). Among the 261 children who would not have received antibiotics based on the clinical evaluation, 111 (42.5%) had positive rapid antigen detection test. The diagnosis based only on clinical evaluation showed 61.1% sensitivity, 47.7% specificity, 44.9% positive predictive value, and 57.5% negative predictive value. The clinical diagnosis of streptococcal pharyngotonsillitis had low sensitivity and specificity. The routine use of rapid antigen detection test led to the reduction of antibiotic use and the identification of a risk group for complications of streptococcal infection, since 42.5% positive rapid antigen detection test patients would not have received antibiotics based only on clinical diagnosis.

  13. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  14. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  15. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature...... of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a process algebra model and deriving from this process models analysable by the Imperial PEPA Compiler and the LySatool....

  16. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  17. Rapid immunohistochemical diagnosis of tobacco mosaic virus disease by microwave-assisted plant sample preparation

    Science.gov (United States)

    Zellnig, Günther; Möstl, Stefan; Zechmann, Bernd

    2013-01-01

    Immunoelectron microscopy is a powerful method to diagnose viral diseases and to study the distribution of the viral agent within plant cells and tissues. Nevertheless, current protocols for the immunological detection of viral diseases with transmission electron microscopy (TEM) in plants take between 3 and 6 days and are therefore not suited for rapid diagnosis of virus diseases in plants. In this study, we describe a method that allows rapid cytohistochemical detection of tobacco mosaic virus (TMV) in leaves of tobacco plants. With the help of microwave irradiation, sample preparation of the leaves was reduced to 90 min. After sample sectioning, virus particles were stained on the sections by immunogold labelling of the viral coat protein, which took 100 min. After investigation with the TEM, a clear visualization of TMV in tobacco cells was achieved altogether in about half a day. Comparison of gold particle density by image analysis revealed that samples prepared with the help of microwave irradiation yielded significantly higher gold particle density as samples prepared conventionally at room temperature. This study clearly demonstrates that microwave-assisted plant sample preparation in combination with cytohistochemical localization of viral coat protein is well suited for rapid diagnosis of plant virus diseases in altogether about half a day by TEM. PMID:23580761

  18. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  19. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  20. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  1. Development of rapid, continuous calibration techniques and implementation as a prototype system for civil engineering materials evaluation

    International Nuclear Information System (INIS)

    Scott, M. L.; Gagarin, N.; Mekemson, J. R.; Chintakunta, S. R.

    2011-01-01

    Until recently, civil engineering material calibration data could only be obtained from material sample cores or via time consuming, stationary calibration measurements in a limited number of locations. Calibration data are used to determine material propagation velocities of electromagnetic waves in test materials for use in layer thickness measurements and subsurface imaging. Limitations these calibration methods impose have been a significant impediment to broader use of nondestructive evaluation methods such as ground-penetrating radar (GPR). In 2006, a new rapid, continuous calibration approach was designed using simulation software to address these measurement limitations during a Federal Highway Administration (FHWA) research and development effort. This continuous calibration method combines a digitally-synthesized step-frequency (SF)-GPR array and a data collection protocol sequence for the common midpoint (CMP) method. Modeling and laboratory test results for various data collection protocols and materials are presented in this paper. The continuous-CMP concept was finally implemented for FHWA in a prototype demonstration system called the Advanced Pavement Evaluation (APE) system in 2009. Data from the continuous-CMP protocol is processed using a semblance/coherency analysis to determine material propagation velocities. Continuously calibrated pavement thicknesses measured with the APE system in 2009 are presented. This method is efficient, accurate, and cost-effective.

  2. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  3. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  4. Rapid shallow breathing

    Science.gov (United States)

    Tachypnea; Breathing - rapid and shallow; Fast shallow breathing; Respiratory rate - rapid and shallow ... Shallow, rapid breathing has many possible medical causes, including: Asthma Blood clot in an artery in the ...

  5. Rapid identification of illegal synthetic adulterants in herbal anti-diabetic medicines using near infrared spectroscopy

    Science.gov (United States)

    Feng, Yanchun; Lei, Deqing; Hu, Changqin

    We created a rapid detection procedure for identifying herbal medicines illegally adulterated with synthetic drugs using near infrared spectroscopy. This procedure includes a reverse correlation coefficient method (RCCM) and comparison of characteristic peaks. Moreover, we made improvements to the RCCM based on new strategies for threshold settings. Any tested herbal medicine must meet two criteria to be identified with our procedure as adulterated. First, the correlation coefficient between the tested sample and the reference must be greater than the RCCM threshold. Next, the NIR spectrum of the tested sample must contain the same characteristic peaks as the reference. In this study, four pure synthetic anti-diabetic drugs (i.e., metformin, gliclazide, glibenclamide and glimepiride), 174 batches of laboratory samples and 127 batches of herbal anti-diabetic medicines were used to construct and validate the procedure. The accuracy of this procedure was greater than 80%. Our data suggest that this protocol is a rapid screening tool to identify synthetic drug adulterants in herbal medicines on the market.

  6. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  7. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  8. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  9. Feeling Is Believing: A Secure Template Exchange Protocol

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Lee, Seong-Whan; Li, Stan Z.

    We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip

  10. Análise comparativa entre duas bacias hidrográficas utilizando um protocolo de avaliação rápida da diversidade de habitats / Comparative analysis between two hydrographic basin using a rapid habitats diversity evaluation protocol

    Directory of Open Access Journals (Sweden)

    Rogério Antonio Krupek

    2010-04-01

    Full Text Available Este trabalho teve por objetivo utilizar um protocolo de avaliação rápida da diversidade de habitats como ferramenta para comparar duas bacias de drenagem localizadas no município de Guarapuava, estado do Paraná: a bacia hidrográfica do rio Cascavel (25º23’03”S-51º28’12”W e a bacia hidrográfica do rio das Pedras (25º13’10”S-51º28’40”W, que se encontram relativamente próximas e estão sob diferentes intensidades de influências antrópicas. Este protocolo tem como finalidade avaliar características da água e do entorno de ecossistemas aquáticos a partir da atribuição de pontuação a cada um dos parâmetros com base na observação das condições do habitat. As coletas de dados foram realizadas no período de 10 de junho a 30 de julho de 2007 em vinte pontos de amostragem estabelecidos em cada uma das bacias de drenagem estudadas. Comparativamente, a grande maioria dos parâmetros apresentou diferenças significativas entre os dois sistemas, sendo que os rios e riachos da bacia do rio das Pedras encontram-se nitidamente em melhores condições que a bacia do rio Cascavel, onde seus ecossistemas aquáticos apresentam visíveis sinais de degradação. O uso de avaliações rápidas como este protocolo é uma importante ferramenta no desenvolvimento de programas de monitoramento ecológico e na restauração de ambientes lóticos. AbstractThe main object of the present work was to use a protocol of rapid habitat diversity evaluation as tool to compare two drainage basin located in the municipality of Guarapuava, mid-southern region of Paraná state: Cascavel river basin (25º23’03”S-51º28’12”W and Pedras river basin (25º13’10”S-51º28’40”W, which meets relatively near and under different intensities of entropic influences. This protocol has the purpose of evaluating water and riparian characteristics of the aquatic ecosystems from the attribution of values to each parameter through observation of

  11. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  12. Rapid improvement teams.

    Science.gov (United States)

    Alemi, F; Moore, S; Headrick, L; Neuhauser, D; Hekelman, F; Kizys, N

    1998-03-01

    Suggestions, most of which are supported by empirical studies, are provided on how total quality management (TQM) teams can be used to bring about faster organizationwide improvements. Ideas are offered on how to identify the right problem, have rapid meetings, plan rapidly, collect data rapidly, and make rapid whole-system changes. Suggestions for identifying the right problem include (1) postpone benchmarking when problems are obvious, (2) define the problem in terms of customer experience so as not to blame employees nor embed a solution in the problem statement, (3) communicate with the rest of the organization from the start, (4) state the problem from different perspectives, and (5) break large problems into smaller units. Suggestions for having rapid meetings include (1) choose a nonparticipating facilitator to expedite meetings, (2) meet with each team member before the team meeting, (3) postpone evaluation of ideas, and (4) rethink conclusions of a meeting before acting on them. Suggestions for rapid planning include reducing time spent on flowcharting by focusing on the future, not the present. Suggestions for rapid data collection include (1) sample patients for surveys, (2) rely on numerical estimates by process owners, and (3) plan for rapid data collection. Suggestions for rapid organizationwide implementation include (1) change membership on cross-functional teams, (2) get outside perspectives, (3) use unfolding storyboards, and (4) go beyond self-interest to motivate lasting change in the organization. Additional empirical investigations of time saved as a consequence of the strategies provided are needed. If organizations solve their problems rapidly, fewer unresolved problems may remain.

  13. Rapid dual-injection single-scan 13N-ammonia PET for quantification of rest and stress myocardial blood flows

    International Nuclear Information System (INIS)

    Rust, T C; DiBella, E V R; McGann, C J; Christian, P E; Hoffman, J M; Kadrmas, D J

    2006-01-01

    Quantification of myocardial blood flows at rest and stress using 13 N-ammonia PET is an established method; however, current techniques require a waiting period of about 1 h between scans. The objective of this study was to test a rapid dual-injection single-scan approach, where 13 N-ammonia injections are administered 10 min apart during rest and adenosine stress. Dynamic PET data were acquired in six human subjects using imaging protocols that provided separate single-injection scans as gold standards. Rest and stress data were combined to emulate rapid dual-injection data so that the underlying activity from each injection was known exactly. Regional blood flow estimates were computed from the dual-injection data using two methods: background subtraction and combined modelling. The rapid dual-injection approach provided blood flow estimates very similar to the conventional single-injection standards. Rest blood flow estimates were affected very little by the dual-injection approach, and stress estimates correlated strongly with separate single-injection values (r = 0.998, mean absolute difference = 0.06 ml min -1 g -1 ). An actual rapid dual-injection scan was successfully acquired in one subject and further demonstrates feasibility of the method. This study with a limited dataset demonstrates that blood flow quantification can be obtained in only 20 min by the rapid dual-injection approach with accuracy similar to that of conventional separate rest and stress scans. The rapid dual-injection approach merits further development and additional evaluation for potential clinical use

  14. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  15. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  16. A Rapid Protocol of Crude RNA/DNA Extraction for RT-qPCR Detection and Quantification of 'Candidatus Phytoplasma prunorum'.

    Science.gov (United States)

    Minguzzi, Stefano; Terlizzi, Federica; Lanzoni, Chiara; Poggi Pollini, Carlo; Ratti, Claudio

    2016-01-01

    Many efforts have been made to develop a rapid and sensitive method for phytoplasma and virus detection. Taking our cue from previous works, different rapid sample preparation methods have been tested and applied to Candidatus Phytoplasma prunorum ('Ca. P. prunorum') detection by RT-qPCR. A duplex RT-qPCR has been optimized using the crude sap as a template to simultaneously amplify a fragment of 16S rRNA of the pathogen and 18S rRNA of the host plant. The specific plant 18S rRNA internal control allows comparison and relative quantification of samples. A comparison between DNA and RNA contribution to qPCR detection is provided, showing higher contribution of the latter. The method presented here has been validated on more than a hundred samples of apricot, plum and peach trees. Since 2013, this method has been successfully applied to monitor 'Ca. P. prunorum' infections in field and nursery. A triplex RT-qPCR assay has also been optimized to simultaneously detect 'Ca. P. prunorum' and Plum pox virus (PPV) in Prunus.

  17. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  18. Analysis of Intracellular Metabolites from Microorganisms: Quenching and Extraction Protocols

    Directory of Open Access Journals (Sweden)

    Farhana R. Pinu

    2017-10-01

    Full Text Available Sample preparation is one of the most important steps in metabolome analysis. The challenges of determining microbial metabolome have been well discussed within the research community and many improvements have already been achieved in last decade. The analysis of intracellular metabolites is particularly challenging. Environmental perturbations may considerably affect microbial metabolism, which results in intracellular metabolites being rapidly degraded or metabolized by enzymatic reactions. Therefore, quenching or the complete stop of cell metabolism is a pre-requisite for accurate intracellular metabolite analysis. After quenching, metabolites need to be extracted from the intracellular compartment. The choice of the most suitable metabolite extraction method/s is another crucial step. The literature indicates that specific classes of metabolites are better extracted by different extraction protocols. In this review, we discuss the technical aspects and advancements of quenching and extraction of intracellular metabolite analysis from microbial cells.

  19. A customised cold-water immersion protocol favours one-size-fits-all protocols in improving acute performance recovery

    NARCIS (Netherlands)

    Zandvoort, Coen S.; de Zwart, Jelmer R.; van Keeken, Brenda L.; Viroux, Patrick J.F.; Tiemessen, Ivo J.H.

    The purpose of the present study was to investigate whether a customised cold-water immersion (CWIc) protocol was more effective in enhancing acute performance recovery than a one-size-fits-all CWI (CWIs) or active recovery (AR) protocol. On three separate testing days, 10 healthy, physically

  20. Rapid outer-surface protein C DNA tattoo vaccination protects against Borrelia afzelii infection.

    Science.gov (United States)

    Wagemakers, A; Mason, L M K; Oei, A; de Wever, B; van der Poll, T; Bins, A D; Hovius, J W R

    2014-12-01

    Borrelia afzelii is the predominant Borrelia species causing Lyme borreliosis in Europe. Currently there is no human vaccine against Lyme borreliosis, and most research focuses on recombinant protein vaccines against Borrelia burgdorferi sensu stricto. DNA tattooing is a novel vaccination method that can be applied in a rapid vaccination schedule. We vaccinated C3H/HeN mice with B. afzelii strain PKo OspC (outer-surface protein C) using a codon-optimized DNA vaccine tattoo and compared this with recombinant protein vaccination in a 0-2-4 week vaccination schedule. We also assessed protection by DNA tattoo in a 0-3-6 day schedule. DNA tattoo and recombinant OspC vaccination induced comparable total IgG responses, with a lower IgG1/IgG2a ratio after DNA tattoo. Two weeks after syringe-challenge with 5 × 10(5) B. afzelii spirochetes most vaccinated mice had negative B. afzelii tissue DNA loads and all were culture negative. Furthermore, DNA tattoo vaccination in a 0-3-6 day regimen also resulted in negative Borrelia loads and cultures after challenge. To conclude, DNA vaccination by tattoo was fully protective against B. afzelii challenge in mice in a rapid vaccination protocol, and induces a favorable humoral immunity compared to recombinant protein vaccination. Rapid DNA tattoo is a promising vaccination strategy against spirochetes.

  1. Isolating the impact of sediment toxicity in urban streams

    International Nuclear Information System (INIS)

    Marshall, Stephen; Pettigrove, Vincent; Carew, Melissa; Hoffmann, Ary

    2010-01-01

    Several factors can contribute to the ecological degradation of stream catchments following urbanization, but it is often difficult to separate their relative importance. We isolated the impact of polluted sediment on the condition of an urban stream in Melbourne, Australia, using two complementary approaches. Using a rapid bioassessment approach, indices of stream condition were calculated based on macroinvertebrate field surveys. Urban stream reaches supported impoverished macroinvertebrate communities, and contained potentially toxic concentrations of heavy metals and hydrocarbons. Using a field microcosm approach, a bioassay was carried out to assess sediment pollution effects on native macroinvertebrates. Sediment from urban sites substantially altered the microcosm macroinvertebrate community, most likely due to elevated heavy metal and hydrocarbon concentrations. Macroinvertebrate surveys combined with a bioassay approach based on field microcosms can help isolate the effect of stream pollutants in degraded ecosystems. - Field microcosms isolate the ecological impact of polluted sediment in an urban stream.

  2. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  3. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  4. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    Permanent link: http://www.ias.ac.in/article/fulltext/pram/086/05/0973-0983 ... The purpose of this paper is a proposal on entanglement concentration protocol forcluster states. The protocol ... We also make a comparative numerical study of the residual entanglement left out after the execution of each step of the protocol.

  5. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  6. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  7. Rapid detection and identification of Stachybotrys and Chaetomium species using tissue PCR analysis

    DEFF Research Database (Denmark)

    Lewinska, Anna Malgorzata; Peuhkuri, Ruut Hannele; Rode, Carsten

    2016-01-01

    level is essential for health risk assessment and building remediation. This study focuses on molecular identification of two common indoor fungal genera: Stachybotrys and Chaetomium. This study proposes two new DNA barcode candidates for Stachybotrys and Chaetomium: the gene encoding mitogen activated...... protein kinase (hogA) and the intergenic region between histone 3 and histone 4 (h3-h4) as well as it introduces a rapid - 3.5 h - protocol for direct Stachybotrys and Chaetomium species identification, which bypasses culture cultivation, DNA extraction and DNA sequencing....

  8. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  9. Recommendations for Enhancing Implementation of Additional Protocol Declarations

    International Nuclear Information System (INIS)

    Niina, Toshiaki; Nidaira, Kazuo; Aono, Yosuke

    2010-01-01

    Japan signed the Additional Protocol (hereafter, AP) in December 1998. The domestic law and regulation had been revised to implement the initial and annual declarations for the Agency and the Additional Protocol came into force in December 1999. Since initial declaration in 2000, Japan has submitted the annual declaration in every May. Until 2010, Japan has made 10 annual declarations. This paper gives recommendations to enhance implementation of Additional Protocol declarations based on 10-year experience in Japan and addresses the following: Current status of additional protocol declaration in Japan; Outline of processing method; AP Information Management System; Recommendations for improving quality of declaration. Preparation of additional protocol declaration in NMCC has been conducted in the course of contract with Japan Safeguards Office (hereafter, JSGO) for safeguards information treatment. (author)

  10. [PET/CT: protocol aspects and legal controversies].

    Science.gov (United States)

    Gorospe Sarasúa, L; Vicente Bártulos, A; González Gordaliza, C; García Poza, J; Lourido García, D; Jover Díaz, R

    2008-01-01

    The combination of positron emission tomography (PET) and computed tomography (CT) in a single scanner (PET/CT) allows anatomic and metabolic images to be fused and correlated with a high degree of accuracy; this represents a very important landmark in the history of medicine and especially in the area of diagnostic imaging. Nevertheless, the implementation, startup, and operation of a PET/CT scanner presents particularly interesting challenges, because it involves the integration of two well-established and consolidated techniques (CT and PET, which provide complementary information) that have traditionally been carried out in the context of two different specialties (radiology and nuclear medicine). The rapid diffusion of this new integrated technology raises a series of questions related to the optimal protocols for image acquisition, the supervision of the examinations, image interpretation, and reporting, as well as questions related to the legal competence and responsibility of the specialists involved in a PET/CT study. The objective of this article is to approach these aspects from a constructive perspective and to stimulate the dialog between the specialties of radiology and nuclear medicine, with the aim of maximizing the diagnostic potential of PET/CT and thus of providing better care for patients.

  11. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  12. RApid Primary care Initiation of Drug treatment for Transient Ischaemic Attack (RAPID−TIA): study protocol for a pilot randomised controlled trial

    Science.gov (United States)

    2013-01-01

    Background People who have a transient ischaemic attack (TIA) or minor stroke are at high risk of a recurrent stroke, particularly in the first week after the event. Early initiation of secondary prevention drugs is associated with an 80% reduction in risk of stroke recurrence. This raises the question as to whether these drugs should be given before being seen by a specialist – that is, in primary care or in the emergency department. The aims of the RAPID-TIA pilot trial are to determine the feasibility of a randomised controlled trial, to analyse cost effectiveness and to ask: Should general practitioners and emergency doctors (primary care physicians) initiate secondary preventative measures in addition to aspirin in people they see with suspected TIA or minor stroke at the time of referral to a specialist? Methods/Design This is a pilot randomised controlled trial with a sub-study of accuracy of primary care physician diagnosis of TIA. In the pilot trial, we aim to recruit 100 patients from 30 general practices (including out-of-hours general practice centres) and 1 emergency department whom the primary care physician diagnoses with TIA or minor stroke and randomly assign them to usual care (that is, initiation of aspirin and referral to a TIA clinic) or usual care plus additional early initiation of secondary prevention drugs (a blood-pressure lowering protocol, simvastatin 40 mg and dipyridamole 200 mg m/r bd). The primary outcome of the main study will be the number of strokes at 90 days. The diagnostic accuracy sub-study will include these 100 patients and an additional 70 patients in whom the primary care physician thinks the diagnosis of TIA is possible, rather than probable. For the pilot trial, we will report recruitment rate, follow-up rate, a preliminary estimate of the primary event rate and occurrence of any adverse events. For the diagnostic study, we will calculate sensitivity and specificity of primary care physician diagnosis using the final

  13. Characterizing millisecond intermediates in hemoproteins using rapid-freeze-quench resonance Raman spectroscopy.

    Science.gov (United States)

    Matsumura, Hirotoshi; Moënne-Loccoz, Pierre

    2014-01-01

    The combination of rapid freeze quenching (RFQ) with resonance Raman (RR) spectroscopy represents a unique tool with which to investigate the nature of short-lived intermediates formed during the enzymatic reactions of metalloproteins. Commercially available equipment allows trapping of intermediates within a millisecond to second time scale for low-temperature RR analysis resulting in the direct detection of metal-ligand vibrations and porphyrin skeletal vibrations in hemoproteins. This chapter briefly discusses RFQ-RR studies carried out previously in our laboratory and presents, as a practical example, protocols for the preparation of RFQ samples of the reaction of metmyoglobin with nitric oxide (NO) under anaerobic conditions. Also described are important controls and practical procedures for the analysis of these samples by low-temperature RR spectroscopy.

  14. The Protocol of Choice for Treatment of Snake Bite

    Directory of Open Access Journals (Sweden)

    Afshin Mohammad Alizadeh

    2016-01-01

    Full Text Available The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF, and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89% were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS. Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values.

  15. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  16. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  17. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  18. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  19. The value of a rapid contrast-enhanced angio-MRI protocol in the detection of head and neck paragangliomas in SDHx mutations carriers: a retrospective study on behalf of the PGL.EVA investigators*

    International Nuclear Information System (INIS)

    Gravel, Guillaume; Hernigou, Anne; Niccoli, Patricia; Rohmer, Vincent; Moulin, Guy; Borson-Chazot, Francoise; Rousset, Pascal; Pasco-Papon, Anne; Marcus, Claude; Dubrulle, Frederique; Gouya, Herve; Bidault, Francois; Dupas, Benoit; Gabrillargues, Jean; Caumont-Prim, Aurore; Gimenez-Roqueplo, Anne-Paule; Halimi, Philippe

    2016-01-01

    To assess the performance of a simplified MRI protocol consisting of a contrast-enhanced three-dimensional MR angiography (CE-MRA) in association with a post-contrast T1-weighted sequence (T1WIV) for the detection of HNPGLs in SDHx mutation carriers. This retrospective sub-study is based on the multicenter PGL.EVA cohort, which prospectively enrolled SDHx mutation carriers from 2005 to 2009; 157 index cases or relatives were included. CE-MRA and the T1WIV images were read solely with knowledge of the clinical data but blind to the diagnosis. Sensitivity, specificity and likelihood ratios for the simplified MRI protocol were compared to the full MRI protocol reading results and to the gold standard status obtained through the consensus of an expert committee. The sensitivity and specificity of the readings of the simplified MRI protocol were, respectively, 88.7 % (95 % CI = 78.1-95.3) and 93.7 % (95 % CI = 86.8-97.7) versus 80.7 % (95 % CI = 68.6-89.6) and 94.7 % (95 % CI = 88.1-98.3) for the readings of the full MRI protocol. The simplified post-contrast MRI with shorter duration (5 to 10 minutes) showed no performance difference compared to the lengthy standard full MRI and can be proposed for the detection of head and neck paragangliomas (HNPGLs) in SDHx mutation carriers. (orig.)

  20. The value of a rapid contrast-enhanced angio-MRI protocol in the detection of head and neck paragangliomas in SDHx mutations carriers: a retrospective study on behalf of the PGL.EVA investigators*

    Energy Technology Data Exchange (ETDEWEB)

    Gravel, Guillaume; Hernigou, Anne [Hopital Europeen Georges Pompidou, Assistance Publique-Hopitaux de Paris, Service de Radiologie, Paris (France); Niccoli, Patricia [Centre Hospitalier Universitaire la Timone, Assistance Publique-Hopitaux de Marseille, Service d' Endocrinologie, Diabete et Maladies Metaboliques, Marseille (France); Rohmer, Vincent [Centre Hospitalier Universitaire d' Angers, Service d' Endocrinologie, Diabetologie, Nutrition, Angers (France); LUNAM Universite, INSERM, U1063, Angers (France); Moulin, Guy [Centre Hospitalier Universitaire la Timone, Assistance Publique-Hopitaux de Marseille, Service de Radiologie, Marseille (France); Borson-Chazot, Francoise [Federation d' Endocrinologie, Hospices civils de Lyon, Groupement Hospitalier Est, Lyon (France); Universite de Lyon, Faculte de Medecine Lyon-Est, Lyon (France); Cancer Research Center of Lyon, INSERM UMR1052, UMR CNRS 5286, Lyon (France); Rousset, Pascal [Hospices civils de Lyon, Groupement Hospitalier Est, Service de Radiologie, Lyon (France); Pasco-Papon, Anne [Centre Hospitalier Universitaire d' Angers, Service de Radiologie, Angers (France); Marcus, Claude [Centre Hospitalo-Universitaire de Reims, Service de Radiologie, Reims (France); Dubrulle, Frederique [Centre Hospitalo-Universitaire de Lille, Service de Radiologie, Lille (France); Gouya, Herve [Hopital Cochin, Assistance Publique-Hopitaux de Paris, Service de Radiologie, Paris (France); Bidault, Francois [Institut Gustave Roussy, Service de Radiologie, Villejuif (France); Dupas, Benoit [Centre Hospitalo-Universitaire de Nantes, Service de Radiologie, Nantes (France); Gabrillargues, Jean [Centre Hospitalo-Universitaire de Clermont-Ferrand, Service de Neuroradiologie, Clermont Ferrand (France); Caumont-Prim, Aurore [Unite d' Epidemiologie et de Recherche Clinique, Assistance Publique-Hopitaux de Paris, Hopital Europeen Georges Pompidou, Paris (France); Centre d' investigation Epidemiologique 4, INSERM, Paris (France); Gimenez-Roqueplo, Anne-Paule [Hopital Europeen Georges Pompidou, Assistance Publique-Hopitaux de Paris, Service de Genetique, Paris (France); Paris Cardiovascular Research Center, INSERM, UMR970, Paris (France); Universite Paris Descartes, Sorbonne Paris Cite, Faculte de Medecine, Paris (France); Halimi, Philippe [Hopital Europeen Georges Pompidou, Assistance Publique-Hopitaux de Paris, Service de Radiologie, Paris (France); Universite Paris Descartes, Sorbonne Paris Cite, Faculte de Medecine, Paris (France)

    2016-06-15

    To assess the performance of a simplified MRI protocol consisting of a contrast-enhanced three-dimensional MR angiography (CE-MRA) in association with a post-contrast T1-weighted sequence (T1WIV) for the detection of HNPGLs in SDHx mutation carriers. This retrospective sub-study is based on the multicenter PGL.EVA cohort, which prospectively enrolled SDHx mutation carriers from 2005 to 2009; 157 index cases or relatives were included. CE-MRA and the T1WIV images were read solely with knowledge of the clinical data but blind to the diagnosis. Sensitivity, specificity and likelihood ratios for the simplified MRI protocol were compared to the full MRI protocol reading results and to the gold standard status obtained through the consensus of an expert committee. The sensitivity and specificity of the readings of the simplified MRI protocol were, respectively, 88.7 % (95 % CI = 78.1-95.3) and 93.7 % (95 % CI = 86.8-97.7) versus 80.7 % (95 % CI = 68.6-89.6) and 94.7 % (95 % CI = 88.1-98.3) for the readings of the full MRI protocol. The simplified post-contrast MRI with shorter duration (5 to 10 minutes) showed no performance difference compared to the lengthy standard full MRI and can be proposed for the detection of head and neck paragangliomas (HNPGLs) in SDHx mutation carriers. (orig.)

  1. Rapid Sanger sequencing of the 16S rRNA gene for identification of some common pathogens.

    Directory of Open Access Journals (Sweden)

    Linxiang Chen

    Full Text Available Conventional Sanger sequencing remains time-consuming and laborious. In this study, we developed a rapid improved sequencing protocol of 16S rRNA for pathogens identification by using a new combination of SYBR Green I real-time PCR and Sanger sequencing with FTA® cards. To compare the sequencing quality of this method with conventional Sanger sequencing, 12 strains, including three kinds of strains (1 reference strain and 3 clinical strains, which were previously identified by biochemical tests, which have 4 Pseudomonas aeruginosa, 4 Staphyloccocus aureus and 4 Escherichia coli, were targeted. Additionally, to validate the sequencing results and bacteria identification, expanded specimens with 90 clinical strains, also comprised of the three kinds of strains which included 30 samples respectively, were performed as just described. The results showed that although statistical differences (P<0.05 were found in sequencing quality between the two methods, their identification results were all correct and consistent. The workload, the time consumption and the cost per batch were respectively light versus heavy, 8 h versus 11 h and $420 versus $400. In the 90 clinical strains, all of the Pseudomonas aeruginosa and Staphyloccocus aureus strains were correctly identified, but only 26.7% of the Escherichia coli strains were recognized as Escherichia coli, while 33.3% as Shigella sonnei and 40% as Shigella dysenteriae. The protocol described here is a rapid, reliable, stable and convenient method for 16S rRNA sequencing, and can be used for Pseudomonas aeruginosa and Staphyloccocus aureus identification, yet it is not completely suitable for discriminating Escherichia coli and Shigella strains.

  2. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...

  3. Review of Evidence for Adult Diabetic Ketoacidosis Management Protocols

    Directory of Open Access Journals (Sweden)

    Tara T. T. Tran

    2017-06-01

    Full Text Available BackgroundDiabetic ketoacidosis (DKA is an endocrine emergency with associated risk of morbidity and mortality. Despite this, DKA management lacks strong evidence due to the absence of large randomised controlled trials (RCTs.ObjectiveTo review existing studies investigating inpatient DKA management in adults, focusing on intravenous (IV fluids; insulin administration; potassium, bicarbonate, and phosphate replacement; and DKA management protocols and impact of DKA resolution rates on outcomes.MethodsOvid Medline searches were conducted with limits “all adult” and published between “1973 to current” applied. National consensus statements were also reviewed. Eligibility was determined by two reviewers’ assessment of title, abstract, and availability.ResultsA total of 85 eligible articles published between 1973 and 2016 were reviewed. The salient findings were (i Crystalloids are favoured over colloids though evidence is lacking. The preferred crystalloid and hydration rates remain contentious. (ii IV infusion of regular human insulin is preferred over the subcutaneous route or rapid acting insulin analogues. Administering an initial IV insulin bolus before low-dose insulin infusions obviates the need for supplemental insulin. Consensus-statements recommend fixed weight-based over “sliding scale” insulin infusions although evidence is weak. (iii Potassium replacement is imperative although no trials compare replacement rates. (iv Bicarbonate replacement offers no benefit in DKA with pH > 6.9. In severe metabolic acidosis with pH < 6.9, there is lack of both data and consensus regarding bicarbonate administration. (v There is no evidence that phosphate replacement offers outcome benefits. Guidelines consider replacement appropriate in patients with cardiac dysfunction, anaemia, respiratory depression, or phosphate levels <0.32 mmol/L. (vi Upon resolution of DKA, subcutaneous insulin is recommended with IV insulin infusions

  4. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  5. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  6. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  7. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  8. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  9. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  10. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  11. Robust Multi-unit Auction Protocol against False-name Bids

    Science.gov (United States)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  12. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  13. Development of Loop-Mediated Isothermal Amplification (LAMP) Assay for Rapid Detection of Cannabis sativa.

    Science.gov (United States)

    Kitamura, Masashi; Aragane, Masako; Nakamura, Kou; Watanabe, Kazuhito; Sasaki, Yohei

    2016-07-01

    In many parts of the world, the possession and cultivation of Cannabis sativa L. are restricted by law. As chemical or morphological analyses cannot identify the plant in some cases, a simple yet accurate DNA-based method for identifying C. sativa is desired. We have developed a loop-mediated isothermal amplification (LAMP) assay for the rapid identification of C. sativa. By optimizing the conditions for the LAMP reaction that targets a highly conserved region of tetrahydrocannabinolic acid (THCA) synthase gene, C. sativa was identified within 50 min at 60-66°C. The detection limit was the same as or higher than that of conventional PCR. The LAMP assay detected all 21 specimens of C. sativa, showing high specificity. Using a simple protocol, the identification of C. sativa could be accomplished within 90 min from sample treatment to detection without use of special equipment. A rapid, sensitive, highly specific, and convenient method for detecting and identifying C. sativa has been developed and is applicable to forensic investigations and industrial quality control.

  14. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  15. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  16. In situ aquifer bioremediation of organics including cyanide and carbon disulfide

    International Nuclear Information System (INIS)

    Abou-Rizk, J.A.M.; Leavitt, M.E.; Graves, D.A.

    1995-01-01

    Low levels (< 1 mg/L) of acetone, cyanide, phenol, naphthalene, 2-methylnaphthalene, and carbon disulfide from an inactive industrial landfill were found above background levels in a shallow aquifer at an eastern coastal site. In situ biodegradation was evaluated for treatment of these contaminants. Two soil samples and three groundwater samples were taken from the site for a laboratory bioassessment and a biotreatability test. The positive results of the bioassessment suggested moving forward with biotreatability testing. Biotreatability test results indicated suitable site conditions for bioremediation and that all the contaminants of concern at the site could be biodegraded to nondetect or very low levels (< 50 microg/L) with oxygen only; i.e., addition of nutrients was not required. Pilot-scale testing was undertaken on site to provide information for full-scale design, including oxygen requirements and air injection well spacing. This report describes the approach, the results, and their impact on the full-scale remediation system

  17. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  18. Comparison of the ultrashort gonadotropin-releasing hormone agonist-antagonist protocol with microdose flare -up protocol in poor responders: a preliminary study.

    Science.gov (United States)

    Berker, Bülent; Duvan, Candan İltemir; Kaya, Cemil; Aytaç, Ruşen; Satıroğlu, Hakan

    2010-01-01

    To determine the potential effect of the ultrashort gonadotropin-releasing hormone (GnRH) agonist/GnRH antagonist protocol versus the microdose GnRH agonist protocol in poor responders undergoing intracytoplasmic sperm injection (ICSI). The patients in the Agonist-Antagonist Group (n=41) were administered the ultrashort GnRH-agonist/ antagonist protocol, while the patients in the Microdose Group (n=41) were stimulated according to the microdose flare-up protocol. The mean number of mature oocytes retrieved was the primary outcome measure. Fertilization rate, implantation rate per embryo and clinical pregnancy rates were secondary outcome measures. There was no differenc between the mean number of mature oocytes retrieved in the two groups. There were also no statistical differences between the two groups in terms of peak serum E2 level, canceled cycles, endometrial thickness on hCG day, number of 2 pronucleus and number of embryos transferred. However, the total gonadotropin consumption and duration of stimulation were significantly higher with the Agonist-Antagonist Group compared with the Microdose Group. The implantation and clinical pregnancy rates were similar between the two groups. Despite the high dose of gonadotropin consumption and longer duration of stimulation with the ultrashort GnRH agonist/ antagonist protocol, it seems that the Agonist-Antagonist Protocol is not inferior to the microdose protocol in poor responders undergoing ICSI.

  19. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  20. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  1. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  2. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  3. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  4. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  5. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  6. IAEA to implement Safeguards Additional Protocols in the EU

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  7. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  8. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  9. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  10. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  11. The coupling of rapidly synergistic cloud point extraction with thermospray flame furnace atomic absorption spectrometry

    International Nuclear Information System (INIS)

    Wen, X.; Deng, Q.; Guo, J.; Zhao, X.; Zhao, Y.; Ji, S.

    2012-01-01

    Rapidly synergistic cloud point extraction (RS-CPE) was coupled with thermospray flame furnace atomic absorption spectrometry (TS-FF-AAS) to result in new CPE patterns and accelerated (1 min) protocols. It is demonstrated, for the case of copper (II) ion, that TS-FF-AAS improves the sampling efficiency and the sensitivity of FAAS determinations. Problems of nebulization associated with previous methods based on the coupling of FAAS and RS-CPE are overcome. TS-FF-AAS also improves sensitivity and gives a limit of detection for copper of 0.20 μg L -1 , which is better by a factor of 32. Compared to direct FAAS, the factor is 114. (author)

  12. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  13. Multi-party quantum key agreement protocol secure against collusion attacks

    Science.gov (United States)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  14. Centralization of politrauma. Study of Ferrara’s reality and simulation of an agreed-upon protocol

    Directory of Open Access Journals (Sweden)

    Luigi Melcarne

    2011-09-01

    Full Text Available In a time in which everybody’s asked a big effort to use hospitals, resources and emergency departments in a rational way, the Centralization – that is sending the right patient to the right hospital at the right time – allows an optimization of the resources and a better management of medical patients. In this study we examined the actual state of Centralization in the city of Ferrara where an experimental protocol of “centralization” has been introduced. This study has the purpose of simulating reality if the protocol had been introduced in the years 2008/2009. The results confirm not only that an important number of patients that were meant to be sent to the CTZ of Ferrara where instead sent to the PST but also that, on the contrary, patients from the suburbs that didn’t require advanced treatments were sent to the Sant’Anna hospital of Ferrara. So if medical literature already points out the advantages of a correct Centralization for patients with polytraumas; the study, based on the reality in Ferrara , shows how the creation of an agreed protocol with the goal to guide health workers at sending polytrauma patients to the right destination , instead of creating an excessive flow th the main hub, can improve the overall organization of health services, with an equal distribution between hub and spoke. When considering First Aid not always speed and rapidity guarantee survival; this is so much more real in the case of patients with polytrauma, where quality of cures assumes more importance than time.

  15. Protocols for pressure ulcer prevention: are they evidence-based?

    Science.gov (United States)

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  16. A rapid and efficient in vitro regeneration system for lettuce (Lactuca sativa L.).

    Science.gov (United States)

    Armas, Isabel; Pogrebnyak, Natalia; Raskin, Ilya

    2017-01-01

    Successful biotechnological improvement of crop plants requires a reliable and efficient in vitro regeneration system. Lettuce ( Lactuca sativa L.), one the most important vegetable crops worldwide, is strongly genotype-dependent in terms of regeneration capacity, limiting the potential for biotechnological improvement of cultivars which show recalcitrance under currently available protocols. The effect of different nutrient sources, plant hormone combinations and activated charcoal supplementation on shoot induction efficiency was evaluated on the cultivar 'RSL NFR', which had previously shown poor regeneration efficiency. Multiple shoot organogenesis from cotyledon explants was recorded at the highest frequency and speed on Murashige and Skoog regeneration medium supplemented with 200 mg/l of activated charcoal, 3% sucrose, 10 mg/l benzylaminopurine and 0.5 mg/l naphthaleneacetic acid, which induced shoots through direct regeneration in 90.8 ± 7.9% of explants. High shoot induction efficiency was also observed, albeit not quantified, when using this medium on some other cultivars. This activated charcoal-containing regeneration medium might offer a rapid and efficient option for direct shoot induction in some lettuce genotypes that do not respond well to common lettuce regeneration protocols. This is also the first report of the effect of activated charcoal in lettuce tissue culture.

  17. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  18. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  19. RadNet: Open network protocol for radiation data

    International Nuclear Information System (INIS)

    Rees, B.; Olson, K.; Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W.; Koskelo, M.

    1998-01-01

    Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet's flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems

  20. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.