... was to verify the ability of the South African Scoring System version 4 (SASS4), to assess the health of aquatic ecosystems. The macroinvertebrate community attributes of the Mhlathuze River (KwaZulu-Natal, South Africa) were studied by applying the SASS4 rapid bioassessment method. In testing the effect of spatial and ...
US Fish and Wildlife Service, Department of the Interior — Selected metrics from the Rapid Bioassessment Protocols (RBPs), published by the U.S. Environmental Protection Agency, were used to describe fish and benthic...
Kranzfelder, Petra; Anderson, Alyssa M; Egan, Alexander T; Mazack, Jane E; Bouchard, R William; Rufer, Moriya M; Ferrington, Leonard C
Rapid bioassessment protocols using benthic macroinvertebrate assemblages have been successfully used to assess human impacts on water quality. Unfortunately, traditional benthic larval sampling methods, such as the dip-net, can be time-consuming and expensive. An alternative protocol involves collection of Chironomidae surface-floating pupal exuviae (SFPE). Chironomidae is a species-rich family of flies (Diptera) whose immature stages typically occur in aquatic habitats. Adult chironomids emerge from the water, leaving their pupal skins, or exuviae, floating on the water's surface. Exuviae often accumulate along banks or behind obstructions by action of the wind or water current, where they can be collected to assess chironomid diversity and richness. Chironomids can be used as important biological indicators, since some species are more tolerant to pollution than others. Therefore, the relative abundance and species composition of collected SFPE reflect changes in water quality. Here, methods associated with field collection, laboratory processing, slide mounting, and identification of chironomid SFPE are described in detail. Advantages of the SFPE method include minimal disturbance at a sampling area, efficient and economical sample collection and laboratory processing, ease of identification, applicability in nearly all aquatic environments, and a potentially more sensitive measure of ecosystem stress. Limitations include the inability to determine larval microhabitat use and inability to identify pupal exuviae to species if they have not been associated with adult males.
Non-wadeable rivers have been largely overlooked by bioassessment programs because of sampling difficulties and a lack of appropriate methods and biological indicators. We are in the process of developing a Large River Bioassessment Protocol (LR-BP) for sampling macroinvertebrat...
US Fish and Wildlife Service, Department of the Interior — Physical, chemical and biological components at five stations on Hollis Creek, Oktibbeha County, Mississippi were evaluated using Rapid Bioassessment Protocols (RBP)...
Macroinvertebrate sampling was performed at 16 locations in the Savannah River Site (SRS) streams using Hester-Dendy multiplate samplers and EPA Rapid Bioassessment Protocols (RBP). Some of the sampling locations were unimpacted, while other locations had been subject to various forms of perturbation by SRS activities. In general, the data from the Hester-Dendy multiplate samplers were more sensitive at detecting impacts than were the RBP data. We developed a Biotic Index for the Hester-Dendy data which incorporated eight community structure, function, and balance parameters. when tested using a data set that was unrelated to the data set that was used in developing the Biotic Index, the index was very successful at detecting impact.
Thomas, J.M.; Cline, J.F.; Cushing, C.E.; McShane, M.C.; Rogers, J.E.; Rogers, L.E.; Simpson, J.C.; Skalski, J.R.
The goals were: (1) determine the variability (both within and between laboratories) for the various bioassay procedures using contaminated soil samples from the Rocky Mountain Arsenal (RMA); (2) assess variability within and between plots for several assessment techniques (for sampling small mammals, plants, insects including honeybees and microarthropods) so that field studies could be designed to detect a defined biotic change; (3) establish three field plant transects which are apparently (a) contaminated, (b) appear contaminated and (c) could serve as a control; (4) assess the feasibility (in the laboratory) of using Basin F water to contaminate RMA soil artificially, and to supply information for the design of a field plot study in 1983; (5) attempt to obtain preliminary data on any promising field or laboratory bioassessment techniques not currently mentioned in the statement of work; and (6) obtain field data to assess the ecological status of RMA lakes and compare these observations to results from bioassessment testing.
Paller, M. H.; Martin, F. D.; Wike, L. D.; Specht, W. L.
The Multiple Habitat Sampling Protocol (MHSP) is a bioassessment method designed to assess the ecological health of South Carolina streams on the basis of macroinvertebrate samples collected from natural substrates. The MHSP is computed by averaging the EPT (number of Ephemeroptera, Plecoptera, Trichoptera taxa) and BI (a biotic index that reflects the pollution tolerances of individual taxa) to produce a bioclassification score. The MHSP produced low bioclassification scores that could falsely indicate environmental degradation in some undisturbed, high quality streams in the Sandhills ecoregion. This problem had two causes: (1) the metrics (especially EPT) were significantly related to stream size, which confounded stream size effects with environmental impacts, and (2) the scoring criteria for EPT were too high for some Sandhills streams, likely because of unrecognized heterogeneity among the Sandhills streams from which the criteria were derived. We corrected these problems by developing new scoring criteria from ecologically comparable undisturbed streams and by utilizing residuals from regressions of the metrics on stream width to normalize for stream size. The MHSP and related protocols are effective methods for assessing environmental quality but allowances must be made for the effects of stream size and the potential ecological heterogeneity that naturally exists among streams in some ecoregions.
Environmental impact can be difficult to assess, especially at the ecosystem level. Any impact assessment methodology that can give cost effective and timely results is highly desirable. Rapid bioassessment (RBA) is cost effective and produces timely results. Several types of RBA have been used at the Savannah River Site (SRS) to assess stream conditions, including the Index of Biotic Integrity (IBI) based on fish community characteristics, and various techniques using aquatic macroinvertebrate species diversity and abundance. In an attempt to broaden the applicability of the RBA concept, we have also begun to develop RBA techniques for seep-fed wetlands and terrestrial habitats. These techniques will focus on vertebrate and macroinvertebrate assemblages for seep-fed wetlands and arthropod assemblages for terrestrial habitats. In situ bioassay is another technique that could be used for rapid and economical assessment of the effects of anthropogenic disturbance. We propose the development of two methods of in situ bioassay that can address bioavailability of constituents of concern. The use of caged bioassay organisms can be applied to terrestrial systems such as capped or existing waste sites using the common house cricket. Another proposed bioassay could use a resident species, such as the imported red fire ant, which is found in disturbed habitats and open areas such as waste sites. Combining in situ techniques with RBA methodologies has the potential to provide a comprehensive assessment of chemical and physical impacts to a wide range of ecosystem types.
Cushing, C.E.; Mueller, R.P.; Murphy, M.T.
Pacific Northwest Laboratory (PNL) was asked by Elmendorf Air Force Base (EAFB) personnel to conduct a series of collections of macroinvertebrates and sediments from Ship Creek to (1) establish baseline data on these populations for reference in evaluating possible impacts from Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) activities at two operable units, (2) compare current population indices with those found by previous investigations in Ship Creek, and (3) determine baseline levels of concentrations of any contaminants in the sediments associated with the macroinvertebrates. A specific suite of indices established by the US Environmental Protection Agency (EPA) was requested for the macroinvertebrate analyses; these follow the Rapid Bioassessment Protocol developed by Plafkin et al. (1989) and will be described. Sediment sample analyses included a Microtox bioassay and chemical analysis for contaminants of concern. These analyses included, volatile organic compounds, total gasoline and diesel hydrocarbons (EPA method 8015, CA modified), total organic carbon, and an inductive-coupled plasma/mass spectrometry (ICP/MS) metals scan. Appendix A reports on the sediment analyses. The Work Plan is attached as Appendix B.
Santana, M F M; Ascer, L G; Custódio, M R; Moreira, F T; Turra, A
Microplastic pollution (particles microplastic pollution on Santos estuary, the most urbanized area of the coast of São Paulo State, Brazil. A simple and rapid assessment showed that 75% of sampled mussels had ingested microplastics, an issue of human and environmental concern. All sampling points had contaminated mussels and this contamination had no clear pattern of distribution along the estuary. This was the first time that microplastic bioavailability was assessed in nature for the southern hemisphere and that wild P. perna was found contaminated with this pollutant. This is an important issue that should be better assessed due to an increase in seafood consumption and culture in Brazil and worldwide. Copyright © 2016 Elsevier Ltd. All rights reserved.
Survey protocols for assessing coral reef condition were field tested at 61 reef stations in St. Croix, US Virgin Islands (USVI) during 2006. Three observations for stony corals were recorded: species, size, and percent live tissue. Stony corals were selected because they are pri...
Bioassessment in ephemeral rivers: constraints and challenges in applying macroinvertebrate sampling protocols. ... Variable and limited habitats, dominance by generalist taxa and variable flow/no-flow periods impeded the application of SASS and MIRAI (macroinvertebrate response assessment index) to temporary rivers ...
-retrieval web site provides access to bioassessment data. BioData currently accepts data collected using two national protocols: (1) NAWQA and (2) U.S. Environmental Protection Agency (USEPA) National Rivers and Streams Assessment (NRSA). Additional collection protocols are planned for future versions.
An overview is given of the bioassessment of the ecological integrity of river ecosystems using aquatic macroinvertebrates, focussing on the South African situation within a global context. Biotic indices and their use in aquatic bioassessment are covered, and comparative descriptions of the more important and/or widely ...
Full Text Available mill Site 5 Above the Felixton sugar mill Site 6 Uppermost site Seasons (March 1996 ? February 1997) Autumn Winter Spring Summer Code Time Code Time Code Time Code Time (l... 6k 1l 2l 3l 4l 5l 6l Autumn Winter Spring Summer Community data SASS4scores Community data SASS4scores Community data SASS4scores Figure 2 Monthly ordinations generated from presence-absence-transformed family level data and SASS4 scores respectively...
Manoylov, Kalina M
Algal taxonomy is a key discipline in phycology and is critical for algal genetics, physiology, ecology, applied phycology, and particularly bioassessment. Taxonomic identification is the most common analysis and hypothesis-testing endeavor in science. Errors of identification are often related to the inherent problem of small organisms with morphologies that are difficult to distinguish without research-grade microscopes and taxonomic expertise in phycology. Proposed molecular approaches for taxonomic identification from environmental samples promise rapid, potentially inexpensive, and more thorough culture-independent identification of all algal species present in a sample of interest. Molecular identification has been used in biodiversity and conservation, but it also has great potential for applications in bioassessment. Comparisons of morphological and molecular identification of benthic algal communities are improved by the identification of more taxa; however, automated identification technology does not allow for the simultaneous analysis of thousands of samples. Currently, morphological identification is used to verify molecular taxonomic identities, but with the increased number of taxa verified in algal gene libraries, molecular identification will become a universal tool in biological studies. Thus, in this report, successful application of molecular techniques related to algal bioassessment is discussed. © 2014 Phycological Society of America.
Brink, van den P.J.; Alexander, A.; Desrosiers, M.; Goedkoop, W.; Goethals, P.L.M.; Liess, M.; Dyer, S.
We discuss the application of traits-based bioassessment approaches in retrospective bioassessment as well as in prospective ecological risk assessments in regulatory frameworks. Both approaches address the interaction between species and stressors and their consequences at different levels of
Lloyd, G M
Enhanced recovery after surgery (ERAS) programs can accelerate recovery and shorten the hospital stay after colorectal resections. The RAPID (remove, ambulate, postoperative analgesia, introduce diet) protocol is a simplified ERAS program that consists of a simplified, user-friendly single-page pro forma schedule. This study aimed to evaluate the impact of the RAPID protocol on patients undergoing both laparoscopic and open colorectal resections in two specialized colorectal units.
Bioassessment/biomonitoring uses the species found in an ecosystem as a way to measure the health of that ecosystem. Current methods rely mainly on mayflies, stoneflies and caddisflies as indicators for streams and rivers. Odonate larvae are also collected during sampling for bi...
Blanco, Pablo; Aguiar, Francisco Miralles; Blaivas, Michael
Ultrasound assessment of patients in shock is becoming the standard of care in emergency and critical care settings worldwide. One of the most common protocols used for this assessment is the rapid ultrasound in shock (RUSH) examination. The RUSH protocol is a rapid evaluation of cardiac function, key vascular structures, and likely sources of hypotension. Stroke volume is an established important value to assess in the setting of shock, allowing the provider to predict the patient's response to treatment. However, the calculation of stroke volume or its surrogates is not part of any protocol, including RUSH. We propose the addition of ultrasound calculation of stroke volume or surrogates to the RUSH protocol and provide support for its utility and relative ease of calculation. The resulting product would be the RUSH velocity-time integral protocol. © 2015 by the American Institute of Ultrasound in Medicine.
The present investigation aimed at developing rapid micro propagation protocol, which can be used for conservation of Centella asiatica and mass multiplication of a valuable medicinal plant to meet out the pharmaceutical demand and its conservation. Attempts were made to evolve a rapid in vitro technology to conserve, ...
Mar 6, 2013 ... The present investigation aimed at developing rapid micro propagation protocol, which can be used for conservation of Centella asiatica and mass multiplication of a valuable medicinal plant to meet out the pharmaceutical demand and its conservation. Attempts were made to evolve a rapid in vitro ...
Thomas, J.M.; Cline, J.F.; Gano, K.A.; McShane, M.C.; Rogers, J.E.; Rogers, L.E.; Simpson, J.C.; Skalski, J.R.
The overall goal of the plan was to demonstrate that honeybees could be used in detecting likely areas of chemical pollution, to demonstrate the usefulness of microbial and plant phytoassays, and to demonstrate a relationship between laboratory derived phytotoxicity results and field observations of plant community structure and diversity. Field studies were conducted through a cooperative arrangement with the US Army arsenal in Commerce City, Colorado.
The potential collateral effects of eradicating invasive fishes in streams necessitate the monitoring of invertebrate communities during treatment. In an environmental rehabilitation programme, non-native smallmouth bass were removed from the lower reaches of the Rondegat River, Western Cape, South Africa, in 2012 and ...
Brichtová, Eva; Šenkyřík, J
A low radiation burden is essential during diagnostic procedures in pediatric patients due to their high tissue sensitivity. Using MR examination instead of the routinely used CT reduces the radiation exposure and the risk of adverse stochastic effects. Our retrospective study evaluated the possibility of using ultrafast single-shot (SSh) sequences and turbo spin echo (TSE) sequences in rapid MR brain imaging in pediatric patients with hydrocephalus and a programmable ventriculoperitoneal drainage system. SSh sequences seem to be suitable for examining pediatric patients due to the speed of using this technique, but significant susceptibility artifacts due to the programmable drainage valve degrade the image quality. Therefore, a rapid MR examination protocol based on TSE sequences, less sensitive to artifacts due to ferromagnetic components, has been developed. Of 61 pediatric patients who were examined using MR and the SSh sequence protocol, a group of 15 patients with hydrocephalus and a programmable drainage system also underwent TSE sequence MR imaging. The susceptibility artifact volume in both rapid MR protocols was evaluated using a semiautomatic volumetry system. A statistically significant decrease in the susceptibility artifact volume has been demonstrated in TSE sequence imaging in comparison with SSh sequences. Using TSE sequences reduced the influence of artifacts from the programmable valve, and the image quality in all cases was rated as excellent. In all patients, rapid MR examinations were performed without any need for intravenous sedation or general anesthesia. Our study results strongly suggest the superiority of the TSE sequence MR protocol compared to the SSh sequence protocol in pediatric patients with a programmable ventriculoperitoneal drainage system due to a significant reduction of susceptibility artifact volume. Both rapid sequence MR protocols provide quick and satisfactory brain imaging with no ionizing radiation and a reduced need
Hitt, N.P.; Angermeier, P.L.
If organisms move beyond the boundaries of local sampling units, regional metacommunity dynamics could undermine the ability of bioassessment studies to characterize local environmental quality. We tested the prediction that fish dispersal influences local fish community structure and bioassessment metrics as a function of site position within stream networks. We evaluated fish community data from the US Environmental Protection Agency's Regional Environmental Monitoring and Assessment Program in West Virginia, USA, to compare the influences of stream network position, ecoregion, basin, and stream size on local fish community composition. We assigned sites to 1 of 3 stream network positions: 1) main channels (MC, n = 12) encompassed streams with upstream catchment areas >200 km2, 2) mainstem tributaries (MT, n = 43) flowed into MC-sized confluences within 15 fluvial km, 3) headwater tributaries (HT, n = 31) lacked such riverine confluences within 15 fluvial km. MT and HT sites had similar upstream catchment sizes and landuse gradients, but species richness was greater in MT sites than HT sites, whereas MT and MC sites were not different in this regard. Three bioassessment metrics were greater in MT sites than HT sites (intolerant species richness, cyprinid species richness, benthic species richness), but a multimetric index of biotic integrity did not differ among stream network positions. Ordinations revealed that fish community composition was organized primarily by zoogeographic basin (Monongahela River basin, New River basin, Ohio River basin), ecoregion (Central Appalachian Plateau, Western Appalachian Plateau, Ridge and Valley), and stream size. Riverine specialists were more abundant in MT than HT sites and were more abundant in basins connected to the Ohio River than in basins isolated from the Ohio River by a large waterfall (New River). Our results suggest that contemporary dispersal among streams influences fish community composition
Hitt, Nathaniel P; Angermeier, Paul L
Stream fish bioassessment methods assume that fish assemblages observed in sample sites reflect responses to local stressors, but fish assemblages are influenced by local factors as well as regional dispersal to and from connected streams. We hypothesized that fish movement to and from refugia and source populations in connected rivers (i.e., riverine dispersal) would weaken or decouple relations between fish community metrics and local environmental conditions. We compared fish-environment relations between streams that flow into large rivers (mainstem tributaries) and streams that lack riverine confluences (headwater tributaries) at multiple spatial grains using data from the USEPA's Environmental Monitoring and Assessment Program in the mid-Atlantic highlands, USA (n = 157 sites). Headwater and mainstem tributaries were not different in local environmental conditions, but showed important differences in fish metric responses to environmental quality gradients. Stream sites flowing into mainstem channels within 10 fluvial km showed consistently weaker relations to local environmental conditions than stream sites that lacked such mainstem connections. Moreover, these patterns diminished at longer distances from riverine confluences, consistent with the hypothesis of riverine dispersal. Our results suggest that (1) the precision of fish bioassessment metrics may be improved by calibrating scoring criteria based on the spatial position of sites within stream networks and (2) the spatial grain of fish bioassessment studies may be manipulated to suit objectives by including or excluding fishes exhibiting riverine dispersal.
A Simple, Rapid and Efficient One-pot Protocol for the. Synthesis of 2-substituted Benzothiazole Derivatives and their Antimicrobial Screening. Abdul Rauf,a* Saloni Gangal,a Shweta Sharmaa and Maryam Zahinb. aDepartment of Chemistry, Aligarh Muslim University, Aligarh 2002002, India. bDepartment of Agricultural ...
The morphogenic potential of nodal explants of Piper aduncum and Piper hispidinervum (Piperaceae) was investigated and a protocol for rapid micropropagation is described. An experiment based on the saline formulation of Murashige and Skoog (MS) and Wood Plant medium (WPM) combined with different ...
Abbaszadegan, Mohammad Reza; Velayati, Arash; Tavasoli, Alireza; Dadkhah, Ezzat
Colorectal cancer (CRC) is one of the most common forms of cancers in the world and is curable if diagnosed at the early stage. Analysis of DNA extracted from stool specimens is a recent advantage to cancer diagnostics. Many protocols have been recommended for DNA extraction from stool, and almost all of them are difficult and time consuming, dealing with high amount of toxic materials like phenol. Their results vary due to sample collection method and further purification treatment. In this study, an easy and rapid method was optimized for isolating the human DNA with reduced PCR inhibitors present in stool. Fecal samples were collected from 10 colonoscopy-negative adult volunteers and 10 patients with CRC. Stool (1 g) was extracted using phenol/chloroform based protocol. The amplification of P53 exon 9 was examined to evaluate the extraction efficiency for human genomic targets and also compared its efficiency with Machiels et al. and Ito et al. protocols. The amplification of exon 9 of P53 from isolated fecal DNA was possible in most cases in 35 rounds of PCR using no additional purification procedure for elimination of the remaining inhibitors.inhibitors. A useful, rapid and easy protocol for routine extraction of DNA from stool was introduced and compared with two previous protocols.
Cherpelis, Basil S; Moore, Richard; Ladd, Sharron; Chen, Ren; Glass, L Frank
The use of melanoma-associated antigen recognized by T cells (MART-1) immunostain has been proposed as a useful adjunct to overcome the inherent difficulties in the use of frozen sections during Mohs surgery for the treatment of melanoma, but no studies have compared MART-1 frozen sections with MART-1 permanent sections. Current MART-1 1-hour protocols add significant time to the procedure. To determine whether there is a significant difference between frozen and permanent MART-1 immunostained sections using a rapid 19-minute protocol. Frozen and permanent sections stained with MART-1 were made from dog-ears excised during 25 reconstructions. A rapid 19-minute protocol was used to stain the frozen tissue. The sections were examined blinded, and statistical analysis was performed to analyze the data. No significant difference was found in number of keratinocytes, nuclear diameter of keratinocytes, number of melanocytes, melanocytic nuclear diameter, confluence, pagetoid spread, melanocytic nesting, or atypical melanocytes. The 19-minute protocol is a rapid and effective MART-1 immunostain. Frozen sections stained with MART-1 provide information equivalent to that obtained from MART-1 stained permanent sections. Mohs surgeons using MART-1 can feel confident that they have the same information as they would have obtained using permanent sections using the slow Mohs method.
Rodman, Ashley R; Scott, J Thad
Periphyton is an important component of stream bioassessment, yet methods for quantifying periphyton biomass can differ substantially. A case study within the Arkansas Ozarks is presented to demonstrate the potential for linking chlorophyll-a (chl-a) and ash-free dry mass (AFDM) data sets amassed using two frequently used periphyton sampling protocols. Method A involved collecting periphyton from a known area on the top surface of variably sized rocks gathered from relatively swift-velocity riffles without discerning canopy cover. Method B involved collecting periphyton from the entire top surface of cobbles systematically gathered from riffle-run habitat where canopy cover was intentionally avoided. Chl-a and AFDM measurements were not different between methods (p = 0.123 and p = 0.550, respectively), and there was no interaction between method and time in the repeated measures structure of the study. However, significantly different seasonal distinctions were observed for chl-a and AFDM from all streams when data from the methods were combined (p methods may effectively be used together with some minor considerations due to potential confounding factors. This study provides motivation for the continued investigation of combining data sets derived from multiple methods of data collection, which could be useful in stream bioassessment and particularly important for the development of regional stream nutrient criteria for the southern Ozarks.
Nieto, Sonia; Dragna, Justin M.; Anslyn, Eric V.
A protocol for the rapid determination of the absolute configuration and enantiomeric excess of α-chiral primary amines with potential applications in asymmetric reaction discovery has been developed. The protocol requires derivatization of α-chiral primary amines via condensation with pyridine carboxaldehyde to quantitatively yield the corresponding imine. The Cu(I) complex with 2,2'-bis (diphenylphosphino)-1,1'-dinaphthyl (BINAP -CuI) with the imine yields a metal-to-ligand-charge-transfer band (MLCT) in the visible region of the circular dichroism spectrum upon binding. Diastereomeric host-guest complexes give CD signals of the same signs, but different amplitudes, allowing for differentiation of enantiomers. Processing the primary optical data from the CD spectrum with linear discriminant analysis (LDA) allows for the determination of absolute configuration and identification of the amines, and processing with a supervised multi-layer perceptron artifical neural network (MLP-ANN) allows for the simultaneous determination of ee and concentration. The primary optical data necessary to determine the ee of unknown samples is obtained in 2 minutes per sample. To demonstrate the utility of the protocol in asymmetric reaction discovery, the ee's and concentrations for an asymmetric metal catalyzed reaction are determined. The potential of the protocol's application in high-throughput screening (HTS) of ee is discussed. PMID:19946914
DNA barcoding holds promise for helping to address several challenges associated with taxonomic based bioassessments; these include the time and effort necessary to identify hundreds of specimens per sample location, incomplete or unavailable local taxonomy that limits the abili...
DNA barcoding has the capability to uncover cryptic diversity otherwise undetectable using morphology alone. For aquatic bioassessment, this opportunity to discover hidden biodiversity presents new data for incorporation into environmental monitoring programs. Unfortunately, the ...
Beran, David; Yudkin, John S; de Courten, Maximilian
In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol for th...
Madsen, F; Nielsen, N H; Holstein-Rathlou, N H
A rapid method for determination of non-specific bronchial hyperreactivity was developed. Resistance to breathing was determined by a modified expiratory airway interrupter technique and combined with a dosimeter-controlled nebulizer which made continuous determination of response possible during...... well to a non-cumulative standard protocol and could be terminated either within 10 min or within 20 inhalations. The results of this new challenge procedure enables us to predict the responsiveness to inhaled histamine precisely enough to separate patients into hyperreactive or normal reactive...
Keith M. SOMERS
Full Text Available Emissions of sulphur oxides, nitrogen oxides and other pollutants have increased in the Athabasca Oil Sands Region (AOSR in Alberta, Canada. Atmospheric pollutants impact aquatic communities through a number of processes, but due to a lack of regional monitoring programs potential biological impacts have not been assessed. In this study, a bioassessment was conducted using approaches borrowed from a variety of protocols to establish a baseline dataset, determine appropriate methodologies, and to assess the current impact of emissions on benthic macroinvertebrate (BMI communities in the AOSR. As a result, 32 lakes, including 5 test lakes located in a modelled high deposition region, were sampled for water chemistry and BMI. The Reference Condition Approach (RCA was used because a baseline dataset does not exist and data were evaluated using three separate statistical techniques. All of the statistical methods used: One Sample T-Tests, Multivariate Analysis of Variance (MANOVA and Test Site Analysis (TSA, showed that BMI assemblages in test lakes differed from BMI assemblages in reference lakes. Traditional statistics classified all 5 test lakes as "significantly impaired" whereas TSA identified 3 of the 5 test lakes as only potentially impaired and 2 lakes were in "reference condition". The variability in lake attributes present challenges in interpreting BMI data and establishing an accurate biomonitoring program in the AOSR which need to be addressed in future assessment studies.
Allen, Emily; Jackson, Debra; Elliott, Doug
To describe the development of a proposed case study protocol investigating interprofessional relationships in a rapid response system (RRS) in a socioculturally complex clinical environment. Suboptimal care of deteriorating ward patients remains a concern for many acute healthcare organisations. Despite the advent of RRSs, emergency response teams are not always used to their full potential. How and why interprofessional relationships influence practices associated with the care and management of ward patients at risk of clinical deterioration requires investigation. Theoretical and empirical literature describing case study research and RRSs. Review methods An integrative review approach of the literature, focusing on key terms relating to 'case study research' and 'rapid response system', provided context and informed development of the study protocol. A single-site mixed-method instrumental case study protocol was developed using methodological triangulation and a multi-level model to examine interprofessional relationships between a broad range of stakeholders. Concurrent data collection and analysis will occur using document review of clinical scenarios, non-participant observations and semi-structured interviews. Case study research is an effective method for investigating socioculturally complex clinical environments. A strength of this approach is the flexibility in the choice of methods, which allows the researcher to build the design most suitable for the subjects or phenomena being investigated. Although this flexibility may be considered a potential weakness, rigour can be achieved by application of the strategies described. Findings from this research will provide rich descriptive insights into RRS relationships and healthcare professional practices during day-to-day management of acute ward patients at risk of or experiencing clinical deterioration. Description of this structured case study research approach will also inform other researchers.
Thomas E. Lisle; John M. Buffington; Peter R. Wilcock; Kristin Bunte
Land management agencies commonly use rapid assessments to evaluate the impairment of gravel-bed streams by sediment inputs from anthropogenic sources. We question whether rapid assessment can be used to reliably judge sediment impairment at a site or in a region. Beyond the challenges of repeatable and accurate sampling, we argue that a single metric or protocol is...
Xu, Guangjian; Zhong, Xiaoxiao; Wang, Yangfan; Warren, Alan; Xu, Henglong
The functional parameters, i.e., the estimated equilibrium species number (S eq), the colonization rate constant, and the time taken to reach 90 % of S eq (T 90), of microperiphyton fauna have been widely used to determine the water quality status in aquatic ecosystems. The objective of this investigation was to develop a protocol for determining functional parameters of microperiphyton fauna in colonization surveys for marine bioassessment based on rarefaction and regression analyses. The temporal dynamics in species richness of microperiphyton fauna during the colonization period was analyzed based on a dataset of periphytic ciliates in Chinese coastal waters of the Yellow Sea. The results showed that (1) based on observed species richness and estimated maximum species numbers, a total of 16 glass slides were required in order to achieve coefficients of variation of <5 % in the functional parameters; (2) the rarefied average species richness and functional parameters showed weak sensitivity to sampling effort; (3) the temporal variations in average species richness were well-fitted to the MacArthur-Wilson model; and (4) the sampling effort of ~8 glass slides was sufficient to achieve coefficients of variation of <5 % in equilibrium average species number (AvS eq), colonization rate (AvG), and the time to reach 90 % of AvS eq (AvT 90) based on the average species richness. The findings suggest that the AvS eq, AvG, and AvT 90 values based on rarefied average species richness of microperiphyton might be used as reliable ecological indicators for the bioassessment of marine water quality in coastal habitats.
Mikulyuk, Alison; Barton, Martha; Hauxwell, Jennifer; Hein, Catherine; Kujawa, Ellen; Minahan, Kristi; Nault, Michelle E; Oele, Daniel L; Wagner, Kelly I
Bioassessment methods are critically needed to evaluate and monitor lake ecological condition. Aquatic macrophytes are good candidate indicators, but few lake bioassessment methods developed in North America use them. The few macrophyte bioassessment methods that do exist suffer from problems related to subjectivity and discernibility along disturbance gradients. We developed and tested a bioassessment approach for 462 north temperate lakes. The approach links macrophyte abundance to lake ecological condition via estimates of taxon-specific abundance-weighted tolerance to anthropogenic disturbance. Using variables related to eutrophication, urban development and agriculture, we calculated abundance-weighted tolerance ranges for 59 macrophyte taxa and clustered them according to their tolerance to anthropogenic disturbance. We also created a composite index of anthropogenic disturbance using 20 variables related to population density, land cover and water chemistry. We used a statistical approach to set ecological condition thresholds based on the observed abundance of sensitive, moderately tolerant and tolerant taxa in each lake. The resulting lake condition categories were usually stable across multiple survey events and largely agreed with condition rankings assigned using expert judgment. We suggest using this macrophyte bioassessment method for federal water quality reports, restoration and management on north temperate lakes. Copyright © 2017 Elsevier Ltd. All rights reserved.
Christiansen, Elisabeth; Due-Hansen, Maria E; Ulven, Trond
A protocol for rapid and efficient Pd/Cu-catalyzed coupling of aryl bromides and iodides to terminal alkynes has been developed with use of 2-(di-tert-butylphosphino)-N-phenylindole (cataCXium PIntB) as ligand in TMEDA and water. The new protocol successfully couples substrates which failed with ...... with standard Sonogashira conditions, and enables an efficient general synthetic route to free fatty acid 1 (FFA1) receptor ligands from 3-(4-bromophenyl)propionic acid....
Arora, Swati; Marcus, Richard J; Dikkala, Sudharani; Sureshkumar, Kalathil K
Rapid steroid discontinuation immunosuppressive protocols are increasingly used in renal transplant. The optimal immunosuppressive regimen in patients who develop acute rejection while on a rapid steroid discontinuation protocol is less clear. We examined our experience of adding maintenance steroid therapy in renal transplant recipients who developed 1 or more acute rejection episode while on a rapid steroid discontinuation protocol. The outcome of 145 patients who underwent renal transplant from 2002 to 2007 and initiated a rapid steroid discontinuation protocol was analyzed. Patients were divided into the following 5 groups: (i): acute rejection X 1 and no maintenance steroids, (ii): acute rejection X 1 and started on maintenance steroids, (iii): acute rejection X 2 and no maintenance steroids (iv): acute rejection X 2 and started on maintenance steroids, and (v): no acute rejection Compared with patients with no acute rejection, graft survival was significantly inferior in patients who experienced 2 or more acute rejection episodes-whether they were started on maintenance steroids (P = .003) or not (P = .006) - but was similar in patients who experienced only 1 episode of acute rejection, and were started either on maintenance steroids (P = .87) or were continued on the rapid steroid discontinuation protocol (P = .69). In patients who sustained 2 episodes of acute rejection, addition of maintenance steroids had no impact on graft survival (P = .97). More than 1 episode of acute rejection in renal transplant recipients on rapid steroid discontinuation protocol is associated with poor, long-term, graft survival, which remains unchanged despite starting maintenance steroids. The use of maintenance steroids may not have a positive impact on graft survival after acute rejection.
Full Text Available The present study aimed to adapt a rapid river assessment protocols (RAP to be used by elementary school children. The study was conducted in Ipameri, GO and the RAP was adapted for the evaluation of streams in the Cerrado biome. Based on two protocol models, the developed RAP included: physical parameters that affect the functioning of streams, language adapted to the educational level of elementary school and the presence of drawings that could facilitate the field application of RAP by the students. For consolidation of the adapted instrument, it was offered a monitoring workshop to 95 students from two public education institutions, and developed an analysis and interpretation of the pattern of responses obtained during the practical step of the workshop. The Bartlett and Levene tests revealed no statistical differences between the response patterns of the students, allowing to infer that the developed RAP was understandable by the evaluators. The application of the RAP was fast (20 to 40 minutes and the students reported that the developed instrument helped them to familiarize with environmental issues. In addition, the monitoring workshop helped them to understand the instrument and the available illustrations facilitated the field evaluation. In addition, the students concluded that they have become aware of the issues related to the water resource preservation and also that participation in the environmental monitoring workshop allowed the appropriation of knowledge about the river system functioning. It was concluded that adapted RAP has been proved to be a useful and interesting tool for using in environmental education projects and programs.
Full Text Available The most fungal DNA isolation protocols are designed to obtain high amounts of very pure DNA, requiring large fungal cultures and extraction procedures with many purification steps. Since the PCR does not require high purity DNA, the aim of this investigation was to evaluate three fast and simple fungal DNA isolation protocols for further use in Cercospora PCR based research. The purity and quantity of isolated DNAs were determined spectrophotometrically, electrophoretically and by PCR reaction with universal primers. The amounts of DNA evaluated on agarose gels, isolated by protocols A and C, did not correspond to the spectrophotometrical values, probably due to RNA impurities. In samples isolated by protocol B these impurities were not detected and the DNA concentrations were more similar. Neither protocol eliminated impurities such as carbohydrates and phenol. The average DNA yield of protocol A was 1.04 μg/μl, protocol B 0.88 μg/μl, and protocol C 0.55 μg/μl. The DNA quality most suitable for PCR analysis was obtained by protocol A, where amplification product with universal primers was detected in all DNA samples. The amplification product was detected in 87% of samples isolated by protocol C and in only 60% of samples isolated by protocol B. Although DNA obtained by protocol A had the highest yield and best quality, the isolation protocol C should be also recommended, for it does not require phenol, chlorophorm or liquid nitrogen.
Full Text Available Currently orangutans are found in widely fragmented and isolated populations. Sumatran orangutan is primarily found in northern Sumatra, and the Bornean orangutans is distributed in Central, West, and East Kalimantan, Sarawak and Sabah. The determination of intra- and inter-species variation between Bornean and Sumatran orangutans is been stated to be essential for both the management of orangutan reintroduction projects and the planning of conservation strategies to preserve the remaining wild populations. This study aimed to identify two species of Orangutans (Pongo sp. by means of RFLP (Restriction Fragment Length Polymorphisms analyses of mitochondrial DNA (mtDNA. An approximately 540 bp single fragment of the ND5 gene near the 5'-region was PCR amplified for all samples tested. Digestion pattern for both AluI and MseI were different between two groups of ND5 fragments in this study. Present result showed a rapid protocol to identify these two species by means of RFLP (Restriction Fragment Length Polymorphism analyses of mtDNA (mitochondrial DNA. This technique can be applied easily to rehabilitation centres and zoos to resolve species discrimination problem.
Di Maio, Antonietta; De Castro, Olga
We have optimized a version of a microsatellite loci isolation protocol for first-generation sequencing (FGS) technologies. The protocol is optimized to reduce the cost and number of steps, and it combines some procedures from previous simple sequence repeat (SSR) protocols with several key improvements that significantly affect the final yield of the SSR library. This protocol may be accessible for laboratories with a moderate budget or for which next-generation sequencing (NGS) is not readily available. • We drew from classic protocols for library enrichment by digestion, ligation, amplification, hybridization, cloning, and sequencing. Three different systems were chosen: two with very different genome sizes (Galdieria sulphuraria, 10 Mbp; Pancratium maritimum, 30 000 Mbp), and a third with an undetermined genome size (Kochia saxicola). Moreover, we also report the optimization of the sequencing reagents. A good frequency of the obtained microsatellite loci was achieved. • The method presented here is very detailed; comparative tests with other SSR protocols are also reported. This optimized protocol is a promising tool for low-cost genetic studies and the rapid, simple construction of homemade SSR libraries for small and large genomes.
... advance the development of specific strategies to ensure the effectiveness of monitoring and management... identified in the ``National Water Program Strategy: A Response to Climate Change'' (U.S. EPA, 2008; http... AGENCY Implications of Climate Change for Bioassessment Programs and Approaches To Account for Effects...
de Courten Maximilian
Full Text Available Abstract Background In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol for the gathering of other data through site visits, discussions, and document reviews. Methods The Rapid Assessment Protocol for Insulin Access draws on the principles of Rapid Assessment Protocols which have been developed and implemented in several different areas. This protocol was adapted through a thorough literature review on diabetes, chronic condition management and medicine supply in developing countries. A visit to three countries in sub-Saharan Africa and meetings with different experts in the field of diabetes helped refine the questionnaires. Following the development of the questionnaires these were tested with various people familiar with diabetes and/or healthcare in developing countries. The Protocol was piloted in Mozambique then refined and had two further iterations in Zambia and Mali. Translations of questionnaires were made into local languages when necessary, with back translation to ensure precision. Results In each country the protocol was implemented in 3 areas – the capital city, a large urban centre and a predominantly rural area and their respective surroundings. Interviews were carried out by local teams trained on how to use the tool. Data was then collected and entered into a database for analysis. Conclusion The Rapid Assessment Protocol for Insulin Access was developed to provide a situational analysis of Type 1 diabetes, in order to make recommendations to the national Ministries of Health and Diabetes Associations. It provided valuable information on patients' access to insulin, syringes, monitoring and care. It was thus able to sketch a picture of the health care system with regards to its ability to
Charles R. Haddad
Full Text Available As part of the second phase of the South African National Survey of Arachnida (SANSA, field surveys were conducted in many degree-square grids throughout the country using a standardised rapid sampling protocol. This study reports on the arachnid diversity of the Ophathe Game Reserve (OGR in northern KwaZulu-Natal, as found during a preliminary survey in June 2007 (mid winter and a SANSA field survey in October 2008 (mid spring in four representative habitats. The SANSA survey included seven sampling methods: pitfalls, beating, sweep-netting, litter sifting, hand collecting, night collecting and Winkler traps. A total of 282 species in six arachnid orders were collected during the two surveys, of which spiders were the most species-rich order (268 species in 47 families. The SANSA survey yielded 966 adult arachnids, representing six orders and 197 species, with a further 67 species represented only by immatures. Although adult arachnid abundance (n differed considerably between the four habitats (range: 156–321, adult species richness (Sobs was less variable (range: 65–85. These survey results are comparable with several longer-term surveys in the Savanna biome, and indicate that the SANSA sampling protocol can yield an impressive diversity of arachnids during a relatively short period of sampling, with a high level of coverage (> 0.8 for sites and most sampling methods and moderate levels of sample completion for adults (> 0.55 for all sites, despite logistical and temporal challenges. Additional repetitions of the SANSA sampling protocol in other seasons will likely increase biodiversity knowledge of arachnids in OGR considerably.Conservation implications: The implementation of rapid sampling protocols in an atlas project is essential to generate a large volume of species-level data. The SANSA protocol is an efficient means for rapidly generating arachnid data, and in future will allow for an assessment of diversity patterns in degree
Hiner, Stephen W.
Bioassessment is the concept of evaluating the ecological condition of habitats by surveying the resident assemblages of living organisms. Conducting bioassessment with benthic macroinvertebrates is still evolving and continues to be refined. There are strongly divided opinions about study design, sampling methods, laboratory analyses, and data analysis. Two issues that are currently being debated about study design for bioassessment in streams were examined here: 1) what habitats within stre...
The assessment of biota in rivers is a widely recognised means of determining the condition or `health' of rivers. Benthic macroinvertebrates, in particular, are recognised as valuable organisms for bioassessments, due largely to their visibility to the naked eye, ease of identification, rapid life cycle often based on the seasons ...
Sobo, Elisa J; Billman, Glenn; Lim, Lillian; Murdock, J Wilken; Romero, Elvia; Donoghue, Donna; Roberts, William; Kurtin, Paul S
The Institute of Medicine's 2001 report on quality delimits six dimensions of optimal care: safety, effectiveness, efficiency, timeliness, patient centeredness, and equity. In fall 2001 parents of pediatric cancer patients were interviewed to determine how well they thought these dimensions were addressed with respect to medication administration. Immediate goals were to identify system weaknesses and devise strategies to prevent future errors. A higher-order goal was to develop and demonstrate a model protocol for rapid-cycle interview assessments. Hematology/oncology directors worked with a research expert to develop a semistructured interview protocol. After training, which included directed reading, oral instruction, and role-playing, a convenience sample of 20 English- and Spanish-speaking parents of inpatients was recruited. Parents were asked to characterize current medication administration practices and to describe problems that they had experienced or witnessed. Rapid content analysis techniques were used to identify issues of importance to the parents. Parents' medication concerns centered on their children's comfort. Parents called for communication improvements, standardization of all nursing procedures and techniques, and a guide or an outline providing a clear understanding of what to expect when and from whom. Viewing these concerns in relation to the Institute of Medicine's quality domains allowed the department to frame an improvement action plan aligned with organizational and national priorities. With good supervision and limited focused training, inexperienced staff can successfully administer semistructured qualitative interviews and help analyze findings for rapid cycle improvement purposes. The protocol can be adapted for use in organizations interested in rapid qualitative assessments of patient and parent preferences.
Wijma, Hein J; Fürst, Maximilian J L J; Janssen, Dick B
The ability to stabilize enzymes and other proteins has wide-ranging applications. Most protocols for enhancing enzyme stability require multiple rounds of high-throughput screening of mutant libraries and provide only modest improvements of stability. Here, we describe a computational library design protocol that can increase enzyme stability by 20-35 °C with little experimental screening, typically fewer than 200 variants. This protocol, termed FRESCO, scans the entire protein structure to identify stabilizing disulfide bonds and point mutations, explores their effect by molecular dynamics simulations, and provides mutant libraries with variants that have a good chance (>10%) to exhibit enhanced stability. After experimental verification, the most effective mutations are combined to produce highly robust enzymes.
Liwski, Robert S; Greenshields, Anna L; Murphey, Cathi; Bray, Robert A; Gebel, Howard M
The LABScreen single antigen bead assay (SAB) is a method widely used for the identification and monitoring of human leukocyte antigen (HLA) antibodies in patients pre-and post-transplant. While accurate testing of patient samples is key for optimal patient care, time can also be important, especially during deceased donor workups or post-transplant assessments. Here we describe the development and validation of the Rapid Optimized SAB (ROB) protocol, a modified version of the One Lambda LABScreen SAB (OLSAB) procedure, which reduces assay time from 85 to 25min (>70% reduction) without impacting assay quality or sensitivity. Optimization steps included shortened centrifugation cycles and reduced serum and secondary antibody incubation times in combination with increased secondary antibody concentration. Linear regression analysis of baseline median fluorescence intensity (MFI) values showed excellent correlation between the ROB and OLSAB protocols (r(2)>0.98) for both class I and class II antibodies in 58 sera tested in two HLA laboratories. Importantly, the ROB protocol demonstrated a trend towards improved inter-laboratory MFI concordance when compared to the OLSAB procedure (r(2)=0.9816 vs 0.9451), especially for HLA antibody specificities in the 500-2000 MFI range (r(2)=0.7824 vs 0.6313). Implementation of the ROB protocol will expedite HLA antibody testing and may improve reproducibility of the SAB assay. Copyright © 2017 American Society for Histocompatibility and Immunogenetics. Published by Elsevier Inc. All rights reserved.
Wijma, Hein; Fürst, Maximilian; Janssen, Dick; Clifton, N.J.
The ability to stabilize enzymes and other proteins has wide-ranging applications. Most protocols for enhancing enzyme stability require multiple rounds of high-throughput screening of mutant libraries and provide only modest improvements of stability. Here, we describe a computational library
Nov 6, 2012 ... a protocol which can be used for the clonal multiplication of this plant species using nodal segments as explants and followed by the optimized conditions for in vitro rooting and further transfer into the greenhouse. To our knowledge, there are no reports on the micropropagation of these plant species.
Pandey, Lalit K; Bergey, Elizabeth A; Lyu, Jie; Park, Jihae; Choi, Soyeon; Lee, Hojun; Depuydt, Stephen; Oh, Young-Tae; Lee, Sung-Mo; Han, Taejun
Diatoms are regularly used for bioassessment and ecotoxicological studies in relation to environmental and anthropogenic disturbances. Traditional taxonomical diatom parameters (cell counts, biovolume estimates, species richness, diversity indices and metrics using sensitive and tolerant diatom species) are regularly used for these studies. In the same context, very less focus was given on new endpoints of diatoms (life-forms, nuclear anomalies, alteration in photosynthetic apparatus shape, motility, lipid bodies, size reduction and deformities), in spite of their numerous merits, such as, their easiness, quickness, cheapness, global acceptation and no especial training in diatom taxonomy. In this review we analyzed 202 articles (from lab and field studies), with the aim to investigate the bioassessment and ecotoxicological advancement taken place in diatom research especially in terms of exploring new endpoints along with the traditional taxonomical parameters in a perspective which can greatly enhance the evaluation of fluvial ecosystem quality for biomonitoring practices. Copyright © 2017 Elsevier Ltd. All rights reserved.
Li, Li; Liu, Lusan; Hughes, Robert M; Cao, Yong; Wang, Xing
Standard protocols are critical for maximizing data comparability and aggregation in national monitoring programs, and taxa richness is a common indicator of site condition and biological diversity. There are two general approaches for sampling stream macroinvertebrate assemblages: targeted richest habitat and site wide. At seven sites, we compared three methods: Ontario Benthic Biomonitoring Network (OBBN), Environmental Monitoring and Assessment Program (EMAP), and Rapid Bioassessment Protocol (RBP). The OBBN method produced a biased sample at a site with a single small riffle, the RBP method produced the most total taxa, and the EMAP method produced the most taxa at four sites and the most individuals at six sites. The RBP method produced asymptotes for percent tolerant individuals, percent chironomid individuals, and Hilsenhoff Biotic Index score after five to ten stations. The EMAP method produced asymptotes for those metrics after 10 to 20 stations per site. The EMAP method typically required half the number of stations as the RBP method to obtain 70-90% of true taxa richness as estimated by the Jaccard coefficient. We conclude that the EMAP method is preferable because of its greater precision in taxa richness estimates.
Liu, Yong-Hua; Offler, Christina E; Ruan, Yong-Ling
Hydrogen peroxide (H2O2) is a major reactive oxygen species (ROS) and plays diverse roles in plant development and stress responses. However, its localization in large and thick plant organs (e.g., stem, roots, and fruits), other than leaves, has proven to be challenging due to the difficulties for the commonly used H2O2-specific chemicals, such as 3,3'-diaminobenzidine (DAB), cerium chloride (CeCl3), and 2',7'-dichlorofluorescin diacetate (H2DCF-DA), to penetrate those organs. Theoretically, the reaction of endogenous H2O2 with these chemicals could be facilitated by using thin organ sections. However, the rapid production of wound-induced H2O2 associated with this procedure inevitably disturbs the original distribution of H2O2 in vivo. Here, by employing tomato seedling stems and fruits as testing materials, we report a novel, simple, and rapid protocol to localize H2O2 in those organs using DAB-mediated tissue printing. The rapidity of the protocol (within 15 s) completely avoided the interference of wound-induced H2O2 during experimentation. Moreover, the H2O2 signal on the printing was stable for at least 1 h with no or little background produced. We conclude that DAB-mediated tissue printing developed here provide a new feasible and reliable method to localize H2O2 in large plant organs, hence should have broad applications in studying ROS biology.
Moore, Isabel Eleanor; Murphy, Kevin Joseph
Aim: The study aimed to determine the effectiveness of benthic macroinvertebrate dredge net sampling procedures as an alternative method to kick net sampling in tropical freshwater systems, specifically as an evaluation of sampling methods used in the Zambian Invertebrate Scoring System (ZISS) river bioassessment scheme. Tropical freshwater ecosystems are sometimes dangerous or inaccessible to sampling teams using traditional kick-sampling methods, so identifying an alternative procedure that...
Gallaher, Sean D.; Berk, Arnold J.
Adenoviruses are employed in the study of cellular processes and as expression vectors used in gene therapy. The success and reproducibility of these studies is dependent in part on having accurate and meaningful titers of replication competent and helper-dependent adenovirus stocks, which is problematic due to the use of varied and divergent titration protocols. Physical titration methods, which quantify the total number of viral particles, are used by many, but are poor at estimating activity. Biological titration methods, such as plaque assays, are more biologically relevant, but are time consuming and not applicable to helper-dependent gene therapy vectors. To address this, a protocol was developed called “infectious genome titration” in which viral DNA is isolated from the nuclei of cells ~3 h post-infection, and then quantified by Q-PCR. This approach ensures that only biologically active virions are counted as part of the titer determination. This approach is rapid, robust, sensitive, reproducible, and applicable to all forms of adenovirus. Unlike other Q-PCR-based methods, titers determined by this protocol are well correlated with biological activity. PMID:23624118
Full Text Available Abstract Research in plant molecular biology involves DNA purification on a daily basis. Although different commercial kits enable convenient extraction of high-quality DNA from E. coli cells, PCR and agarose gel samples as well as plant tissues, each kit is designed for a particular type of DNA extraction work, and the cost of purchasing these kits over a long run can be considerable. Furthermore, a simple method for the isolation of binary plasmid from Agrobacterium tumefaciens cells with satisfactory yield is lacking. Here we describe an easy protocol using homemade silicon dioxide matrix and seven simple solutions for DNA extraction from E. coli and A. tumefaciens cells, PCR and restriction digests, agarose gel slices, and plant tissues. Compared with the commercial kits, this protocol allows rapid DNA purification from diverse sources with comparable yield and purity at negligible cost. Following this protocol, we have demonstrated: (1 DNA fragments as small as a MYC-epitope tag coding sequence can be successfully recovered from an agarose gel slice; (2 Miniprep DNA from E. coli can be eluted with as little as 5 μl water, leading to high DNA concentrations (>1 μg/μl for efficient biolistic bombardment of Arabidopsis seedlings, polyethylene glycol (PEG-mediated Arabidopsis protoplast transfection and maize protoplast electroporation; (3 Binary plasmid DNA prepared from A. tumefaciens is suitable for verification by restriction analysis without the need for large scale propagation; (4 High-quality genomic DNA is readily isolated from several plant species including Arabidopsis, tobacco and maize. Thus, the silicon dioxide matrix-based DNA purification protocol offers an easy, efficient and economical way to extract DNA for various purposes in plant research.
Full Text Available Hydrogen peroxide (H2O2 is a major reactive oxygen species (ROS and plays diverse roles in plant development and stress responses. However, its localization in large and thick plant organs (e.g. stem, roots and fruits, other than leaves, has proven to be challenging due to the difficulties for the commonly used H2O2-specific chemicals, such as 3, 3’-diaminobenzidine (DAB, cerium chloride (CeCl3 and 2’, 7’-dichlorofluorescin diacetate (H2DCF-DA, to penetrate those organs. Theoretically, the reaction of endogenous H2O2 with these chemicals could be facilitated by using thin organ sections. However, the rapid production of wound-induced H2O2 associated with this procedure inevitably disturbs the original distribution of H2O2 in vivo. Here, by employing tomato seedling stems and fruits as testing materials, we report a novel, simple and rapid protocol to localize H2O2 in those organs using DAB-mediated tissue printing. The rapidity of the protocol (within 15 s completely avoided the interference of wound-induced H2O2 during experimentation. Moreover, the H2O2 signal on the printing was stable for at least 1 h with no or little background produced. We conclude that DAB-mediated tissue printing developed here provide a new feasible and reliable method to localize H2O2 in large plant organs, hence should have broad applications in studying ROS biology.
Hawkins, Steve F C; Guest, Paul C
The emergence of next-generation sequencing (NGS) over the last 10 years has increased the efficiency of DNA sequencing in terms of speed, ease, and price. However, the exact quantification of a NGS library is crucial in order to obtain good data on sequencing platforms developed by the current market leader Illumina. Different approaches for DNA quantification are available currently and the most commonly used are based on analysis of the physical properties of the DNA through spectrophotometric or fluorometric methods. Although these methods are technically simple, they do not allow exact quantification as can be achieved using a real-time quantitative PCR (qPCR) approach. A qPCR protocol for DNA quantification with applications in NGS library preparation studies is presented here. This can be applied in various fields of study such as medical disorders resulting from nutritional programming disturbances.
Vallurupalli, Srikanth; Kasula, Srikanth; Kumar Agarwal, Shiv; Pothineni, Naga Venkata K; Abualsuod, Amjad; Hakeem, Abdul; Ahmed, Zubair; Uretsky, Barry F
High-pressure inflation for coronary stent deployment is universally performed. However, the duration of inflation is variable and does not take into account differences in lesion compliance. We developed a standardized "pressure optimization protocol" (POP) using inflation pressure stability rather than an arbitrary inflation time or angiographic balloon appearance for stent deployment. Whether this approach improves long-term outcomes is unknown. 792 patients who underwent PCI using either rapid inflation/deflation (n = 376) or POP (n = 416) between January 2009 and March 2014 were included. Exclusion criteria included PCI for acute myocardial infarction, in-stent restenosis, chronic total occlusion, left main, and saphenous vein graft lesions. Primary endpoint was target vessel failure [TVF = combined end point of target vessel revascularization (TVR), myocardial infarction, and cardiac death]. Outcomes were analyzed in the entire cohort and in a propensity analysis. Stent implantation using POP with a median follow-up of 1317 days was associated with lower TVF compared with rapid inflation/deflation (10.1 vs. 17.8%, P inflation/deflation (10 vs. 18%, P < 0.0001). Stent deployment using POP led to reduced TVF compared to rapid I/D. These results recommend this method to improve long-term outcomes. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.
The Clean Water Act directs states to protect water resources by developing criteria based in part on biological assessments of natural aquatic ecosystems. Current protocols can be limited by the availability of taxonomic expertise and concerns about precision and accuracy in mor...
Hughes, Laura; Wilkins, Kimberly; Goldsmith, Cynthia S; Smith, Scott; Hudson, Paul; Patel, Nishi; Karem, Kevin; Damon, Inger; Li, Yu; Olson, Victoria A; Satheshkumar, P S
Virus purification in a high-containment setting provides unique challenges due to barrier precautions and operational safety approaches that are not necessary in lower biosafety level (BSL) 2 environments. The need for high risk group pathogen diagnostic assay development, anti-viral research, pathogenesis and vaccine efficacy research necessitates work in BSL-3 and BSL-4 labs with infectious agents. When this work is performed in accordance with BSL-4 practices, modifications are often required in standard protocols. Classical virus purification techniques are difficult to execute in a BSL-3 or BSL-4 laboratory because of the work practices used in these environments. Orthopoxviruses are a family of viruses that, in some cases, requires work in a high-containment laboratory and due to size do not lend themselves to simpler purification methods. Current CDC purification techniques of orthopoxviruses uses 1,1,2-trichlorotrifluoroethane, commonly known as Genetron®. Genetron® is a chlorofluorocarbon (CFC) that has been shown to be detrimental to the ozone and has been phased out and the limited amount of product makes it no longer a feasible option for poxvirus purification purposes. Here we demonstrate a new Orthopoxvirus purification method that is suitable for high-containment laboratories and produces virus that is not only comparable to previous purification methods, but improves on purity and yield. Published by Elsevier B.V.
Pithon, Matheus Melo; Santos, Nathalia de Lima; Santos, Camila Rangel Barreto Dos; Baião, Felipe Carvalho Souza; Pinheiro, Murilo Costa Rangel; Matos, Manoel; Souza, Ianderlei Andrade; Paula, Rafael Pereira de
the treatment of Class III malocclusion in early age is one of the greatest challenges for orthodontists, and the establishment of more effective treatment method is a constant concern for these professionals. Thus, the objective of this systematic review is to verify the effectiveness of the therapy protocol for alternate rapid maxillary expansion and constriction (Alt-RAMEC) in the early treatment of Class III malocclusion. searches were performed in the following electronic databases: Cochrane Library, Medline (EBSCO and PubMed), SciELO, LILACS and Scopus. The following inclusion criteria were used: in vivo studies conducted with early intervention (patient in craniofacial development phase) with the use of the Alt-RAMEC protocol. Reviews, case reports, editorials, and studies with syndromic patients or under use of systemic drug were excluded. Duplicates were also excluded. The studies were assessed for methodological quality using the Cochrane tool for assessment of risk of bias, and classified as high or low risk of bias. 53 articles were found. Duplicates exclusion was thus performed and 35 articles remained. After inclusion analysis, only 5 matched the criteria. Two articles were classified as low risk of bias and three as high risk of bias. It was observed that the Alt-RAMEC enable protraction in less time and with better results, promoting greater effectiveness in the protraction treatment of Class III malocclusion. Although there is positive evidence of the effectiveness of early treatment with the Alt-RAMEC protocol in patients with Class III malocclusion, further studies are needed to confirm its effectiveness using long-term methodology.
An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species. PMID:25401154
Nongdam, Potshangbam; Tikendra, Leimapokpam
An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species.
Isabel Eleanor Moore
Full Text Available Aim: The study aimed to determine the effectiveness of benthic macroinvertebrate dredge net sampling procedures as an alternative method to kick net sampling in tropical freshwater systems, specifically as an evaluation of sampling methods used in the Zambian Invertebrate Scoring System (ZISS river bioassessment scheme. Tropical freshwater ecosystems are sometimes dangerous or inaccessible to sampling teams using traditional kick-sampling methods, so identifying an alternative procedure that produces similar results is necessary in order to collect data from a wide variety of habitats.MethodsBoth kick and dredge nets were used to collect macroinvertebrate samples at 16 riverine sites in Zambia, ranging from backwaters and floodplain lagoons to fast flowing streams and rivers. The data were used to calculate ZISS, diversity (S: number of taxa present, and Average Score Per Taxon (ASPT scores per site, using the two sampling methods to compare their sampling effectiveness. Environmental parameters, namely pH, conductivity, underwater photosynthetically active radiation (PAR, temperature, alkalinity, flow, and altitude, were also recorded and used in statistical analysis. Invertebrate communities present at the sample sites were determined using multivariate procedures.ResultsAnalysis of the invertebrate community and environmental data suggested that the testing exercise was undertaken in four distinct macroinvertebrate community types, supporting at least two quite different macroinvertebrate assemblages, and showing significant differences in habitat conditions. Significant correlations were found for all three bioassessment score variables between results acquired using the two methods, with dredge-sampling normally producing lower scores than did the kick net procedures. Linear regression models were produced in order to correct each biological variable score collected by a dredge net to a score similar to that of one collected by kick net
Raffaeli, William; Righetti, Donatella; Sarti, Donatella; Balestri, Marco; Ferioli, Isabella; Monterubbianesi, Maria Cristina; Caminiti, Alessandro
To assess the efficacy and the safety of our rapid detoxificationprotocol in preventing signs and symptoms of withdrawal and pain severity. Prospective, open-label case series study. Public primary care at the Pain and Palliative Care Unit of the Infermi Hospital of Rimini, Italy. The authors studied 10 consecutive patients suffering from chronic noncancer pain who were refractory to intrathecal (IT) morphine, and hence indicated for ziconotide therapy. IT pump was refilled with saline solution, and each patient received endovenous morphine, oral clonidine, ketoprofen, and lorazepam for the first 3 days, and slow-release tramadol, oral clonidine, and ketoprofen for 10 days. Ziconotide therapy was started at the end of the 2-week detoxification treatment. The observer-rated opioid withdrawal scale (OOWS) was used for the assessment of withdrawal signs, visual analogue scale was used for pain intensity assessment, and also adverse events were recorded. Withdrawal symptoms were experienced by 3 patients (30 percent). Their average OOWS decreased significantly (p ziconotide monotherapy in patients who are refractory to morphine.
da Luz Vieira, Gustavo; de Menezes, Luciane Macedo; de Lima, Eduardo Martinelli S; Rizzatto, Susana
To evaluate the amount of maxillary protraction with face mask in complete unilateral cleft lip and palate patients submitted to two distinct rapid maxillary expansion (RME) protocols. The sample consisted of 20 individuals (nine boys and 11 girls; mean age of 10.4 +/- 2.62 years) with unilateral complete cleft lip and palate who had a constricted maxilla in the vertical and transverse dimensions. Ten patients underwent 1 week of RME with screw activation of one complete turn per day, followed by 23 weeks of maxillary protraction (group 1). The other 10 patients underwent 7 weeks of alternate rapid maxillary expansion and constriction, with one complete turn per day, followed by 17 weeks of maxillary protraction (group 2); both groups underwent a total of 6 months of treatment. Cephalometric measurements were taken at different times: pretreatment (T1), soon after RME (T2), and after 6 months of treatment (T3). Each measurement was analyzed with mixed models for repeated measures, and the covariance structure chosen was compound symmetry. The maxilla displaced slightly forward and downward with a counterclockwise rotation; the mandible rotated downward and backward, resulting in an increase in anterior facial height; the sagittal maxillomandibular relationship was improved; the maxillary molars and incisors were protruded and extruded; and the mandibular incisors were retroclined. There was no significant difference between the groups in evaluation time.
Mayerhofer, Benjamin; Stöger, Anna; Pietzka, Ariane T; Fernandez, Haizpea Lasa; Prewein, Bernhard; Sorschag, Sieglinde; Kunert, Renate; Allerberger, Franz; Ruppitsch, Werner
Methicillin-resistant Staphylococcus aureus is one of the most significant pathogens associated with health care. For efficient surveillance, control and outbreak investigation, S. aureus typing is essential. A high resolution melting curve analysis was developed and evaluated for rapid identification of the most frequent spa types found in an Austrian hospital consortium covering 2,435 beds. Among 557 methicillin-resistant Staphylococcus aureus isolates 38 different spa types were identified by sequence analysis of the hypervariable region X of the protein A gene (spa). Identification of spa types through their characteristic high resolution melting curve profiles was considerably improved by double spiking with genomic DNA from spa type t030 and spa type t003 and allowed unambiguous and fast identification of the ten most frequent spa types t001 (58%), t003 (12%), t190 (9%), t041 (5%), t022 (2%), t032 (2%), t008 (2%), t002 (1%), t5712 (1%) and t2203 (1%), representing 93% of all isolates within this hospital consortium. The performance of the assay was evaluated by testing samples with unknown spa types from the daily routine and by testing three different high resolution melting curve analysis real-time PCR instruments. The ten most frequent spa types were identified from all samples and on all instruments with 100% specificity and 100% sensitivity. Compared to classical spa typing by sequence analysis, this gene scanning assay is faster, cheaper and can be performed in a single closed tube assay format. Therefore it is an optimal screening tool to detect the most frequent endemic spa types and to exclude non-endemic spa types within a hospital.
Takougang, Innocent; Barbazan, Phillipe; Tchounwou, Paul B; Noumi, Emmanuel
Macroinvertebrates identification and enumeration may be used as a simple and affordable alternative to chemical analysis in water pollution monitoring. However, the ecological responses of various taxa to pollution are poorly known in resources-limited tropical countries. While freshwater macroinvertebrates have been used in the assessment of water quality in Europe and the Americas, investigations in Africa have mainly focused on snail hosts of human parasites. There is a need for sampling methods that can be used to assess both snails and other macroinvertebrates. The present study was designed to evaluate the usefulness of the freshwater snail dip scoop method in the study of macroinvertebrates for the assessment of the SOSUCAM sugar mill effluents pollution. Standard snail dip scoop samples were collected upstream and downstream of the factory effluent inputs, on the Mokona and Mengoala rivers. The analysis of the macroinvertebrate communities revealed the absence of Ephemeroptera and Trichoptera, and the thriving of Syrphidae in the sections of the rivers under high effluent load. The Shannon & Weaver diversity index was lower in these areas. The dip scoop sampling protocol was found to be a useful method for macroinvertebrates collection. Hence, this method is recommended as a simple, cost-effective and efficient tool for the bio-assessment of freshwater pollution in developing countries with limited research resources.
Full Text Available Macroinvertebrates identification and enumeration may be used as a simple and affordable alternative to chemical analysis in water pollution monitoring. However, the ecological responses of various taxa to pollution are poorly known in resources-limited tropical countries. While freshwater macroinvertebrates have been used in the assessment of water quality in Europe and the Americas, investigations in Africa have mainly focused on snail hosts of human parasites. There is a need for sampling methods that can be used to assess both snails and other macroinvertebrates. The present study was designed to evaluate the usefulness of the freshwater snail dip scoop method in the study of macroinvertebrates for the assessment of the SOSUCAM sugar mill effluents pollution. Standard snail dip scoop samples were collected upstream and downstream of the factory effluent inputs, on the Mokona and Mengoala rivers. The analysis of the macroinvertebrate communities revealed the absence of Ephemeroptera and Trichoptera, and the thriving of Syrphidae in the sections of the rivers under high effluent load. The Shannon and Weaver diversity index was lower in these areas. The dip scoop sampling protocol was found to be a useful method for macroinvertebrates collection. Hence, this method is recommended as a simple, cost-effective and efficient tool for the bio-assessment of freshwater pollution in developing countries with limited research resources.
Full Text Available Following a radiation incident, preliminary dose estimates made by γ-H2AX foci analysis can supplement the early triage of casualties based on clinical symptoms. Sample processing time is important when many individuals need to be rapidly assessed. A protocol was therefore developed for high sample throughput that requires less than 0.1 ml blood, thus potentially enabling finger prick sampling. The technique combines red blood cell lysis and leukocyte fixation in one step on a 96 well plate, in contrast to the routine protocol, where lymphocytes in larger blood volumes are typically separated by Ficoll density gradient centrifugation with subsequent washing and fixation steps. The rapid ‘96 well lyse/fix’ method reduced the estimated sample processing time for 96 samples to about 4 h compared to 15 h using the routine protocol. However, scoring 20 cells in 96 samples prepared by the rapid protocol took longer than for the routine method (3.1 versus 1.5 h at zero dose; 7.0 versus 6.1 h for irradiated samples. Similar foci yields were scored for both protocols and consistent dose estimates were obtained for samples exposed to 0, 0.2, 0.6, 1.1, 1.2, 2.1 and 4.3 Gy of 250 kVp X-rays at 0.5 Gy/min and incubated for 2 h. Linear regression coefficients were 0.87 ± 0.06 (R2 = 97.6% and 0.85 ± 0.05 (R2 = 98.3% for estimated versus actual doses for the routine and lyse/fix method, respectively. The lyse/fix protocol can therefore facilitate high throughput processing for γ-H2AX biodosimetry for use in large scale radiation incidents, at the cost of somewhat longer foci scoring times.
Horwell, C. J.; Baxter, P. J.; Hillman, S. E.; Calkins, J.A.; Damby, D. E.; Delmelle, P.; Donaldson, K; Dunster, C.; Fubini, B; F. J. Kelly; Le Blond, J.S.; Livi, K.J.T.; Murphy, F.; C. Nattrass; Sweeney, S.
The six week eruption of Eyjafjallajökull volcano in 2010 produced heavy ash fall in a sparsely populated area of southern and south eastern Iceland and disrupted European commercial flights for at least 6 days. We adopted a protocol for the rapid analysis of volcanic ash particles, for the purpose of informing respiratory health risk assessments. Ash collected from deposits underwent a multi-laboratory physicochemical and toxicological investigation of their mineralogical parameters associat...
Authors: Janet Hill, Bonnie Chaban, Jennifer Town, Matthew Links & Tim Dumonceaux ### Abstract This protocol describes an alternative approach to performing Roche’s Paired End Rapid Library Preparation Method for 8 kb span libraries. This method uses the Corvaris g-tube for DNA fragmentation, eliminating the need for a HydroShear apparatus, and a Sage Science BluePippin electrophoresis platform to size select the 8 kb fragments, eliminating the need for agarose gel electrophoresi...
Höhner, Ricarda; Tabatabaei, Samaneh; Kunz, Hans-Henning; Fittschen, Ursula
The ion homeostasis of macro and micronutrients in plant cells and tissues is a fundamental requirement for vital biochemical pathways including photosynthesis. In nature, ion homeostasis is affected mainly by three processes: 1. Environmental stress factors, 2. Developmental effects, and 3. Loss or gain-of-function mutations in the plant genome. Here we present a rapid total reflection X-ray fluorescence (TXRF) protocol that allows for simultaneous quantification of several elements such as potassium (K), calcium (Ca), sulfur (S), manganese (Mn) and strontium (Sr) in Arabidopsis thaliana leaf specimens. Our procedure is cost-efficient and enables precise, robust and highly reproducible measurements on tissue samples as small as 0.3 mg dry weight. As shown here, we apply the TXRF procedure to detect accurately the early replacement of K by Na ions in leaves of plants exposed to soil salinity, a globally increasing abiotic stress factor. Furthermore, we were able to prove the existence of a leaf development-dependent ion gradient for K, Ca, and other divalent ions in A. thaliana; i.e. old leaves contain significantly lower K but higher Ca than young leaves. Lastly, we show that our procedure can be readily applied to reveal subtle differences in tissue-specific ion contents of plant mutants. We employed independent A. thaliana kea1kea2 loss-of-function mutants that lack KEA1 and KEA2, two highly active chloroplast K exchange proteins. We found significantly increased K levels specifically in kea1kea2 mutants, i.e. 55 mg ∗ g- 1 dry weight, compared to 40 mg ∗ g- 1 dry weight in wild type plants. The TXRF procedure can be supplemented with Flame atomic absorption (FAAS) and emission spectrometry (FAES) to expand the detection range to sodium (Na) and magnesium (Mg). Because of the small sample amounts required, this method is especially suited to probe individual leaves in single plants or even specific leaf areas. Therefore, TXRF represents a powerful method to
Wike, L; Doug Martin, D; Michael Paller, M; Eric Nelson, E
Ecosystem health with its near infinite number of variables is difficult to measure, and there are many opinions as to which variables are most important, most easily measured, and most robust, Bioassessment avoids the controversy of choosing which physical and chemical parameters to measure because it uses responses of a community of organisms that integrate all aspects of the system in question. A variety of bioassessment methods have been successfully applied to aquatic ecosystems using fish and macroinvertebrate communities. Terrestrial biotic index methods are less developed than those for aquatic systems and we are seeking to address this problem here. This study had as its objective to examine the baseline differences in ant communities at different seral stages from clear cut back to mature pine plantation as a precursor to developing a bioassessment protocol. Comparative sampling was conducted at four seral stages; clearcut, 5 year, 15 year and mature pine plantation stands. Soil and vegetation data were collected at each site. All ants collected were preserved in 70% ethyl alcohol and identified to genus. Analysis of the ant data indicates that ants respond strongly to the habitat changes that accompany ecological succession in managed pine forests and that individual genera as well as ant community structure can be used as an indicator of successional change. Ants exhibited relatively high diversity in both early and mature seral stages. High ant diversity in the mature seral stages was likely related to conditions on the forest floor which favored litter dwelling and cool climate specialists.
Laurin, Nancy; Frégeau, Chantal
The goal of this work was to optimize and validate a fast amplification protocol for the multiplex amplification of the STR loci included in AmpFlSTR(®) Profiler Plus(®) to expedite human DNA identification. By modifying the cycling conditions and by combining the use of a DNA polymerase optimized for high speed PCR (SpeedSTAR™ HS) and a more efficient thermal cycler instrument (Bio-RAD C1000™), we were able to reduce the amplification process from 4h to 26 min. No modification to the commercial AmpFlSTR(®) Profiler Plus(®) primer mix was required. When compared to the current Royal Canadian Mounted Police (RCMP) amplification protocol, no differences with regards to specificity, sensitivity, heterozygote peak height ratios and overall profile balance were noted. Moreover, complete concordance was obtained with profiles previously generated with the standard amplification protocol and minor alleles in mixture samples were reliably typed. An increase in n-4 stutter ratios (2.2% on average for all loci) was observed for profiles amplified with the fast protocol compared to the current procedure. Our results document the robustness of this rapid amplification protocol for STR profiling using the AmpFlSTR(®) Profiler Plus(®) primer set and demonstrate that comparable data can be obtained in substantially less time. This new approach could provide an alternative option to current multiplex STR typing amplification protocols in order to increase throughput or expedite time-sensitive cases. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Peat, Gerry; Jones, Meriel
Plant tissue culture is becoming an important technique for the mass propagation of plants. Problems with existing techniques, such as slow growth and contamination, have restricted the practical work in plant tissue culture carried out in schools. The new protocol using garlic meristematic stem discs explained in this article addresses many of…
Löfström, Charlotta; Hansen, F.; Mansdal, S.
samples using a real-time PCR method. The protocol included incubation in buffered peptone water, centrifugation of an aliquot and a boiling procedure. The validation study included comparative and collaborative trials recommended by the Nordic Organization for Validation of Alternative Methods (Nord......Cost-effective and rapid monitoring of Salmonella in the meat production chain can contribute to food safety. The objective was, for the first time, to validate an easy-to-use pre-PCR sample preparation method based on a simple boiling protocol for screening of Salmonella in meat and carcass swab....../sample for the boiling, magnetic bead-based and NMKL187 methods, respectively. When comparing the boiling method with the magnetic beads, the relative accuracy (AC), relative sensitivity (SE) and relative specificity (SP) were found to be 98%, 102% and 98%, respectively (Cohen’s kappa index 0.95). When comparing results...
Full Text Available The protection, preservation and restoration of aquatic ecosystems and their functions are of global importance. For European states it became legally binding mainly through the EU-Water Framework Directive (WFD. In order to assess the ecological status of a given water body, aquatic biodiversity data are obtained and compared to a reference water body. The quantified mismatch obtained determines the extent of potential management actions. The current approach to biodiversity assessment is based on morpho-taxonomy. This approach has many drawbacks such as being time consuming, limited in temporal and spatial resolution, and error-prone due to the varying individual taxonomic expertise of the analysts. Novel genomic tools can overcome many of the aforementioned problems and could complement or even replace traditional bioassessment. Yet, a plethora of approaches are independently developed in different institutions, thereby hampering any concerted routine application. The goal of this Action is to nucleate a group of researchers across disciplines with the task to identify gold-standard genomic tools and novel eco-genomic indices for routine application in biodiversity assessments of European fresh- and marine water bodies. Furthermore, DNAqua-Net will provide a platform for training of the next generation of European researchers preparing them for the new technologies. Jointly with water managers, politicians, and other stakeholders, the group will develop a conceptual framework for the standard application of eco-genomic tools as part of legally binding assessments.
Christou, Anastasis; Georgiadou, Egli C; Filippou, Panagiota; Manganaris, George A; Fotopoulos, Vasileios
Strawberry plant tissues and particularly fruit material are rich in polysaccharides and polyphenolic compounds, thus rendering the isolation of nucleic acids a difficult task. This work describes the successful modification of a total RNA extraction protocol, which enables the isolation of high quantity and quality of total RNA from small amounts of strawberry leaf, root and fruit tissues. Reverse-transcription polymerase chain reaction (RT-PCR) amplification of GAPDH housekeeping gene from isolated RNA further supports the proposed protocol efficiency and its use for downstream molecular applications. This novel procedure was also successfully followed using other fruit tissues, such as olive and kiwifruit. In addition, optional treatment with RNase A following initial nucleic acid extraction can provide sufficient quality and quality of genomic DNA for subsequent PCR analyses, as evidenced from PCR amplification of housekeeping genes using extracted genomic DNA as template. Overall, this optimized protocol allows easy, rapid and economic isolation of high quality RNA from small amounts of an important fruit crop, such as strawberry, with extended applicability to other recalcitrant fruit crops. Copyright © 2013 Elsevier B.V. All rights reserved.
Kaminska, Paulina S; Fiedoruk, Krzysztof; Jankowska, Dominika; Mahillon, Jacques; Nowosad, Karol; Drewicka, Ewa; Zambrzycka, Monika; Swiecicka, Izabela
Bacillus cereus, the Gram-positive and spore-forming ubiquitous bacterium, may cause emesis as the result of food intoxication with cereulide, a heat-stable emetic toxin. Rapid determination of cereulide-positive B. cereus isolates is of highest importance due to consequences of this intoxication for human health and life. Here we present a 1-day pulsed-field gel electrophoresis for emetic B. cereus isolates, which allows rapid and efficient determination of their genomic relatedness and helps determining the source of intoxication in case of outbreaks caused by these bacilli. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Mogollon, Catherin Marin; van Pul, Fiona J A; Imai, Takashi; Ramesar, Jai; Chevalley-Maurel, Séverine; de Roo, Guido M; Veld, Sabrina A J; Kroeze, Hans; Franke-Fayard, Blandine M D; Janse, Chris J; Khan, Shahid M
The CRISPR/Cas9 system is a powerful genome editing technique employed in a wide variety of organisms including recently the human malaria parasite, P. falciparum. Here we report on further improvements to the CRISPR/Cas9 transfection constructs and selection protocol to more rapidly modify the P. falciparum genome and to introduce transgenes into the parasite genome without the inclusion of drug-selectable marker genes. This method was used to stably integrate the gene encoding GFP into the P. falciparum genome under the control of promoters of three different Plasmodium genes (calmodulin, gapdh and hsp70). These genes were selected as they are highly transcribed in blood stages. We show that the three reporter parasite lines generated in this study (GFP@cam, GFP@gapdh and GFP@hsp70) have in vitro blood stage growth kinetics and drug-sensitivity profiles comparable to the parental P. falciparum (NF54) wild-type line. Both asexual and sexual blood stages of the three reporter lines expressed GFP-fluorescence with GFP@hsp70 having the highest fluorescent intensity in schizont stages as shown by flow cytometry analysis of GFP-fluorescence intensity. The improved CRISPR/Cas9 constructs/protocol will aid in the rapid generation of transgenic and modified P. falciparum parasites, including those expressing different reporters proteins under different (stage specific) promoters.
Madala Sreenivas R
Full Text Available Abstract Background Reliable data are a pre-requisite for planning eye care services. Though conventional cross sectional studies provide reliable information, they are resource intensive. A novel rapid assessment method was used to investigate the prevalence and causes of visual impairment and presbyopia in subjects aged 40 years and older. This paper describes the detailed methodology and study procedures of Rapid Assessment of Visual Impairment (RAVI project. Methods A population-based cross-sectional study was conducted using cluster random sampling in the coastal region of Prakasam district of Andhra Pradesh in India, predominantly inhabited by fishing communities. Unaided, aided and pinhole visual acuity (VA was assessed using a Snellen chart at a distance of 6 meters. The VA was re-assessed using a pinhole, if VA was Results The data collection was completed in Conclusion There is a high prevalence of visual impairment in marine fishing communities in Prakasam district in India. The data from this rapid assessment survey can now be used as a baseline to start eye care services in this region. The rapid assessment methodology (RAVI reported in this paper is robust, quick and has the potential to be replicated in other areas.
Sousa-Figueiredo, José Carlos; Stanton, Michelle C; Katokele, Stark; Arinaitwe, Moses; Adriko, Moses; Balfour, Lexi; Reiff, Mark; Lancaster, Warren; Noden, Bruce H; Bock, Ronnie; Stothard, J Russell
Namibia is now ready to begin mass drug administration of praziquantel and albendazole against schistosomiasis and soil-transmitted helminths, respectively. Although historical data identifies areas of transmission of these neglected tropical diseases (NTDs), there is a need to update epidemiological data. For this reason, Namibia adopted a new protocol for mapping of schistosomiasis and geohelminths, formally integrating rapid diagnostic tests (RDTs) for infections and morbidity. In this article, we explain the protocol in detail, and introduce the concept of 'mapping resolution', as well as present results and treatment recommendations for northern Namibia. This new protocol allowed a large sample to be surveyed (N = 17,896 children from 299 schools) at relatively low cost (7 USD per person mapped) and very quickly (28 working days). All children were analysed by RDTs, but only a sub-sample was also diagnosed by light microscopy. Overall prevalence of schistosomiasis in the surveyed areas was 9.0%, highly associated with poorer access to potable water (OR = 1.5, Pmaps were produced and hot spots identified to better guide the national programme in drug administration, as well as targeted improvements in water, sanitation and hygiene. The RDTs employed (circulating cathodic antigen and microhaematuria for Schistosoma mansoni and S. haematobium, respectively) performed well, with sensitivities above 80% and specificities above 95%. This protocol is cost-effective and sensitive to budget limitations and the potential economic and logistical strains placed on the national Ministries of Health. Here we present a high resolution map of disease prevalence levels, and treatment regimens are recommended.
José Carlos Sousa-Figueiredo
Full Text Available Namibia is now ready to begin mass drug administration of praziquantel and albendazole against schistosomiasis and soil-transmitted helminths, respectively. Although historical data identifies areas of transmission of these neglected tropical diseases (NTDs, there is a need to update epidemiological data. For this reason, Namibia adopted a new protocol for mapping of schistosomiasis and geohelminths, formally integrating rapid diagnostic tests (RDTs for infections and morbidity. In this article, we explain the protocol in detail, and introduce the concept of 'mapping resolution', as well as present results and treatment recommendations for northern Namibia.This new protocol allowed a large sample to be surveyed (N = 17,896 children from 299 schools at relatively low cost (7 USD per person mapped and very quickly (28 working days. All children were analysed by RDTs, but only a sub-sample was also diagnosed by light microscopy. Overall prevalence of schistosomiasis in the surveyed areas was 9.0%, highly associated with poorer access to potable water (OR = 1.5, P<0.001 and defective (OR = 1.2, P<0.001 or absent sanitation infrastructure (OR = 2.0, P<0.001. Overall prevalence of geohelminths, more particularly hookworm infection, was 12.2%, highly associated with presence of faecal occult blood (OR = 1.9, P<0.001. Prevalence maps were produced and hot spots identified to better guide the national programme in drug administration, as well as targeted improvements in water, sanitation and hygiene. The RDTs employed (circulating cathodic antigen and microhaematuria for Schistosoma mansoni and S. haematobium, respectively performed well, with sensitivities above 80% and specificities above 95%.This protocol is cost-effective and sensitive to budget limitations and the potential economic and logistical strains placed on the national Ministries of Health. Here we present a high resolution map of disease prevalence levels, and treatment regimens are
Chen, Yu-Fan; Tseng, Chien-Yu; Wang, Hsei-Wei; Kuo, Hung-Chih; Yang, Vincent W; Lee, Oscar K
Liver transplantation is the only definitive treatment for end-stage cirrhosis and fulminant liver failure, but the lack of available donor livers is a major obstacle to liver transplantation. Recently, induced pluripotent stem cells (iPSCs) derived from the reprogramming of somatic fibroblasts, have been shown to resemble embryonic stem (ES) cells in that they have pluripotent properties and the potential to differentiate into all cell lineages in vitro, including hepatocytes. Thus, iPSCs could serve as a favorable cell source for a wide range of applications, including drug toxicity testing, cell transplantation, and patient-specific disease modeling. Here, we describe an efficient and rapid three-step protocol that is able to rapidly generate hepatocyte-like cells from human iPSCs. This occurs because the endodermal induction step allows for more efficient and definitive endoderm cell formation. We show that hepatocyte growth factor (HGF), which synergizes with activin A and Wnt3a, elevates the expression of the endodermal marker Foxa2 (forkhead box a2) by 39.3% compared to when HGF is absent (14.2%) during the endodermal induction step. In addition, iPSC-derived hepatocytes had a similar gene expression profile to mature hepatocytes. Importantly, the hepatocyte-like cells exhibited cytochrome P450 3A4 (CYP3A4) enzyme activity, secreted urea, uptake of low-density lipoprotein (LDL), and possessed the ability to store glycogen. Moreover, the hepatocyte-like cells rescued lethal fulminant hepatic failure in a nonobese diabetic severe combined immunodeficient mouse model. We have established a rapid and efficient differentiation protocol that is able to generate functional hepatocyte-like cells from human iPSCs. This may offer an alternative option for treatment of liver diseases. Copyright © 2011 American Association for the Study of Liver Diseases.
Waite, Ian R.; Kennen, Jonathan G.; May, Jason T.; Brown, Larry R.; Cuffney, Thomas F.; Jones, Kimberly A.; Orlando, James L.
We developed independent predictive disturbance models for a full regional data set and four individual ecoregions (Full Region vs. Individual Ecoregion models) to evaluate effects of spatial scale on the assessment of human landscape modification, on predicted response of stream biota, and the effect of other possible confounding factors, such as watershed size and elevation, on model performance. We selected macroinvertebrate sampling sites for model development (n = 591) and validation (n = 467) that met strict screening criteria from four proximal ecoregions in the northeastern U.S.: North Central Appalachians, Ridge and Valley, Northeastern Highlands, and Northern Piedmont. Models were developed using boosted regression tree (BRT) techniques for four macroinvertebrate metrics; results were compared among ecoregions and metrics. Comparing within a region but across the four macroinvertebrate metrics, the average richness of tolerant taxa (RichTOL) had the highest R2 for BRT models. Across the four metrics, final BRT models had between four and seven explanatory variables and always included a variable related to urbanization (e.g., population density, percent urban, or percent manmade channels), and either a measure of hydrologic runoff (e.g., minimum April, average December, or maximum monthly runoff) and(or) a natural landscape factor (e.g., riparian slope, precipitation, and elevation), or a measure of riparian disturbance. Contrary to our expectations, Full Region models explained nearly as much variance in the macroinvertebrate data as Individual Ecoregion models, and taking into account watershed size or elevation did not appear to improve model performance. As a result, it may be advantageous for bioassessment programs to develop large regional models as a preliminary assessment of overall disturbance conditions as long as the range in natural landscape variability is not excessive. PMID:24675770
Beeden, R J; Turner, M A; Dryden, J; Merida, F; Goudkamp, K; Malone, C; Marshall, P A; Birtles, A; Maynard, J A
Managing to support coral reef resilience as the climate changes requires strategic and responsive actions that reduce anthropogenic stress. Managers can only target and tailor these actions if they regularly receive information on system condition and impact severity. In large coral reef areas like the Great Barrier Reef Marine Park (GBRMP), acquiring condition and impact data with good spatial and temporal coverage requires using a large network of observers. Here, we describe the result of ~10 years of evolving and refining participatory monitoring programs used in the GBR that have rangers, tourism operators and members of the public as observers. Participants complete Reef Health and Impact Surveys (RHIS) using a protocol that meets coral reef managers' needs for up-to-date information on the following: benthic community composition, reef condition and impacts including coral diseases, damage, predation and the presence of rubbish. Training programs ensure that the information gathered is sufficiently precise to inform management decisions. Participants regularly report because the demands of the survey methodology have been matched to their time availability. Undertaking the RHIS protocol we describe involves three ~20 min surveys at each site. Participants enter data into an online data management system that can create reports for managers and participants within minutes of data being submitted. Since 2009, 211 participants have completed a total of more than 10,415 surveys at more than 625 different reefs. The two-way exchange of information between managers and participants increases the capacity to manage reefs adaptively, meets education and outreach objectives and can increase stewardship. The general approach used and the survey methodology are both sufficiently adaptable to be used in all reef regions.
Full Text Available Abstract Purpose To verify the dose distribution and number of monitor units (MU for dynamic treatment techniques like volumetric modulated single arc radiation therapy - Rapid Arc - each patient treatment plan has to be verified prior to the first treatment. The purpose of this study was to develop a patient related treatment plan verification protocol using a two dimensional ionization chamber array (MatriXX, IBA, Schwarzenbruck, Germany. Method Measurements were done to determine the dependence between response of 2D ionization chamber array, beam direction, and field size. Also the reproducibility of the measurements was checked. For the patient related verifications the original patient Rapid Arc treatment plan was projected on CT dataset of the MatriXX and the dose distribution was calculated. After irradiation of the Rapid Arc verification plans measured and calculated 2D dose distributions were compared using the gamma evaluation method implemented in the measuring software OmniPro (version 1.5, IBA, Schwarzenbruck, Germany. Results The dependence between response of 2D ionization chamber array, field size and beam direction has shown a passing rate of 99% for field sizes between 7 cm × 7 cm and 24 cm × 24 cm for measurements of single arc. For smaller and larger field sizes than 7 cm × 7 cm and 24 cm × 24 cm the passing rate was less than 99%. The reproducibility was within a passing rate of 99% and 100%. The accuracy of the whole process including the uncertainty of the measuring system, treatment planning system, linear accelerator and isocentric laser system in the treatment room was acceptable for treatment plan verification using gamma criteria of 3% and 3 mm, 2D global gamma index. Conclusion It was possible to verify the 2D dose distribution and MU of Rapid Arc treatment plans using the MatriXX. The use of the MatriXX for Rapid Arc treatment plan verification in clinical routine is reasonable. The passing rate should be 99
Faheem W. Guirgis
Full Text Available Introduction: In 2007 there were 64,000 visits to the emergency department (ED for possible myocardial infarction (MI related to cocaine use. Prior studies have demonstrated that low- to intermediate-risk patients with cocaine-associated chest pain can be safely discharged after 9-12 hours of observation. The goal of this study was to determine the safety of an 8-hour protocol for ruling out MI in patients who presented with cocaine-associated chest pain. Methods: We conducted a retrospective review of patients treated with an 8-hour cocaine chest pain protocol between May 1, 2011 and November 30, 2012 who were sent to the clinical decision unit (CDU for observation. The protocol included serial cardiac biomarker testing with Troponin-T, CK-MB (including delta CK-MB, and total CK at 0, 2, 4, and 8 hours after presentation with cardiac monitoring for the observation period. Patients were followed up for adverse cardiac events or death within 30 days of discharge. Results: There were 111 admissions to the CDU for cocaine chest pain during the study period. One patient had a delta CK-MB of 1.6 ng/ml, but had negative Troponin-T at all time points. No patient had a positive Troponin-T or CK-MB at 0, 2, 4 or 8 hours, and there were no MIs or deaths within 30 days of discharge. Most patients were discharged home (103 and there were 8 inpatient admissions from the CDU. Of the admitted patients, 2 had additional stress tests that were negative, 1 had additional cardiac biomarkers that were negative, and all 8 patients were discharged home. The estimated risk of missing MI using our protocol is, with 99% confidence, less than 5.1% and with 95% confidence, less than 3.6% (99% CI, 0-5.1%; 95% CI, 0-3.6%. Conclusion: Application of an abbreviated cardiac enzyme protocol resulted in the safe and rapid discharge of patients presenting to the ED with cocaine-associated chest pain. [West J Emerg Med. 2014;15(2:180–183.
Burkhalter, Kristen L; Biggerstaff, Brad J; Horiuchi, Kalanthe; Savage, Harry M
We evaluated the ability of the Rapid Analyte Measurement Platform (RAMP(®)) mosquito-grinding buffer to inactivate West Nile virus (WNV) by subjecting WNV-positive samples ground in RAMP buffer to incubation intervals ranging from 5 min to 60 min. At each time point an aliquot was removed and serially diluted in bovine albumin (BA)-1 cell culture media to stop the inactivation process by RAMP buffer. Each BA-1 sample was tested for viable virus using Vero 6-well cell culture plaque assay and observed for plaques. We observed very limited inactivation of WNV (1-2 log10 plaque-forming units/ml) by RAMP buffer. Concerned for RAMP operators who may be using this assay in low-level biocontainment facilities, we developed an alternate sample homogenization protocol using Triton X-100 detergent that ensures complete WNV inactivation without compromising the performance of the RAMP assay.
Rathi, Anand Ramchandra; Kumari, N Retna; Vadakkepuriyal, Kannan; Santhkumar, Madhu
Class III malocclusion is very common malocclusion and can be due to maxillary retrusion, mandibular prognathism, or combination. Ellis and McNamara found a combination of maxillary retrusion and mandibular protrusion to be the most common skeletal relationship (30%). The treatment should be carried out as early as possible for permitting normal growth of the skeletal bases. Reverse pull head gear combined with maxillary expansion can effectively correct skeletal Class III malocclusion due to maxillary deficiency in growing patient. An eight-year-old female patient with chief complaint of prognathic mandible and anterior crossbite was successfully treated in duration of 5 months with facemask and expansion therapy based on Alternate Rapid Maxillary Expansion and Constriction (Alt-RAMEC) protocol.
Anand Ramchandra Rathi
Full Text Available Class III malocclusion is very common malocclusion and can be due to maxillary retrusion, mandibular prognathism, or combination. Ellis and McNamara found a combination of maxillary retrusion and mandibular protrusion to be the most common skeletal relationship (30%. The treatment should be carried out as early as possible for permitting normal growth of the skeletal bases. Reverse pull head gear combined with maxillary expansion can effectively correct skeletal Class III malocclusion due to maxillary deficiency in growing patient. An eight-year-old female patient with chief complaint of prognathic mandible and anterior crossbite was successfully treated in duration of 5 months with facemask and expansion therapy based on Alternate Rapid Maxillary Expansion and Constriction (Alt-RAMEC protocol.
Full Text Available Background: Sequence-based identification of various microorganisms including Archaea, Bacteria, Cyanobacteria, Diatoms, Fungi, and green algae necessitates an efficient and reproducible genome extraction procedure though which a pure template DNA is yielded and it can be used in polymerase chain reactions (PCR. Considering the fact that DNA extraction from these microorganisms is time consuming and laborious, we developed and standardized a safe, rapid and inexpensive miniprep protocol. Methods: According to our results, amplification of various genomic regions including SSU, LSU, ITS, β-tubulin, actin, RPB2, and EF-1 resulted in a reproducible and efficient DNA extraction from a wide range of microorganisms yielding adequate pure genomic material for reproducible PCR-amplifications. Results: This method relies on a temporary shock of increased concentrations of detergent which can be applied concomitant with multiple freeze-thaws to yield sufficient amount of DNA for PCR amplification of multiple or single fragments(s of the genome. As an advantage, the recipe seems very flexible, thus, various optional steps can be included depending on the samples used.Conclusion: Having the needed flexibility in each step, this protocol is applicable on a very wide range of samples. Hence, various steps can be included depending on the desired quantity and quality.
Bürger, S; Riciputi, L R
The analysis of the isotopic composition of nuclear or non-nuclear solid materials is performed in a variety of fields, e.g., for quality assurance in the production of nuclear fuels, as signatures in forensics, nuclear safeguards, and non-proliferation control, in material characterization, geology, and archeology. We have investigated the capability of laser ablation (New Wave Research, 213 nm) coupled to time-of-flight (TOF) ICP-MS (GBC OptiMass 8000) as a rapid analytical protocol for multi-isotope screening of nuclear and non-nuclear solid samples. This includes natural and non-natural isotopic compositions for elements including Cu, Zr, Mo, Cd, In, Ba, Ta, W, Re, Pt, Pb, and U, in pure metals, alloys, and glasses. Without correcting for mass bias (mass fractionation), an overall precision and accuracy of about 4% (1 sigma) can be achieved by minimizing the deposited laser power and thus fractionation (mass removal based on thermal properties). The precision and accuracy in combination with literally no or minimized sample preparation enables a rapid isotope screening of solid samples that is of particular interest to support nuclear forensic and safeguard analysis.
Specht, W.L.; Klaine, S.J.; Hook, D.D. [and others
Plants form the basis of all ecosystems including wetlands. Although they are the most abundant life form and are the primary producers for all other organisms, they have received the least attention when it comes to environmental matters. Higher plants have rarely been used in ecotoxicity testing and may not respond in the same manner as algae, which have been used more frequently. The introduction of hazardous waste materials into wetland areas has the potential to alter and damage the ecological processes in these ecosystems. Measuring the impact of these contaminants on higher plants is therefore important and needs further research. Higher plants are useful for detecting both herbicidal toxicity and heavy metal toxicity. For phytotoxicity tests to be practical they must be simple, inexpensive, yet sensitive to a variety of contaminants. A difference between seed germination and root elongation tests is that seed germination tests measure toxicity associated with soils directly, while root elongation tests consider the indirect effects of water-soluble constituents that may be present in site samples.
Kim, Saorin; Nhem, Sina; Dourng, Dany; Ménard, Didier
Malaria rapid diagnostic tests (RDTs) are generally considered as point-of-care tests. However, most of the studies assessing the performance of malaria RDTs are conducted by research teams that are not representative of the classical end-users, who are typically unskilled in traditional laboratory techniques for diagnosing malaria. To evaluate the performance of a malaria RDT by end-users in a malaria-endemic area, a study protocol was designed and the VIKIA Malaria Ag Pf/Pan test, previously evaluated in 2013, was re-evaluated by representative end-users. Twenty end-users with four different profiles in seven communes in Kampot Province (Cambodia) were selected. A set of 20 calibrated aliquots, including negative samples, low positive samples (200 parasites/μL of Plasmodium falciparum and Plasmodium vivax) and high positive samples (2,000 parasites/μL of P. falciparum and P. vivax) was used. Testing was performed directly by the end-users without any practical training on the VIKIA Malaria Ag Pf/Pan kit. All results obtained by the end-users were consistent with the expected results, except for the low positive (200 parasites/μL) P. vivax aliquot (35% of concordant results). No significant difference was observed between the different end-users. End-user interviews evaluating ease-of-use and ease-of-reading of the VIKIA Malaria Ag Pf/Pan kit recorded 159 positive answers and only one negative answer. Out of 20 end-users, only one considered the test was not easy to perform with the support of the quick guide. The data presented in this study clearly demonstrate that the performance of the VIKIA Malaria Ag Pf/Pan test when performed by traditional end-users in field conditions is similar to that obtained by a research team and that this RDT can be considered as a point-of-care tool/assay. Furthermore, the protocol designed for this study could be used systematically in parallel to conventional evaluation studies to determine the performance of malaria RDTs in
Sardana, Kabir; Ranjan, Rashmi; Kochhar, Atul M; Mahajan, Khushbu Goel; Garg, Vijay K
Tattoo removal has evolved over the years and though Q-switched laser is the 'workhorse' laser, it invariably requires multiple sittings, which are dependent on numerous factors, including the skin colour, location of the tattoo, age of the tattoo, colour of pigment used, associated fibrosis and the kind of tattoo treated. Though ablative lasers, both pulsed CO2 and Er:YAG, have been used for recalcitrant tattoos, very few studies have been done comparing them with pigment-specific lasers. Our study was based on the premise that ablating the epidermis overlying the tattoo pigment with Er:YAG could help in gaining better access to the pigment which would enable the Q-switched laser to work effectively with less beam scattering. A study of rapid tattoo removal (RTR) technique using a combination of pulsed Er:YAG and Q-Switched Nd:YAG in a split lesion protocol. This prospective study was undertaken during 2010-13 at a laser Clinic in the Maulana Azad Medical College, New Delhi. A total of 10 patients were recruited, 5 of amateur tattoo and 5 of professional tattoo. After informed consent each tattoo was arbitrarily 'split' into two parts. One part was treated with QS Nd:YAG laser(1064 nm) and the other part with Er:YAG laser immediately followed by the QS Nd:YAG. The laser treatments were repeated at 6-week intervals until the tattoo pigment had cleared. On the combination side in subsequent sittings only the QS Nd:YAG was used, to minimize repetitive ablation. To ensure consistency in the intervention methods a trained dermatologist who was independent of the treatment delivery randomly rated 10% of the procedures. The mean improvement achieved by the Q-switched laser (2.93) was less than the combination laser (3.85) side (p = 0.001) and needed more sessions (3.8 vs. 1.6; p = 0.001). There was a statistically significant difference in the improvement on the combination side till the second session. On the combination side patients required a maximum of 2 sessions
Full Text Available Abstract Background Many established PCR-based approaches in plant molecular biology rely on lengthy and expensive methods for isolation of nucleic acids. Although several rapid DNA isolation protocols are available, they have not been tested for simultaneous RNA isolation for RT-PCR applications. In addition, traditional map-based cloning technologies often use ill-proportioned marker regions even when working with the model plant Arabidopsis thaliana, where the availability of the full genome sequence can now be exploited for the creation of a high-density marker systems. Results We designed a high-density polymorphic marker set between two frequently used ecotypes. This new polymorphic marker set allows size separation of PCR products on agarose gels and provides an initial resolution of 10 cM in linkage mapping experiments, facilitated by a rapid plant nucleic acid extraction protocol using minimal amounts of A. thaliana tissue. Using this extraction protocol, we have also characterized segregating T-DNA insertion mutations. In addition, we have shown that our rapid nucleic acid extraction protocol can also be used for monitoring transcript levels by RT-PCR amplification. Finally we have demonstrated that our nucleic acid isolation method is also suitable for other plant species, such as tobacco and barley. Conclusion To facilitate high-throughput linkage mapping and other genomic applications, our nucleic acid isolation protocol yields sufficient quality of DNA and RNA templates for PCR and RT-PCR reactions, respectively. This new technique requires considerably less time compared to other purification methods, and in combination with a new polymorphic PCR marker set dramatically reduces the workload required for linkage mapping of mutations in A. thaliana utilizing crosses between Col-0 and Landsberg erecta (Ler ecotypes.
Full Text Available Aims: This study aims to evaluate the implementation of a rapid response treatment protocol for patients presenting with acute onset ischemic stroke. Improvements of routines surrounding the admission and treatment of patients with intravenous thrombolysis (IVT, such as door-to-needle (DTN times, and increasing the numbers of patients treated are discussed. Methods: We conducted a retrospective analysis of all patients (n = 320 treated with IVT for acute onset ischemic stroke at the Stavanger University Hospital, Norway, between 2003 and 2012. In 2009, a succession of changes to pre- and intra-hospital routines were made as well as an improvement in the education of primary health care physicians, nurses and paramedics involved in the treatment of acute onset stroke patients (rapid response treatment protocol. Analyses of DTN times, onset-to-needle times and the number of patients treated per year were carried out to ascertain the effect of the changes made. The primary aim was to analyze DTN times to look for any changes, and the secondary aim was to analyze changes in the number of patients treated per year. Results: In the years after the implementation of the rapid treatment protocol, we saw an improvement in the median DTN time with a decrease from 73 to 50 min in the first year (p = 0.03, a decrease of 45 min in the second year (p = 0.01 and a decrease of 31 min in the third year (p Conclusions: The implementation of the rapid treatment protocol for acute onset ischemic stroke patients led to a significant decrease in the DTN time at our center. These improvements also produced an increase in the number of patients treated per year. The extension of the therapeutic window from 3 to 4.5 h for the use of intravenous recombinant tissue plasminogen activator also played a role in the increased treatment numbers.
Boutefnouchet, Tarek; Gregg, Richard; Tidman, Jane; Isaac, John; Doughty, Heidi
Death from massive haemorrhage due to traumatic injury is potentially preventable after hospital admission using haemorrhage control and improved resuscitation techniques including massive transfusion protocols. Massive transfusion protocols (MTP) are an essential element of damage control resuscitation and provide a coordinated clinical pathology response to massive haemorrhage after hospital admission. The decision to activate and de-activate a MTP is based on a number of patient and local factors. The purpose of this before-and-after study was to determine the impact of modifying a protocol to include emergency red cells. In addition, we investigated whether massive transfusion prediction models could have been used to guide on-going transfusion support. Sequential MTP activations over three years, before and after protocol revision, were analysed. Percentage of MTP activation, component usage and outcome data were compared. Trauma associated severe haemorrhage (TASH) and assessment of blood consumption (ABC) scores were derived and receiver operating characteristic (ROC) analysis undertaken for an outcome defined as the use of >6 red cell units. 52 MTP1 and 66 MTP2 activations arose from 216 and 495 major trauma cases, respectively. Protocol change significantly reduced the MTP activation rate (p=0.0006) from 24% to 13%, and the number of activations requiring >10 RCC increased from 13% to 36% (p=0.006). Average emergency red cells usage in the second cohort increased to 4 units. Survival, coagulation parameters, and time to MTP pack issue were all unaffected by the protocol revision. The TASH score showed an area under ROC (AUROC) of 0.88 ongoing transfusion requirements. The change in protocol increased the use of emergency red cells but reduced MTP activation and use of multiple blood components. The TASH score appears to provide a useful predictive tool for ongoing transfusion support and may be of value for the trauma clinicians. Copyright © 2015 Elsevier
Ferraz, Eduardo Gomes; Andrade, Lucio Costa Safira; dos Santos, Aline Rode; Torregrossa, Vinicius Rabelo; Rubira-Bullen, Izabel Regina Fischer; Sarmento, Viviane Almeida
The aim of this study was to evaluate the accuracy of virtual three-dimensional (3D) reconstructions of human dry mandibles, produced from two segmentation protocols ("outline only" and "all-boundary lines"). Twenty virtual three-dimensional (3D) images were built from computed tomography exam (CT) of 10 dry mandibles, in which linear measurements between anatomical landmarks were obtained and compared to an error probability of 5 %. The results showed no statistically significant difference among the dry mandibles and the virtual 3D reconstructions produced from segmentation protocols tested (p = 0,24). During the designing of a virtual 3D reconstruction, both "outline only" and "all-boundary lines" segmentation protocols can be used. Virtual processing of CT images is the most complex stage during the manufacture of the biomodel. Establishing a better protocol during this phase allows the construction of a biomodel with characteristics that are closer to the original anatomical structures. This is essential to ensure a correct preoperative planning and a suitable treatment.
A streamlined collecting and preparation protocol for DNA barcoding of Lepidoptera as part of large-scale rapid biodiversity assessment projects, exemplified by the Indonesian Biodiversity Discovery and Information System (IndoBioSys).
Schmidt, Olga; Hausmann, Axel; Cancian de Araujo, Bruno; Sutrisno, Hari; Peggie, Djunijanti; Schmidt, Stefan
Here we present a general collecting and preparation protocol for DNA barcoding of Lepidoptera as part of large-scale rapid biodiversity assessment projects, and a comparison with alternative preserving and vouchering methods. About 98% of the sequenced specimens processed using the present collecting and preparation protocol yielded sequences with more than 500 base pairs. The study is based on the first outcomes of the Indonesian Biodiversity Discovery and Information System (IndoBioSys). IndoBioSys is a German-Indonesian research project that is conducted by the Museum für Naturkunde in Berlin and the Zoologische Staatssammlung München, in close cooperation with the Research Center for Biology - Indonesian Institute of Sciences (RCB-LIPI, Bogor).
Frimpong, Jemima A; D'Aunno, Thomas; Perlman, David C; Strauss, Shiela M; Mallow, Alissa; Hernandez, Diana; Schackman, Bruce R; Feaster, Daniel J; Metsch, Lisa R
More than 1.2 million people in the United States are living with human immunodeficiency virus (HIV), and 3.2 million are living with hepatitis C virus (HCV). An estimated 25 % of persons living with HIV also have HCV. It is therefore of great public health importance to ensure the prompt diagnosis of both HIV and HCV in populations that have the highest prevalence of both infections, including individuals with substance use disorders (SUD). In this theory-driven, efficacy-effectiveness-implementation hybrid study, we will develop and test an on-site bundled rapid HIV/HCV testing intervention for SUD treatment programs. Its aim is to increase the receipt of HIV and HCV test results among SUD treatment patients. Using a rigorous process involving patients, providers, and program managers, we will incorporate rapid HCV testing into evidence-based HIV testing and linkage to care interventions. We will then test, in a randomized controlled trial, the extent to which this bundled rapid HIV/HCV testing approach increases receipt of HIV and HCV test results. Lastly, we will conduct formative research to understand the barriers to, and facilitators of, the adoption, implementation, and sustainability of the bundled rapid testing strategy in SUD treatment programs. Novel approaches that effectively integrate on-site rapid HIV and rapid HCV testing are needed to address both the HIV and HCV epidemics. If feasible and efficacious, bundled rapid HIV/HCV testing may offer a scalable, potentially cost-effective approach to testing high-risk populations, such as patients of SUD treatment programs. It may ultimately lead to improved linkage to care and progress through the HIV and HCV care and treatment cascades. ClinicalTrials.gov: NCT02355080 . (30 January 2015).
Ličina, Vlado; Akšić, Milica Fotirić; Tomić, Zorica; Trajković, Ivana; Antić Mladenović, Svetlana; Marjanović, Milena; Rinklebe, Jörg
The contemporary reclamation method in an opencast coal mine closure comprises the use of the preserved surface soil layer (SSL) before mining, and can be directly returned to the areas being rehabilitated. The present study emphasizes a risk in the use of such a SSL in mine rehabilitation due to the possible excessive amount of heavy metals which usually derives from a metal-rich sediment or fluvial character of overburden material. This indication was approved by the bioassessment of cadmium (Cd), chromium (Cr), cobalt (Co), copper (Cu), lead (Pb), nickel (Ni), and zinc (Zn) in root and aerial parts of maize (Zea mays), alfalfa (Medicago sativa), sweet clover (Melilotus officinalis), wheat (Triticum aestivum), barley (Hordeum sativum), white clover (Trifolium repens), pasture (Poales sp.), tomato (Solanum lycopersicum), potato (Solanum tuberosum) and carrot (Daucus carota) grown on SSL in the opencast mine area. The fluvial layers of the investigated mine SSL revealed the excessive existence of Ni and Cr, probably of geogenic origin, according to the X-ray diffraction (XRD) which detected Ni- and Cr-bearing minerals in soil fractions. In addition, the highest residual fraction of these two heavy metals, obtained by sequential extraction analyses, together with all other tested soil parameters, supported this assumption. Nevertheless, the accumulations of Cr in tomato fruit (2.93 mg kg(-1)), potato tuber (5.89 mg kg(-1)) and carrot root (7.35 mg kg(-1)) grown on the investigated SSL were found to exceed a critical level of this element for human nutrition. However, despite the evident excess of Ni in the investigated SSL, a similar trend was not found in edible part of plants. The transfer and mobility of the investigated metals was evaluated using the accumulation factor (AF < 1.0) where the root were the preferential organ for the storage of heavy metals. This investigation could bring an important input for its acceptability of use in soil restoration
Osmundson, Todd W; Eyre, Catherine A; Hayden, Katherine M; Dhillon, Jaskirn; Garbelotto, Matteo M
The ubiquity, high diversity and often-cryptic manifestations of fungi and oomycetes frequently necessitate molecular tools for detecting and identifying them in the environment. In applications including DNA barcoding, pathogen detection from plant samples, and genotyping for population genetics and epidemiology, rapid and dependable DNA extraction methods scalable from one to hundreds of samples are desirable. We evaluated several rapid extraction methods (NaOH, Rapid one-step extraction (ROSE), Chelex 100, proteinase K) for their ability to obtain DNA of quantity and quality suitable for the following applications: PCR amplification of the multicopy barcoding locus ITS1/5.8S/ITS2 from various fungal cultures and sporocarps; single-copy microsatellite amplification from cultures of the phytopathogenic oomycete Phytophthora ramorum; probe-based P. ramorum detection from leaves. Several methods were effective for most of the applications, with NaOH extraction favored in terms of success rate, cost, speed and simplicity. Frozen dilutions of ROSE and NaOH extracts maintained PCR viability for over 32 months. DNA from rapid extractions performed poorly compared to CTAB/phenol-chloroform extracts for TaqMan diagnostics from tanoak leaves, suggesting that incomplete removal of PCR inhibitors is an issue for sensitive diagnostic procedures, especially from plants with recalcitrant leaf chemistry. NaOH extracts exhibited lower yield and size than CTAB/phenol-chloroform extracts; however, NaOH extraction facilitated obtaining clean sequence data from sporocarps contaminated by other fungi, perhaps due to dilution resulting from low DNA yield. We conclude that conventional extractions are often unnecessary for routine DNA sequencing or genotyping of fungi and oomycetes, and recommend simpler strategies where source materials and intended applications warrant such use. © 2012 Blackwell Publishing Ltd.
Leite, Eliane D.; Barbosa, Felipe G. de; Szarf, Gilberto; Lederman, Henrique M. [Universidade Federal de Sao Paulo, Department of Diagnostic Imaging, Sao Paulo (Brazil); Seber, Adriana; Ginani, Valeria C.; Carlesse, Fabianne C.; Gouvea, Roseane V.; Zecchin, Victor G.; Carvalho, Cinthya R. [Universidade Federal de Sao Paulo, Division of Pediatric Oncology, Department of Pediatrics, Sao Paulo (Brazil)
Patients undergoing bone marrow transplant (BMT) are at risk for infectious complications, including those of the sinus. Central nervous system (CNS) abnormalities related to the chemotherapy or radiation that the patient received for the treatment of underlying malignancy or to transplant-related effects are also commonly seen. The only effective way to differentiate pre- and post-transplant causes is to have a baseline evaluation prior to the admission for transplant. The current method used to evaluate these patients is head CT. However, CT is not accurate to demonstrate CNS abnormalities and exposes the patient to radiation. MRI, despite better sensitivity for white matter abnormalities, has not been routinely used because of the higher cost and longer duration of the exam. Therefore, we designed a fast, low-cost and radiation-free MRI-based protocol to simultaneously evaluate sinus and brain abnormalities. (orig.)
Full Text Available Many efforts have been made to develop a rapid and sensitive method for phytoplasma and virus detection. Taking our cue from previous works, different rapid sample preparation methods have been tested and applied to Candidatus Phytoplasma prunorum ('Ca. P. prunorum' detection by RT-qPCR. A duplex RT-qPCR has been optimized using the crude sap as a template to simultaneously amplify a fragment of 16S rRNA of the pathogen and 18S rRNA of the host plant. The specific plant 18S rRNA internal control allows comparison and relative quantification of samples. A comparison between DNA and RNA contribution to qPCR detection is provided, showing higher contribution of the latter. The method presented here has been validated on more than a hundred samples of apricot, plum and peach trees. Since 2013, this method has been successfully applied to monitor 'Ca. P. prunorum' infections in field and nursery. A triplex RT-qPCR assay has also been optimized to simultaneously detect 'Ca. P. prunorum' and Plum pox virus (PPV in Prunus.
Leung, Eric T. Y.; Zheng, L.; Wong, Rity Y. K.; Chan, Edward W. C.; Au, T. K.; Chan, Raphael C. Y.; Lui, Grace; Lee, Nelson; Ip, Margaret
Rapid diagnosis and genotyping of Mycobacterium tuberculosis by molecular methods are often limited by the amount and purity of DNA extracted from body fluids. In this study, we evaluated 12 DNA extraction methods and developed a highly sensitive protocol for mycobacterial DNA extraction directly from sputa using surface-coated magnetic particles. We have also developed a novel multiplex real-time PCR for simultaneous identification of M. tuberculosis complex and the Beijing/W genotype (a hypervirulent sublineage of M. tuberculosis) by using multiple fluorogenic probes targeting both the M. tuberculosis IS6110 and the Rv0927c-pstS3 intergenic region. With reference strains and clinical isolates, our real-time PCR accurately identified 20 non-Beijing/W and 20 Beijing/W M. tuberculosis strains from 17 different species of nontuberculosis Mycobacterium (NTM). Further assessment of our DNA extraction protocol and real-time PCR with 335 nonduplicate sputum specimens correctly identified all 74 M. tuberculosis culture-positive specimens. In addition, 15 culture-negative specimens from patients with confirmed tuberculosis were also identified. No cross-reactivity was detected with NTM specimens (n = 31). The detection limit of the assay is 10 M. tuberculosis bacilli, as determined by endpoint dilution analysis. In conclusion, an optimized DNA extraction protocol coupled with a novel multiprobe multiplex real-time PCR for the direct detection of M. tuberculosis, including Beijing/W M. tuberculosis, was found to confer high sensitivity and specificity. The combined procedure has the potential to compensate for the drawbacks of conventional mycobacterial culture in routine clinical laboratory setting, such as the lengthy incubation period and the limitation to viable organisms. PMID:21593264
Background Antibiotic prescribing in dentistry accounts for 9% of total antibiotic prescriptions in Scottish primary care. The Scottish Dental Clinical Effectiveness Programme (SDCEP) published guidance in April 2008 (2nd edition, August 2011) for Drug Prescribing in Dentistry, which aims to assist dentists to make evidence-based antibiotic prescribing decisions. However, wide variation in prescribing persists and the overall use of antibiotics is increasing. Methods RAPiD is a 12-month partial factorial cluster randomised trial conducted in NHS General Dental Practices across Scotland. Its aim is to compare the effectiveness of individualised audit and feedback (A&F) strategies for the translation into practice of SDCEP recommendations on antibiotic prescribing. The trial uses routinely collected electronic healthcare data in five aspects of its design in order to: identify the study population; apply eligibility criteria; carry out stratified randomisation; generate the trial intervention; analyse trial outcomes. Eligibility was determined on contract status and a minimum level of recent NHS treatment provision. All eligible dental practices in Scotland were simultaneously randomised at baseline either to current audit practice or to an intervention group. Randomisation was stratified by single-handed/multi-handed practices. General dental practitioners (GDPs) working at intervention practices will receive individualised graphical representations of their antibiotic prescribing rate from the previous 14 months at baseline and an update at six months. GDPs could not be blinded to their practice allocation. Intervention practices were further randomised using a factorial design to receive feedback with or without: a health board comparator; a supplementary text-based intervention; additional feedback at nine months. The primary outcome is the total antibiotic prescribing rate per 100 courses of treatment over the year following delivery of the baseline
Full Text Available Abstract Background Smoking, excessive alcohol consumption, lack of exercise and an unhealthy diet are the key modifiable factors contributing to premature morbidity and mortality in the developed world. Brief interventions in health care consultations can be effective in changing single health behaviours. General Practice holds considerable potential for primary prevention through modifying patients' multiple risk behaviours, but feasible, acceptable and effective interventions are poorly developed, and uptake by practitioners is low. Through a process of theoretical development, modeling and exploratory trials, we have developed an intervention called Behaviour Change Counselling (BCC derived from Motivational Interviewing (MI. This paper describes the protocol for an evaluation of a training intervention (the Talking Lifestyles Programme which will enable practitioners to routinely use BCC during consultations for the above four risk behaviours. Methods/Design This cluster randomised controlled efficacy trial (RCT will evaluate the outcomes and costs of this training intervention for General Practitioners (GPs and nurses. Training methods will include: a practice-based seminar, online self-directed learning, and reflecting on video recorded and simulated consultations. The intervention will be evaluated in 29 practices in Wales, UK; two clinicians will take part (one GP and one nurse from each practice. In intervention practices both clinicians will receive training. The aim is to recruit 2000 patients into the study with an expected 30% drop out. The primary outcome will be the proportion of patients making changes in one or more of the four behaviours at three months. Results will be compared for patients seeing clinicians trained in BCC with patients seeing non-BCC trained clinicians. Economic and process evaluations will also be conducted. Discussion Opportunistic engagement by health professionals potentially represents a cost effective
..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...
Universal protocol for the rapid automated detection of carbapenem-resistant Gram-negative bacilli directly from blood cultures by matrix-assisted laser desorption/ionisation time-of-flight mass spectrometry (MALDI-TOF/MS).
Oviaño, Marina; Sparbier, Katrin; Barba, Maria José; Kostrzewa, Markus; Bou, Germán
Detection of carbapenemase-producing bacteria directly from blood cultures is a major challenge, as patients with bacteraemia are critically ill. Early detection can be helpful for selection of the most appropriate antibiotic therapy as well as adequate control of outbreaks. In the current study, a novel matrix-assisted laser desorption/ionisation time-of-flight (MALDI-TOF)-based method was developed for the rapid, automated detection of carbapenemase-producing Enterobacteriaceae, Pseudomonas aeruginosa and Acinetobacter baumannii directly from blood cultures. Carbapenemase activity was determined in 30 min by measuring hydrolysis of imipenem (0.31 mg/mL) in blood cultures spiked with a series of 119 previously characterised isolates, 81 of which carried a carbapenemase enzyme (10 blaKPC, 10 blaVIM, 10 blaNDM, 10 blaIMP, 26 blaOXA-48-type, 9 blaOXA-23, 1 blaOXA-237, 3 blaOXA-24 and 2 blaOXA-58). Twenty blood cultures obtained from bacteraemic patients carrying blaOXA-48-producing isolates were also analysed using the same protocol. Analysis was performed using MALDI-TOF Biotyper® Compass software, which automatically provides a result of sensitivity or resistance, calculated as the logRQ or ratio of hydrolysis of the antibiotic. This assay is simple to perform, inexpensive, time saving, universal for Gram-negative bacilli, and highly reliable (overall sensitivity and specificity of 98% and 100%, respectively). Moreover, the protocol could be established as a standardised method in clinical laboratories as it does not require specialised training in mass spectrometry. Copyright © 2016 Elsevier B.V. and International Society of Chemotherapy. All rights reserved.
Specht, W.L. [Westinghouse Savannah River Co., Aiken, SC (United States). Savannah River Technology Center; Sydow, S.N. [Clemson Univ., SC (United States)
Studies were conducted to assess the feasibility of using the earthworm, Eisenia foetida, to evaluate the toxicity of contaminated soils at the Savannah River Site. Survival was assessed in several uncontaminated soils, including sandy loams and clayey loams, as well as in soils contaminated with coal fines, ash, diesel fuel, and heavy metals. In addition, behavior responses, changes in biomass, and bioaccumulation of heavy metals were assessed as sublethal indicators of toxicity. The results indicate excellent survival of Eisenia foetida in uncontaminated sandy and clayey soils. No amendment of these uncontaminated soils or addition of food was necessary to sustain the worms for the 14-day test period. In contaminated soils, no significant mortality was observed, except in soils which have very low pH (< 3). However, sublethal responses were observed in earthworms exposed to several of the contaminated soils. These responses included worms clumping on the surface of the soil, worms clumping between the sides of the test container and the soil, increased burrowing times, reductions in biomass, and elevated concentrations of heavy metals in worm tissue.
Waite, I.R.; Herlihy, A.T.; Larsen, D.P.; Urquhart, N.S.; Klemm, D.J.
1. During late spring 1993-1995, the U.S. Environmental Protection Agency's Environmental Monitoring and Assessment Program (EMAP) sampled 490 wadeable streams in the mid-Atlantic Highlands (MAH) of the U.S. for a variety of physical, chemical and biological indicators of environmental condition. We used the resulting data set to evaluate the importance of differing levels of macroinvertebrate taxonomic resolution in bioassessments by comparing the ability of family versus genus to detect differences among sites classified by type and magnitude of human impact and by stream size. We divided the MAH into two physiographic regions: the Appalachian Plateau where mine drainage (MD) and acidic deposition are major stressors, and the Ridge and Valley where nutrient enrichment is a major stressor. Stream sites were classified into three or four impact classes based on water chemistry and habitat. We used stream order (first to third Strahler order) in each region as a measure of stream size. Ordination, 2 x 2 chi-square and biotic metrics were used to compare the ability of family and genus to detect differences among both stressor and size classes. 2. With one notable exception, there were only a small number of different genera per family (interquartile range = 1-4). Family Chironomidae, however, contained 123 different genera. As a result, significant information loss occurred when this group was only classified to family. The family Chironomidae did not discriminate among the predefined classes but many chironomid genera did: by chi-square analysis, 10 and 28 chironomid genera were significant in discriminating MD and nutrient impacts, respectively. 3. Family and genus data were similar in their ability to distinguish among the coarse impacts (e.g. most severe versus least severe impact classes) for all cases. Though genus data in many cases distinguished the subtler differences (e.g. mixed/moderate impacts versus high or low impacts) better than family, differences
Geisler, Martin Joakim Bittel
implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... real-world cases, a large probability of being caught is sufficient to prevent the adversary from trying to cheat. We show how to compile a passively secure protocol for honest majority into a protocol that is secure against covert attacks, again for honest majority. The transformed protocol catches...... cheating with probability 1/4 . Though we present no implementation of this compiler, we believe it will be very efficient and practical to implement using, say, VIFF. The cost of the modified protocol is essentially twice that of the original plus an overhead that only depends on the number of inputs. We...
Mar 1, 2013 ... STLODGSTT protocol uses static value of threshold bandwidth to allocate available bandwidth to the asynchronous traffic, as such, the ... 12, 13 ] SAFENET , Manufacturing Automation. Protocol (MAP) , High-Speed ... the threshold bandwidth used in allocating available bandwidth to the n heavily ...
Horwell, C J; Baxter, P J; Hillman, S E; Calkins, J A; Damby, D E; Delmelle, P; Donaldson, K; Dunster, C; Fubini, B; Kelly, F J; Le Blond, J S; Livi, K J T; Murphy, F; Nattrass, C; Sweeney, S; Tetley, T D; Thordarson, T; Tomatis, M
The six week eruption of Eyjafjallajökull volcano in 2010 produced heavy ash fall in a sparsely populated area of southern and south eastern Iceland and disrupted European commercial flights for at least 6 days. We adopted a protocol for the rapid analysis of volcanic ash particles, for the purpose of informing respiratory health risk assessments. Ash collected from deposits underwent a multi-laboratory physicochemical and toxicological investigation of their mineralogical parameters associated with bio-reactivity, and selected in vitro toxicology assays related to pulmonary inflammatory responses. Ash from the eruption of Grímsvötn, Iceland, in 2011 was also studied. The results were benchmarked against ash from Soufrière Hills volcano, Montserrat, which has been extensively studied since the onset of eruptive activity in 1995. For Eyjafjallajökull, the grain size distributions were variable: 2-13 vol% of the bulk samples were <4 µm, with the most explosive phases of the eruption generating abundant respirable particulate matter. In contrast, the Grímsvötn ash was almost uniformly coarse (<3.5 vol%<4 µm material). Surface area ranged from 0.3 to 7.7 m2 g(-1) for Eyjafjallajökull but was very low for Grímsvötn (<0.6 m2 g(-1)). There were few fibre-like particles (which were unrelated to asbestos) and the crystalline silica content was negligible in both eruptions, whereas Soufrière Hills ash was cristobalite-rich with a known potential to cause silicosis. All samples displayed a low ability to deplete lung antioxidant defences, showed little haemolysis and low acute cytotoxicity in human alveolar type-1 like epithelial cells (TT1). However, cell-free tests showed substantial hydroxyl radical generation in the presence of hydrogen peroxide for Grímsvötn samples, as expected for basaltic, Fe-rich ash. Cellular mediators MCP-1, IL-6, and IL-8 showed chronic pro-inflammatory responses in Eyjafjallajökull, Grímsvötn and Soufrière Hills samples
F. Arbab (Farhad)
textabstractTreating interaction as an explicit first-class concept, complete with its own composition operators, leads to a model of concurrency that allows direct specification and manipulation of protocols as proper mathematical objects. Reo [2,5,6,8] serves as a premier example of such an
Rapid Ecological Assessment Methods for Forests in the Laurentian Mixed Forest-Great Lakes Coastal Biological Network, Midwest Region, National Wildlife Refuge System, US Fish & Wildlife Service Midwest Region - Survey Protocol Framework: First Edition (2014)
US Fish and Wildlife Service, Department of the Interior — This protocol framework provides guidance for conducting Inventories of forests at multiple stations within a region. During 2010 and 2011, six refuges of the...
Gravel, Guillaume; Hernigou, Anne [Hopital Europeen Georges Pompidou, Assistance Publique-Hopitaux de Paris, Service de Radiologie, Paris (France); Niccoli, Patricia [Centre Hospitalier Universitaire la Timone, Assistance Publique-Hopitaux de Marseille, Service d' Endocrinologie, Diabete et Maladies Metaboliques, Marseille (France); Rohmer, Vincent [Centre Hospitalier Universitaire d' Angers, Service d' Endocrinologie, Diabetologie, Nutrition, Angers (France); LUNAM Universite, INSERM, U1063, Angers (France); Moulin, Guy [Centre Hospitalier Universitaire la Timone, Assistance Publique-Hopitaux de Marseille, Service de Radiologie, Marseille (France); Borson-Chazot, Francoise [Federation d' Endocrinologie, Hospices civils de Lyon, Groupement Hospitalier Est, Lyon (France); Universite de Lyon, Faculte de Medecine Lyon-Est, Lyon (France); Cancer Research Center of Lyon, INSERM UMR1052, UMR CNRS 5286, Lyon (France); Rousset, Pascal [Hospices civils de Lyon, Groupement Hospitalier Est, Service de Radiologie, Lyon (France); Pasco-Papon, Anne [Centre Hospitalier Universitaire d' Angers, Service de Radiologie, Angers (France); Marcus, Claude [Centre Hospitalo-Universitaire de Reims, Service de Radiologie, Reims (France); Dubrulle, Frederique [Centre Hospitalo-Universitaire de Lille, Service de Radiologie, Lille (France); Gouya, Herve [Hopital Cochin, Assistance Publique-Hopitaux de Paris, Service de Radiologie, Paris (France); Bidault, Francois [Institut Gustave Roussy, Service de Radiologie, Villejuif (France); Dupas, Benoit [Centre Hospitalo-Universitaire de Nantes, Service de Radiologie, Nantes (France); Gabrillargues, Jean [Centre Hospitalo-Universitaire de Clermont-Ferrand, Service de Neuroradiologie, Clermont Ferrand (France); Caumont-Prim, Aurore [Unite d' Epidemiologie et de Recherche Clinique, Assistance Publique-Hopitaux de Paris, Hopital Europeen Georges Pompidou, Paris (France); Centre d' investigation Epidemiologique 4, INSERM, Paris (France); Gimenez-Roqueplo, Anne-Paule [Hopital Europeen Georges Pompidou, Assistance Publique-Hopitaux de Paris, Service de Genetique, Paris (France); Paris Cardiovascular Research Center, INSERM, UMR970, Paris (France); Universite Paris Descartes, Sorbonne Paris Cite, Faculte de Medecine, Paris (France); Halimi, Philippe [Hopital Europeen Georges Pompidou, Assistance Publique-Hopitaux de Paris, Service de Radiologie, Paris (France); Universite Paris Descartes, Sorbonne Paris Cite, Faculte de Medecine, Paris (France)
To assess the performance of a simplified MRI protocol consisting of a contrast-enhanced three-dimensional MR angiography (CE-MRA) in association with a post-contrast T1-weighted sequence (T1WIV) for the detection of HNPGLs in SDHx mutation carriers. This retrospective sub-study is based on the multicenter PGL.EVA cohort, which prospectively enrolled SDHx mutation carriers from 2005 to 2009; 157 index cases or relatives were included. CE-MRA and the T1WIV images were read solely with knowledge of the clinical data but blind to the diagnosis. Sensitivity, specificity and likelihood ratios for the simplified MRI protocol were compared to the full MRI protocol reading results and to the gold standard status obtained through the consensus of an expert committee. The sensitivity and specificity of the readings of the simplified MRI protocol were, respectively, 88.7 % (95 % CI = 78.1-95.3) and 93.7 % (95 % CI = 86.8-97.7) versus 80.7 % (95 % CI = 68.6-89.6) and 94.7 % (95 % CI = 88.1-98.3) for the readings of the full MRI protocol. The simplified post-contrast MRI with shorter duration (5 to 10 minutes) showed no performance difference compared to the lengthy standard full MRI and can be proposed for the detection of head and neck paragangliomas (HNPGLs) in SDHx mutation carriers. (orig.)
The suitability of using macroinvertebrates as bioindicators of stream water quality was tested in the Mkondoa River in an agricultural area at Kilosa, using the rapid bioassessment protocol. The family biotic index (FBI) showed marked variation in water quality along the stream from values ranging from 4.1 to 5.0 in the ...
Rapid Bioassessment Protocols (RBP) using some biometric indices including taxa richness, Ephemeroptera, Plecoptera, and Trichoptera (EPT) taxa richness, EPT to total ratio, Hilsenhoff's Biotic Index (HBI) and Percent Model Affinity Score (PMAS) were employed in assessment of the water quality of the Benin River.
Protocol: a fast, comprehensive and reproducible one-step extraction method for the rapid preparation of polar and semi-polar metabolites, lipids, proteins, starch and cell wall polymers from a single sample.
Salem, Mohamed A; Jüppner, Jessica; Bajdzienko, Krzysztof; Giavalisco, Patrick
The elucidation of complex biological systems requires integration of multiple molecular parameters. Accordingly, high throughput methods like transcriptomics, proteomics, metabolomics and lipidomics have emerged to provide the tools for successful system-wide investigations. Unfortunately, optimized analysis of different compounds requires specific extraction procedures in combination with specific analytical instrumentation. However, the most efficient extraction protocols often only cover a restricted number of compounds due to the different physico-chemical properties of these biological compounds. Consequently, comprehensive analysis of several molecular components like polar primary metabolites next to lipids or proteins require multiple aliquots to enable the specific extraction procedures required to cover these diverse compound classes. This multi-parallel sample handling of different sample aliquots is therefore not only more sample intensive, it also requires more time and effort to obtain the required extracts. To circumvent large sample amounts, distributed into several aliquots for the comprehensive extraction of most relevant biological compounds, we developed a simple, robust and reproducible two-phase liquid-liquid extraction protocol. This one-step extraction protocol allows for the analysis of polar-, semi-polar and hydrophobic metabolites, next to insoluble or precipitated compounds, including proteins, starch and plant cell wall components, from a single sample. The method is scalable regarding the used sample amounts but also the employed volumes and can be performed in microcentrifuge tubes, enabling high throughput analysis. The obtained fractions are fully compatible with common analytical methods, including spectroscopic, chromatographic and mass spectrometry-based techniques. To document the utility of the described protocol, we used 25 mg of Arabidopsis thaliana rosette leaves for the generation of multi-omics data sets, covering
École thématique; Quantum Information, Computation and Complexity * Programme at the Institut Henri Poincaré, January 4th – April 7th, 2006 * Organizers: Ph.Grangier, M.Santha and D.L.Shepelyansky * Lectures have been filmed by Peter Rapcan and Michal Sedlak from Bratislava with the support of the Marie Curie RTN "CONQUEST" A trimester at the Centre Emile Borel - Institut Henri Poincaré is devoted to modern developments in a rapidly growing field of quantum information and communication, quan...
Michiels, Sam; Mahieu, Tom; Matthijs, Frank; Verbaeten, Pierre
This paper presents a generic addressing framework (GAF) which enables the development of protocol stack independent applications. This framework has been developed in the context of dynamic protocol stack composition. Having a way to compose and build protocol stacks is not sufficient. The protocol layers a stack is composed of have an impact on the addressing used inside the stack. Since addresses are used by applications, the impact of modifying the stack dynamically is not automaticall...
Background Rapid conversion of atrial fibrillation (AF) to sinus rhythm may be achieved by the administration of class IA, IC and III antiarrhythmic drugs or vernakalant hydrochloride. However, that treatment may be related to potential pro-arrhythmia, lack of efficacy or the exceptionally high cost of a compound used. Antazoline is a first generation antihistaminic agent with chinidin-like properties. When administered intravenously, antazoline exerts a strong antiarrhythmic effect on supraventricular arrhythmia, especially on AF, facilitating rapid conversion to sinus rhythm. Despite a relative lack of published data antazoline has been marketed in Poland and widely used in cardiology wards and emergency rooms for many years due to its efficacy, safety and rapid onset of action within minutes of administration. Methods/design A randomized, double blind, placebo-controlled, superiority clinical trial was designed to assess clinical efficacy of antazoline in rapid conversion of AF to sinus rhythm. Eligible patients will present AF lasting less than 43 hours, will be in stable cardio-pulmonary condition and will have no prior history of advanced heart failure or significant valvular disease. Long-term antiarrhythmic therapy is not considered an exclusion criterion. Subjects who fulfill selection criteria will be randomly assigned to receive intravenously either antazoline or placebo in divided doses and observed for 1.5 hours after conversion to sinus rhythm or after the last i.v. bolus. Primary end point will be the conversion of AF to sinus rhythm confirmed in an electrocardiogram (ECG) during the observation period. Secondary end points will be comprised of time to conversion and return of AF during the observation period. Special consideration will be given to the observation of any adverse events. A sample size of 80 patients was calculated based on the following assumptions: two-tailed test, a type I error of 0.01, a power of 90%, efficacy of placebo 5
Farkowski, Michal M; Maciag, Aleksander; Dabrowski, Rafal; Pytkowski, Mariusz; Kowalik, Ilona; Szwed, Hanna
Rapid conversion of atrial fibrillation (AF) to sinus rhythm may be achieved by the administration of class IA, IC and III antiarrhythmic drugs or vernakalant hydrochloride. However, that treatment may be related to potential pro-arrhythmia, lack of efficacy or the exceptionally high cost of a compound used. Antazoline is a first generation antihistaminic agent with chinidin-like properties. When administered intravenously, antazoline exerts a strong antiarrhythmic effect on supraventricular arrhythmia, especially on AF, facilitating rapid conversion to sinus rhythm. Despite a relative lack of published data antazoline has been marketed in Poland and widely used in cardiology wards and emergency rooms for many years due to its efficacy, safety and rapid onset of action within minutes of administration. A randomized, double blind, placebo-controlled, superiority clinical trial was designed to assess clinical efficacy of antazoline in rapid conversion of AF to sinus rhythm. Eligible patients will present AF lasting less than 43 hours, will be in stable cardio-pulmonary condition and will have no prior history of advanced heart failure or significant valvular disease. Long-term antiarrhythmic therapy is not considered an exclusion criterion. Subjects who fulfill selection criteria will be randomly assigned to receive intravenously either antazoline or placebo in divided doses and observed for 1.5 hours after conversion to sinus rhythm or after the last i.v. bolus. Primary end point will be the conversion of AF to sinus rhythm confirmed in an electrocardiogram (ECG) during the observation period. Secondary end points will be comprised of time to conversion and return of AF during the observation period. Special consideration will be given to the observation of any adverse events. A sample size of 80 patients was calculated based on the following assumptions: two-tailed test, a type I error of 0.01, a power of 90%, efficacy of placebo 5%, efficacy of antazoline 50% and
Farkowski Michal M
Full Text Available Abstract Background Rapid conversion of atrial fibrillation (AF to sinus rhythm may be achieved by the administration of class IA, IC and III antiarrhythmic drugs or vernakalant hydrochloride. However, that treatment may be related to potential pro-arrhythmia, lack of efficacy or the exceptionally high cost of a compound used. Antazoline is a first generation antihistaminic agent with chinidin-like properties. When administered intravenously, antazoline exerts a strong antiarrhythmic effect on supraventricular arrhythmia, especially on AF, facilitating rapid conversion to sinus rhythm. Despite a relative lack of published data antazoline has been marketed in Poland and widely used in cardiology wards and emergency rooms for many years due to its efficacy, safety and rapid onset of action within minutes of administration. Methods/design A randomized, double blind, placebo-controlled, superiority clinical trial was designed to assess clinical efficacy of antazoline in rapid conversion of AF to sinus rhythm. Eligible patients will present AF lasting less than 43 hours, will be in stable cardio-pulmonary condition and will have no prior history of advanced heart failure or significant valvular disease. Long-term antiarrhythmic therapy is not considered an exclusion criterion. Subjects who fulfill selection criteria will be randomly assigned to receive intravenously either antazoline or placebo in divided doses and observed for 1.5 hours after conversion to sinus rhythm or after the last i.v. bolus. Primary end point will be the conversion of AF to sinus rhythm confirmed in an electrocardiogram (ECG during the observation period. Secondary end points will be comprised of time to conversion and return of AF during the observation period. Special consideration will be given to the observation of any adverse events. A sample size of 80 patients was calculated based on the following assumptions: two-tailed test, a type I error of 0.01, a power of 90
Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar
This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....
What stops hospital clinical staff from following protocols? An analysis of the incidence and factors behind the failure of bedside clinical staff to activate the rapid response system in a multi-campus Australian metropolitan healthcare service.
Shearer, Bill; Marshall, Stuart; Buist, Michael David; Finnigan, Monica; Kitto, Simon; Hore, Tonina; Sturgess, Tamica; Wilson, Stuart; Ramsay, Wayne
To explore the causes of failure to activate the rapid response system (RRS). The organisation has a recognised incidence of staff failing to act when confronted with a deteriorating patient and leading to adverse outcomes. A multi-method study using the following: a point prevalence survey to determine the incidence of abnormal simple bedside observations and activation of the rapid response team by clinical staff; a prospective audit of all patients experiencing a cardiac arrest, unplanned intensive care unit admission or death over an 8-week period; structured interviews of staff to explore cognitive and sociocultural barriers to activating the RRS. Southern Health is a comprehensive healthcare network with 570 adult in-patient beds across four metropolitan teaching hospitals in the south-eastern sector of Melbourne. Frequency of physiological instability and outcomes within the in-patient hospital population. Qualitative data from staff interviews were thematically coded. The incidence of physiological instability in the acute adult population was 4.04%. Nearly half of these patients (42%) did not receive an appropriate clinical response from the staff, despite most (69.2%) recognising their patient met physiological criteria for activating the RRS, and being 'quite', or 'very' concerned about their patient (75.8%). Structured interviews with 91 staff members identified predominantly sociocultural reasons for failure to activate the RRS. Despite an organisational commitment to the RRS, clinical staff act on local cultural rules within the clinical environment that are usually not explicit. Better understanding of these informal rules may lead to more appropriate activation of the RRS.
relative health of the ecosystem. The IBI, though originally for Midwestern streams, has been successfully adapted to other ecoregions and taxa (macroinvertebrates, Lombard and Goldstein, 2004) and has become an important tool for scientists and regulatory agencies alike in determining health of stream ecosystems. The IBI is a specific type of a larger group of methods and procedures referred to as Rapid Bioassessment (RBA). These protocols have the advantage of directly measuring the organisms affected by system perturbations, thus providing an integrated evaluation of system health because the organisms themselves integrate all aspects of their environment and its condition. In addition to the IBI, the RBA concept has also been applied to seep wetlands (Paller et al. 2005) and terrestrial systems (O'Connell et al. 1998, Kremen et al. 1993, Rodriguez et al. 1998, Rosenberg et al. 1986). Terrestrial RBA methods have lagged somewhat behind those for aquatic systems because terrestrial systems are less distinctly defined and seem to have a less universal distribution of an all-inclusive taxon, such as fish in the IBI, upon which to base an RBA. In the last decade, primarily in Australia, extensive development of an RBA using ant communities has shown great promise. Ants have the same advantage for terrestrial RBAs that fish do for aquatic systems in that they are an essential and ubiquitous component of virtually all terrestrial ecosystems. They occupy a broad range of niches, functional groups, and trophic levels and they possess one very important characteristic that makes them ideal for RBA because, similar to the fishes, there is a wide range of tolerance to conditions within the larger taxa. Within ant communities there are certain groups, genera, or species that may be very robust and abundant under even the harshest impacts. There are also taxa that are very sensitive to disturbance and change and their presence or absence is also indicative of the local
Development of a Decision Aid for Cardiopulmonary Resuscitation Involving Intensive Care Unit Patients' and Health Professionals' Participation Using User-Centered Design and a Wiki Platform for Rapid Prototyping: A Research Protocol.
Plaisance, Ariane; Witteman, Holly O; Heyland, Daren Keith; Ebell, Mark H; Dupuis, Audrey; Lavoie-Bérard, Carole-Anne; Légaré, France; Archambault, Patrick Michel
Cardiopulmonary resuscitation (CPR) is an intervention used in cases of cardiac arrest to revive patients whose heart has stopped. Because cardiac arrest can have potentially devastating outcomes such as severe neurological deficits even if CPR is performed, patients must be involved in determining in advance if they want CPR in the case of an unexpected arrest. Shared decision making (SDM) facilitates discussions about goals of care regarding CPR in intensive care units (ICUs). Patient decision aids (DAs) are proven to support the implementation of SDM. Many patient DAs about CPR exist, but they are not universally implemented in ICUs in part due to lack of context and cultural adaptation. Adaptation to local context is an important phase of implementing any type of knowledge tool such as patient DAs. User-centered design supported by a wiki platform to perform rapid prototyping has previously been successful in creating knowledge tools adapted to the needs of patients and health professionals (eg, asthma action plans). This project aims to explore how user-centered design and a wiki platform can support the adaptation of an existing DA for CPR to the local context. The primary objective is to use an existing DA about CPR to create a wiki-based DA that is adapted to the context of a single ICU and tailorable to individual patient's risk factors while employing user-centered design. The secondary objective is to document the use of a wiki platform for the adaptation of patient DAs. This study will be conducted in a mixed surgical and medical ICU at Hôtel-Dieu de Lévis, Quebec, Canada. We plan to involve all 5 intensivists and recruit at least 20 alert and oriented patients admitted to the ICU and their family members if available. In the first phase of this study, we will observe 3 weeks of daily interactions between patients, families, intensivists, and other allied health professionals. We will specifically observe 5 dyads of attending intensivists and alert
.... Because of this, analysis of the protocol outside the encryption is becoming more important. Recent work by Joshua Guttman and others 9 have identified several properties that good protocols often exhibit...
Cipolat-Gotet, C; Cecchinato, A; Stocco, G; Bittante, G
powerful research tool that allows the rapid, inexpensive, and partly automated analysis processing 40 samples per day with 2 replicates each, using 1 lacto-dynamograph, 2 heaters, and 3 modified sample racks, and yields a complete picture of the cheesemaking process (e.g., milk gelation, curd firming, syneresis, and whey expulsion) as well as the cheese yield and the efficiency of energy or nutrients retention in the cheese or loss in the whey. Copyright © 2016 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.
Javelin, a Lone Peak Engineering Inc. Company has introduced the SteamRoller(TM) System as a commercial product. The system was designed by Javelin during a Phase II NASA funded small commercial product. The purpose of the invention was to allow automated-feed of flexible ceramic tapes to the Laminated Object Manufacturing rapid prototyping equipment. The ceramic material that Javelin was working with during the Phase II project is silicon nitride. This engineered ceramic material is of interest for space-based component.
Vugt, R. van; Kool, D.R.; Lubeek, S.F.K.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.
OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt
Pathogen identification is a crucial first defense against bioterrorism. A major emphasis of our national biodefense strategy is to establish fast, accurate and sensitive assays for diagnosis of infectious diseases agents. Such assays will ensure early and appropriate treatment of infected patients. Rapid diagnostics can also support infection control measures, which monitor and limit the spread of infectious diseases agents. Many select agents are highly transmissible in the early stages of disease, and it is critical to identify infected patients and limit the risk to the remainder of the population and to stem potential panic in the general population. Nucleic acid-based molecular approaches for identification overcome many of the deficiencies associated with conventional culture methods by exploiting both large- and small-scale genomic differences between organisms. PCR-based amplification of highly conserved ribosomal RNA (rRNA) genes, intergenic sequences, and specific toxin genes is currently the most reliable approach for bacterial, fungal and many viral pathogenic agents. When combined with fluorescence-based oligonucleotide detection systems, this approach provides real-time, quantitative, high fidelity analysis capable of single nucleotide allelic discrimination (4). These probe systems offer rapid turn around time (<2 h) and are suitable for high throughput, automated multiplex operations that are critical for clinical diagnostic laboratories. In this pilot program, we have used molecular beacon technology invented at the Public health Research Institute to develop a new generation of molecular probes to rapidly detect important agents of infectious diseases. We have also developed protocols to rapidly extract nucleic acids from a variety of clinical specimen including and blood and tissue to for detection in the molecular assays. This work represented a cooperative research development program between the Kramer-Tyagi/Perlin labs on probe development
Nikolay A. Moldovyan
Full Text Available Using the digital signature (DS scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS protocol represents a particular implementation of the blind multisignature schemes that is a novel type of the signature schemes. The proposed protocols are the first implementations of the multisignature schemes based on Belarusian signature standard.
Sasnauskas, Raimondas; Weingaertner, Elias
In a layered communication architecture, transport layer protocols handle the data exchange between processes on different hosts over potentially lossy communication channels. Typically, transport layer protocols are either connection-oriented or are based on the transmission of individual datagrams. Well known transport protocols are the connection-oriented Transmission Control Protocol (TCP)  and the User Datagram Protocol (UDP)  as well as the Stream Control Transmission Protocol (SCTP)  and DCCP, the Datagram Congestion Control Protocol . In this chapter, we focus on the modeling process of the transport layer. While we mostly use TCP and UDP as a base of comparison from this point, we emphasize that the methodologies discussed further on are conferrable to virtually any transport layer in any layered communication architecture.
Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.
In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.
Full Text Available Distraction osteogenesis method (Do in bone lengthening and rapid midpalatal expansion have shown the great ability of osteognic tissues for rapid bone formation under distraction force and special protocol with optimum rate of one millimeter per day. Periodontal membrane of teeth (PDM is the extension of periostium in the alveolar socked. Orthodontic force distracts PDM fibers in the tension side and then bone formation will begin.Objects: Rapid retraction of canine tooth into extraction space of first premolar by DO protocol in order to show the ability of the PDM in rapid bone formation. The other objective was reducing total orthodontic treatment time of extraction cases.Patients and Methods: Tweleve maxillary canines in six patients were retracted rapidly in three weeks by a custom-made tooth-born appliance. Radiographic records were taken to evaluate the effects of heavy applied force on canine and anchorage teeth.Results: Average retraction was 7.05 mm in three weeks (2.35 mm/week. Canines rotated distal- in by mean 3.5 degrees.Anchorage loss was from 0 to 0.8 mm with average of 0.3 mm.Root resorption of canines was negligible, and was not significant clinically. Periodontium was normal after rapid retraction. No hazard for pulp vitality was observed.Discussion: PDM responded well to heavy distraction force by Do protocol. Rapid canine retraction seems to be a safe method and can considerabely reduce orthodontic time.
Nwhator, S O; Uhunmwangho, I
This is a review paper intended to develop a simple protocol for the comprehensive yet rapid assessment of halitosis. An extensive protocol was developed through a review of literature to identify all possible etiological factors as have been identified by previous workers. The resulting protocol was presented as a form including extensive medical and dental history as well as oral and periodontal examination. Relevant medical aspects, an otolaryngology (ENT) consultation section as well as a gastrointestinal consultation were also included. Every bit of evidence gathered from literature was included in order to develop a list that's as inclusive of all possible contributing factors as possible. Factors discovered from the experience of the authors were also included in the protocol. A long list of factors was identified in literature including medical, dental, periodontal, diet and others. All these were included in the resulting form and a pre-evaluation checklist was also included. Halitosis is multifaceted in etiology. A simple easy-to-use protocol helps in an extensive yet rapid evaluation of halitosis.
CFG , we can build a LALR parser to parse the symbolized traffic data sets. After symbolization, we parse the training data sets to estimate a PCFG...HMMs to represent protocols in network, we have one assumption that the protocol has finite state. For context-free grammars ( CFGs ), they are in a...by a CFG , so it is more reasonable to use CFGs to model protocols. We started research with Probabilistic CFGs , where each production rule is
Full Text Available The development of methods to assemble nucleosomes from recombinant histones decades ago has transformed chromatin research. Nevertheless, nucleosome reconstitution remains time consuming to this day, not least because the four individual histones must be purified first. Here, we present a streamlined purification protocol of recombinant histones from bacteria. We termed this method "rapid histone purification" (RHP as it circumvents isolation of inclusion bodies and thereby cuts out the most time-consuming step of traditional purification protocols. Instead of inclusion body isolation, whole cell extracts are prepared under strongly denaturing conditions that directly solubilize inclusion bodies. By ion exchange chromatography, the histones are purified from the extracts. The protocol has been successfully applied to all four canonical Drosophila and human histones. RHP histones and histones that were purified from isolated inclusion bodies had similar purities. The different purification strategies also did not impact the quality of octamers reconstituted from these histones. We expect that the RHP protocol can be readily applied to the purification of canonical histones from other species as well as the numerous histone variants.
Two hundred and ninety-six samples of one person-hour work each, comprised of five methods (vegetation beating, sweep netting, aerial hand collecting, ground hand collecting and leaf litter sifting) were divided between four relatively homogenous sites (plant communities) within a vegetation type of the BNR and WSC, ...
Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.
Marker assisted selection is an effective technique for quality traits selection in breeding program which are impossible by visual observation. Marker assisted selection in early generation requires rapid DNA extraction protocol for large number of samples in a low cost approach. A rapid and inexpensive DNA extraction ...
particular a source or destination of messages from the point of view of the communicatio network. identification An Internet Protocol field. This...15-( RFC- 793 "* •TRANSMISSION CONTROL PROTOCOL ’-v DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 S... INTERNET PROGRAM PROTOCOL SPECIFICATION 1. INTRODUCTION The Transmission Control Protocol (TCP) is intended for use as a highly reliable host-to-host
Bentall, M; Turton, B
Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o
DeYoung, Henry; Schürmann, Carsten
Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification....... In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise...
Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.
peer-reviewed Along with the recent rapid development of Wireless Sensor Network (WSN) systems, the range of attacks against WSN routing protocols have grown. As a result, there is an increased need for secure WSN routing protocols. WSN routing protocols should be secured once they are involved in sensitive data transmission. However, secure routing protocols require extra time and energy for security computations. Further, due to the limited power supply of WSN nodes, it is useful to theo...
On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.
Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.; Mader, Angelika H.
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols
Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.; Mader, Angelika H.
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols
Groß, Thomas; Mödersheim, Sebastian Alexander
composition, and it is truly commonplace in today’s communication with the diversity of VPNs and secure browser sessions. In fact, it is normal that we have several layers of secure channels: For instance, on top of a VPN-connection, a browser may establish another secure channel (possibly with a different...... end point). Even using the same protocol several times in such a stack of channels is not unusual: An application may very well establish another TLS channel over an established one. We call this selfcomposition. In fact, there is nothing that tells us that all these compositions are sound, i.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...
In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...
In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...
that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including......In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...
Cline, Abigail; Jajosky, Ryan; Shikle, James; Bollag, Roni
Acute myeloid leukemia (AML) is a malignancy characterized by rapid clonal proliferation of myeloid precursors, which can result in hyperleukocytosis. Leukapheresis can be used to rapidly reduce the white blood cell count (WBC). However, the only FDA cleared device for WBC depletion, the COBE Spectra, will no longer be supported by the manufacturer in 2017, and there are few studies comparing different methods of leukapheresis. A 68-year-old African American female was admitted to the hospital for relapse of her AML. Laboratory data demonstrated a WBC count of 291 600/μL and flow cytometry of the peripheral blood demonstrated 85% myeloid blasts. Leukapheresis was ordered to help treat the leukostasis. Three different apheresis protocols were used to achieve cytoreduction: Spectra Optia mononuclear collection (MNC) protocol, Spectra Optia granulocyte collection (PMN) protocol, and Therakos CELLEX buffy coat collection without return. Due to different inlet flow rates, the procedures were evaluated based on the number of WBCs collected and volume of blood processed (VBP). The Spectra Optia PMN collected the most WBCs and collected nearly as many WBCs per VBP as the Therakos CELLEX, which had the highest value. To our knowledge, we are reporting the first use of Therakos CELLEX and Spectra Optia PMN protocol for WBC depletion. While the Spectra Optia granulocyte protocol showed the best performance for this AML patient, further studies will be needed to compare the Spectra Optia PMN protocol to the MNC protocol for AML patients. © 2017 Wiley Periodicals, Inc.
Redman, Mary W; Allegra, Carmen J
During the past decade, biomedical technologies have undergone an explosive evolution-from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars-to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next-generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demands the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study). Copyright © 2015 Elsevier Inc. All rights reserved.
This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...
de Barros Barbosa, Ciro; de barros Barbosa, C.; Ferreira Pires, Luis; Pires, L.F.; van Sinderen, Marten J.
This paper reports on the development of a catalogue of frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be re-used in the implementation of various different concrete systems in this domain. By using frameworks we aim
Cooper, T.; Claxton, S; Hill, H; Holbrook, K; Hughes, M.; Knox, A.; Oxborrow, L; Nottingham Trent University
The Clothing Longevity Protocol offers guidelines for good practice in order to aid moves towards garments that will last longer and thus to help protect brand value, screen out garments which fail prematurely and reduce the environmental impact of the clothing sector.
Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.
This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…
Full Text Available While pulmonary tuberculosis (PTB remains an important public health issue worldwide, there is an emerging interest in non-tuberculous mycobacteria (NTM which is responsible for opportunistic infections of the respiratory tract as well as other anatomical sites in both developed and developing countries. In this context the one goal of the clinical mycobacteriology laboratories is to provide physicians with an accurate identification of the mycobacterium as rapidly as possible. During the last ten years, several lines of laboratory tools have been developed in order to speed the isolation and identification of mycobacteria from clinical specimens. Chiefly, the composition of culture medium was renewed along with the protocol of incubation in order to recover Mycobacterium tuberculosis (MTB micro-colonies as soon as 48 h after the inoculation of the specimen. MALDI-TOF rapid identification is clearly the tool to be implemented in the laboratory for the rapid identification of the micro-colonies. Also, molecular tools and genomics are necessary in order to depict new mycobacteria species, including those of the Mycobacterium abscessus complex and the Mycobacterium avium complex. All these tools and their connections will be presented during this conference.
Eddie Law, K. L.
Transmission control protocol (TCP) provides reliable connection-oriented services between any two end systems on the Internet. With TCP congestion control algorithm, multiple TCP connections can share network and link resources simultaneously. These TCP congestion control mechanisms have been operating effectively in wired networks. However, performance of TCP connections degrades rapidly in wireless and lossy networks. To sustain the throughput performance of TCP connections in wireless networks, design modifications may be required accordingly in the TCP flow control algorithm, and potentially, in association with other protocols in other layers for proper adaptations. In this chapter, we explain the limitations of the latest TCP congestion control algorithm, and then review some popular designs for TCP connections to operate effectively in wireless mesh network infrastructure.
Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan
NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.
This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees. • Provides detailed coverage of symmetric key protocols • Describes various applications of symmetric building blocks • Includes strategies for constructing compact and efficient digests of dynamic databases
Meldgaard, Sigurd Torkel
This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...... the bottleneck of sorting networks. And we show how to utilize this construction for four-player MPC. Another line of work has results about the power of correlated randomness; meaning in a preprocessing phase the participants in a MPC protocol receive samples from some joint distribution to aid them implement...
Krzysztof R. Apt
Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.
system by discussing how our core shared memory protocol framework is capable of expressing safe, typeful message-passing idioms . Next, we briefly...ends with discussions of expressiveness , related work, and conclusions. 1.1 Preliminaries: Language Overview Our language supports fork/join concurrency...the expressiveness of the full language , how we can model some high-level synchronization mechanisms, and clarify modularity gains when compared to
Ye. Ye. Bragina
Full Text Available The 2010 World Health Organization (WHO guidelines for semiological examinations describe standard, additional tests and tests of scientific value and analyze in detail different situations and possible errors. This paper gives an abstract of the WHO guidelines, a concise protocol for using the standard methods of a spermiolofic examination, and a number of commentaries that reflect the alternative view of a number of problems.
A detailed offset system was established by the Western Climate Initiative (WCI) in an effort to support its cap-and-trade program. This report presented the results of evaluation of protocols that were identified by the partners of the WCI. The purpose of the evaluation was to help the WCI identify opportunities to incorporate existing protocols into the new offset system. The WCI's offset criteria were outlined in its offset system essential elements draft recommendations paper in which a WCI offset was defined as a quantified, independently verified reduction or removal of a greenhouse gas. Several findings were presented according to the commonalities and differences found in the protocols by project type, including soil sequestration; manure management; rangeland management; afforestation and reforestation; forest management; forest preservation and conservation; forest products; urban forestry; landfill gas; and waste and wastewater treatment. In addition, this report discussed the general evaluation approach used, work process flowchart, and stakeholder process of each offset system. refs., tabs., figs., appendices.
Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.
Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo
We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demons...
Full Text Available In present study, besides investigating benthic communities and their demographics in Choghakhor wetland, the water quality has been evaluated and classified. Then, 10 stations were selected and sampling of benthos was done every 45 days since April 2010 to March 2011, with 3 replications at each station. Samples were obtained by Ekman grab Sampler (surface 400 cm2. The collected samples were separated and fixed by formalin (4%. The Macroinvertebrates samples were identified and counted in laboratory. Generally 25 families of benthic macroinvertebrates belonging to 5 classes and 12 orders were identified. The results were calculated as community measures, including total richness, Shannon - Wiener diversity index and Hilsenhoff Biological index at family level. The results obtained from temporal and spatial changes of data (Statgeraphics software and water qualitative classification using Shannon diversity index conformed to biological Hilsenhoff index. And finally, water quality of wetland was assessed to be polluted in average to high level. According to this study findings, it seems that, these indicators could be used as useful tools for evaluating water supplies quality.
US Fish and Wildlife Service, Department of the Interior — Physical, chemical and biological components at four stations on Black Creek and one station on Harland Creek (reference site), Holmes County, Mississippi were...
that the growth of the green algal, Chlorella vulgaris , was reduced approximately 50 percent in the presence of 2.0 ppm zinc. Payne (12) reported that... petroleum hydrocarbons. it was anticipated that some of these con- taminants would be released from the sediment during elutriate prepara- tion and would...Environmental Protection Agency, Washington, DC, Oct., 1973. 14. Rachlin, Y. W., and Farran, M., "Growth Response of the Green Algae Chlorella
Wauben, L.S.G.L.; Goossens, R.H.M.; Van Eijk, D.J.; Lange, J.F.
Background: Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the ‘‘critical view of safety’’ concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development
L.S.G.L. Wauben; R.H.M. Goossens (Richard); D.J. van Eijk (Daan); J.F. Lange (Johan)
textabstractBackground: Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the "critical view of safety" concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid
Análise morfológica do arco superior de portadores de fissura labiopalatal submetidos a diferentes protocolos de expansão rápida maxilar: avaliação das alterações maxilares Morphological analysis of the maxillary arch in patients with cleft lip and palate submitted to different protocols of rapid maxillary expansion: maxillary alterations evaluation
Maíra Massuia de Souza
transverse dimensions of maxillary dental arches by analysis of the dental casts of 15 patients with complete unilateral cleft lip and palate who presented sagittal and transverse maxillary constriction and were submitted to two distinct protocols of rapid maxillary expansion. METHODS: Seven patients were submitted to rapid maxillary expansion (RME by the conventional activation protocol (Group 1, and the others were treated by the protocol proposed by Liou and Tsai in 2005, with alternated expansion and constriction (Group 2. Both groups were later submitted to maxillary protraction with facial mask. Dental casts were obtained at two periods: before placement of a modified Haas expander (T1 and after 24 weeks of treatment (T2. Transverse distances were measured with a digital caliper to register the distances between first upper premolars (anterior area and first upper molars (posterior area. Data were statistically analyzed by the Student's t test. RESULTS AND CONCLUSION: Both protocols were equally effective, since no differences were observed between the groups as to the transverse increasing achieved.
VGC] 020.rrr.rrr.rrr DC-PR D.C. Packet Radio Network [VGCJ 021.rrr.rrr.rrr EDN OCEC EON [EC5] 022.rrr.rrr.rrr DIALNET DIALNE1 (26, 16.MRCJ 023...41953. 7 October 1977. Also in .  Crispin. M. and I. Zabala. " DIALNET Protocols". Stanford University Artificial Intelligence Laboratory, July...34. IEN 158. October 1980. (26] McCarthy, J. and L. Earnest, " DIALNET ", Stanford University Artificial Intelligence Laboratory, Undated. (27] McKenzie
Human Resources Division
Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.
Division du Personnel
Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683
Tagami, Hirotaka; Taki, Tomomi; Ueoro, Kouichi [Self Defense Hospital Maizuru, Kyoto (Japan)] [and others
Obesity is a recognized risk factor for the development of diseases such as atherosclerosis, diabetes mellitus and hypertension. The individual risk of the obesity can not be evaluated merely by the body weight or body mass index. The fat distribution is a key to evaluate it. So far, the MRI protocols in the literature tested for the evaluation of the fat distribution were spin-echo and inversion-recovery images. We tested both protocols and couldn`t get good images basically due to motion artifacts. Therefore, the field-echo (FE) protocol, a rapid scan protocol, was evaluated. The transverse fat distributions at umbilical level of 8 male obese volunteers were examined with MRI FE protocol and X-ray computed tomography (CT). The excellent images were obtained with FE protocol and correlation with CT images was also satisfactory. The FE protocols for the evaluation of the fat distribution is of use and reasonable tool for the clinical usage. (author)
Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shon, Taeshik; Sher, Muhammad; Farash, Mohammad Sabzinejad
Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.
Cagan, Avi; Lu, Donglai; Cizek, Karel; La Belle, Jeff; Wang, Joseph
A highly selective and rapid electrochemical assay of the improvised explosive urea nitrate (UN) is reported. The method involves a short ( approximately 10 s) acid-catalyzed reaction of UN with 4-nitrotoluene (NT) followed by a rapid ( approximately 2 s) square-wave voltammetric (SWV) detection of the 2,4-dinitrotoluene (DNT) product. The new protocol offers great promise for a reliable field detection of UN, with significant advantages of speed, sensitivity, portability, simplicity, and cost.
Federal Laboratory Consortium — The ARDEC Rapid Prototyping (RP) Laboratory was established in December 1992 to provide low cost RP capabilities to the ARDEC engineering community. The Stratasys,...
Wang, Ren-Chiun; Yang, Chou-Chen; Mo, Kun-Ru
Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation atacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors shall show that password guessing, denial of service and known-key attacks can work in their password...
Desire Oulai; Steven Chamberland; Samuel Pierre
The classical resource reservation protocol (RSVP) is a ﬂow-based signaling protocol used for reserving resources in the network for a given session. RSVP maintains state information for each reservation at every router along the path. Even though this protocol is very popular, he has some weaknesses. Indeed, RSVP does not include a bidirectional reservation process and it requires refresh messages to maintain the soft states in the routers for each session. In this paper, we propose a...
Bodei, Chiara; Buchholtz, Mikael; Degano, P.
We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...
Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne
CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...
Nitti, Andrea; Bianchi, Gabriele; Po, Riccardo; Swager, Timothy M; Pasini, Dario
Five-membered aromatic heterocycles are a ubiquitous skeleton of π-conjugated organic compounds, and their incorporation requires synthetic protocols that are not easily industrially sustainable or scalable. Improved methodologies for their insertion into π-scaffolds are therefore necessary. We report an efficient and scalable protocol involving a one-pot cross-Aldol direct arylation reaction protocol for the rapid construction of thiophene- and furan-based π-extended organic materials.
Airoldi, C; Tripodi, F; Guzzi, C; Nicastro, R; Coccetti, P
Here we propose the optimization of a rapid and reproducible protocol for intracellular metabolite extraction from yeast cells and their metabolic profiling by (1)H-NMR spectroscopy. The protocol reliability has been validated through comparison between the metabolome of cells in different phases of growth or with different genetic backgrounds.
Hadeel Saleh Haj Aliwi
Full Text Available Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call even if they use different chatting applications. Providing the interoperability between different signaling protocols and multimedia applications takes the advantages of more than one protocol. Many mapping architectures have been proposed to ease exchanging the media between at least two users without facing any difficulties such as SIP-Jingle, IAX-RSW, H.323-MGCP, etc. However, the design of any of the existing mapping architectures has some weaknesses related to larger delay, time consuming, and security matters. The only way to overcome these problems is to propose an efficient mapping architecture. This paper proposed a new mapping architecture between Inter-Asterisk eXchange Protocol and Jingle Protocol. The proposed mapping architecture consists of IAX domain (IAX client, IAX server, IAX-to-Jingle gateway, and Jingle domain (Jingle client, Jingle server, Jingle-to-IAX gateway. The tasks of the translation gateways are represented by the URI conversion, media capability exchange, translator of call setup and teardown signals, and real time media transmission.
Rapid micropropagation of Boesenbergia rotunda (L.) Mansf. Kulturpfl. (a valuable medicinal plant) from shoot bud explants. NA Yusuf, MMS Annuar, N Khalid. Abstract. A successful protocol was developed for mass propagation of Boesenbergia rotunda (L.) Mansf. Kulturpfl., an important medicinal plant. Numerous shoots ...
This paper is addressed to astronomers who are not specialists in computer science. We give explanations of some basic and advanced protocols to receive events and how to implement them in a robotic observatory software. We describe messages such as GCN notices, VOEvents or RTML, and protocols such as CGI, HTTP, SOAP, RSS, and XMPP.
Hysong, Sylvia J; Woodard, LeChauncy; Garvin, Jennifer H; Murawsky, Jeffrey; Petersen, Laura A
Published scientific protocols are advocated as a means of controlling bias in research reporting. Indeed, many journals require a study protocol with manuscript submission. However, publishing protocols of partnered research (PPR) can be challenging in light of the research model's dynamic nature, especially as no current reporting standards exist. Nevertheless, as these protocols become more prevalent, a priori documentation of methods in partnered research studies becomes increasingly important. Using as illustration a suite of studies aimed at improving coordination and communication in the primary care setting, we sought to identify challenges in publishing PPR relative to traditional designs, present alternative solutions to PPR publication, and propose an initial checklist of content to be included in protocols of partnered research. Challenges to publishing PPR include reporting details of research components intended to be co-created with operational partners, changes to sampling and entry strategy, and alignment of scientific and operational goals. Proposed solutions include emulating reporting standards of qualitative research, participatory action research, and adaptive trial designs, as well as embracing technological tools that facilitate publishing adaptive protocols, with version histories that are able to be updated as major protocol changes occur. Finally, we present a proposed checklist of reporting elements for partnered research protocols.
Rapley, Ralph; Aquino de Muro, Marilena
... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...
M.T. Dashti (Mohammad); Y. Wang (Yanjing); I. Cervesato
htmlabstractWe study the behaviour of rational agents in exchange protocols which rely on trustees. We allow malicious parties to compromise the trustee by paying a cost and, thereby, present a game analysis that advocates exchange protocols which induce balanced risks on the participants. We also
Smith, Robert E.
RAPID is a methodology and software system to define a class of airplane configurations and directly evaluate surface grids, volume grids, and grid sensitivity on and about the configurations. A distinguishing characteristic which separates RAPID from other airplane surface modellers is that the output grids and grid sensitivity are directly applicable in CFD analysis. A small set of design parameters and grid control parameters govern the process which is incorporated into interactive software for 'real time' visual analysis and into batch software for the application of optimization technology. The computed surface grids and volume grids are suitable for a wide range of Computational Fluid Dynamics (CFD) simulation. The general airplane configuration has wing, fuselage, horizontal tail, and vertical tail components. The double-delta wing and tail components are manifested by solving a fourth order partial differential equation (PDE) subject to Dirichlet and Neumann boundary conditions. The design parameters are incorporated into the boundary conditions and therefore govern the shapes of the surfaces. The PDE solution yields a smooth transition between boundaries. Surface grids suitable for CFD calculation are created by establishing an H-type topology about the configuration and incorporating grid spacing functions in the PDE equation for the lifting components and the fuselage definition equations. User specified grid parameters govern the location and degree of grid concentration. A two-block volume grid about a configuration is calculated using the Control Point Form (CPF) technique. The interactive software, which runs on Silicon Graphics IRIS workstations, allows design parameters to be continuously varied and the resulting surface grid to be observed in real time. The batch software computes both the surface and volume grids and also computes the sensitivity of the output grid with respect to the input design parameters by applying the precompiler tool
Full Text Available This paper proposes a rendezvous protocol for cognitive radio ad hoc networks, RAC2E-gQS, which utilizes (1 the asynchronous and randomness properties of the RAC2E protocol, and (2 channel mapping protocol, based on a grid Quorum System (gQS, and taking into account channel heterogeneity and asymmetric channel views. We show that the combination of the RAC2E protocol with the grid-quorum based channel mapping can yield a powerful RAC2E-gQS rendezvous protocol for asynchronous operation in a distributed environment assuring a rapid rendezvous between the cognitive radio nodes having available both symmetric and asymmetric channel views. We also propose an enhancement of the protocol, which uses a torus QS for a slot allocation, dealing with the worst case scenario, a large number of channels with opposite ranking lists.
Satellite IP networks are characterized by high bit error rates, long propagation delays, low bandwidth feedback links, and persistent fades resulting from varying weather patterns. A new unicast transport protocol is designed to address all the above challenges. Two new algorithms, Jump Start and Quick Recovery, are presented to replace the traditional Slow Start algorithm and to recover rapidly from multiple segment losses within one window of data. The characteristics of satellite IP networks also distinguish satellite multicasting from multicasting in terrestrial wirelined networks. A reliable data multicast transport protocol, TCP-Peachtree, is proposed to solve the acknowledgment implosion and scalability problems in satellite IP networks. Developments in space technology are enabling the realization of deep space missions. The scientific data from these missions need to be delivered to the Earth successfully. To achieve this goal, the InterPlaNetary Internet is proposed as the Internet of the deep space planetary networks, which is characterized by extremely high propagation delays, high link errors, asymmetrical bandwidth, and blackouts. A reliable transport protocol, TP-Planet, is proposed for data traffic in the InterPlaNetary Internet. TP-Planet deploys rate-based additive-increase multiplicative-decrease (AIMD) congestion control and replaces the inefficient slow start algorithm with a novel Initial State algorithm that allows the capture of link resources in a very fast and controlled manner. A new congestion detection and control mechanism is developed and a Blackout State is incorporated into the protocol operation. Multimedia traffic is also one part of the aggregate traffic over InterPlaNetary Internet backbone links and it has additional requirements such as minimum bandwidth, smooth traffic, and error control. To address all the above challenges, RCP-Planet is proposed. RCP-Planet consists of two novel algorithms, i.e., Begin State and
Hoorfar, Jeffrey; Holmvig, C.B.F.
In two studies, seven different culture protocols were compared to test naturally contaminated faecal samples from pigs for isolation of Y. enterocolitica serotype O; 3/biotype 4( n = 70 and n = 79). Four of the protocols were based on the Nordic Committee on Food Analysis (NMKL protocols), while...... three protocols were based on a rapid and selective method (here called ITC protocols). The protocols differed mainly in time of pre-enrichment (1, 10 and 24 d) and enrichment (2, 10, 24 d) and the type of selective enrichment media (ITC vs. MRB). The sensitivity of the rapid ITC protocol (24% and 9...... indicate possibilities of shortening the culture methods by replacing most of the biochemical tests with an agglutination test based on a monoclonal antibody....
... the smallest air passages of the lungs in children ( bronchiolitis ) Pneumonia or other lung infection Transient tachypnea of the newborn Anxiety and panic Other serious lung disease Home Care Rapid, shallow breathing should not be treated at home. It is ...
... worse than normal. Your first thoughts turn to strep throat. A rapid strep test in your doctor’s office ... your suspicions.Viruses cause most sore throats. However, strep throat is an infection caused by the Group A ...
Gupta, Vishal; Irimia, Jesús; Pau, Iván; Rodríguez-Patón, Alfonso
The methods to execute biological experiments are evolving. Affordable fluid handling robots and on-demand biology enterprises are making automating entire experiments a reality. Automation offers the benefit of high-throughput experimentation, rapid prototyping, and improved reproducibility of results. However, learning to automate and codify experiments is a difficult task as it requires programming expertise. Here, we present a web-based visual development environment called BioBlocks for describing experimental protocols in biology. It is based on Google's Blockly and Scratch, and requires little or no experience in computer programming to automate the execution of experiments. The experiments can be specified, saved, modified, and shared between multiple users in an easy manner. BioBlocks is open-source and can be customized to execute protocols on local robotic platforms or remotely, that is, in the cloud. It aims to serve as a de facto open standard for programming protocols in Biology.
Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.
Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.
This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.
The RAPID3 score is the sum of three 0-10 patient self-report scores: pain, functional impairment on MDHAQ, and patient global estimate. It requires 5 seconds for scoring and can be used in all rheumatologic conditions, although it has mostly been used in rheumatoid arthritis where cutoffs for low disease activity (12/30) have been set. A RAPID3 score of ≤ 3/30 with 1 or 0 swollen joints (RAPID3 ≤ 3 + ≤ SJ1) provides remission criteria comparable to Boolean, SDAI, CDAI, and DAS28 remission criteria, in far less time than a formal joint count. RAPID3 performs as well as the DAS28 in separating active drugs from placebos in clinical trials. RAPID3 also predicts subsequent structural disease progression. RAPID3 can be determined at short intervals at home, allowing the determination of the area under the curve of disease activity between two visits and flare detection. However, RAPID3 should not be seen as a substitute for DAS28 and face to face visits in routine care. Monitoring patient status with only self-report information without a rheumatologist's advice (including joints and physical examination, and consideration of imaging and laboratory tests) may indeed be as undesirable for most patients than joint examination without a patient questionnaire. Conversely, combining the RAPID3 and the DAS28 may consist in faster or more sensitive confirmation that a medication is effective. Similarly, better enquiring of most important concerns of patients (pain, functional status and overall opinion on their disorder) should reinforces patients' confidence in their rheumatologist and treatments.
22 Figure 12. Average kWh savings per gross square footage ( GSF ). ....................................... 22 iii LIST OF TABLES...Certification Program FTP File Transfer Protocol GIS Geographical Information Systems GSF gross square footage JCI Johnson Controls Energy...Average kWh savings per gross square footage ( GSF ). 23 6.0 PERFORMANCE ASSESSMENT FirstFuel chose each Performance Objective with the major project
Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.
Düzgün, Irem; Baltacı, Gül; Atay, O Ahmet
In this study, we sought to compare the effects of the slow and accelerated protocols on pain and functional activity level after arthroscopic rotator cuff repair. The study included 29 patients (3 men, 26 women) who underwent arthroscopic repair of stage 2 and 3 rotator cuff tears. Patients were randomized in two groups: the accelerated protocol group (n=13) and slow protocol group (n=16). Patients in the accelerated protocol group participated in a preoperative rehabilitation program for 4-6 weeks. Patients were evaluated preoperatively and for 24 weeks postoperatively. Pain was assessed by visual analog scale, and functional activity level was assessed by The Disabilities of The Arm Shoulder and Hand (DASH) questionnaire. The active range of motion was initiated at week 3 after surgery for the accelerated rehabilitation protocol and at week 6 for the slow protocol. The rehabilitation program was completed by the 8th week with the accelerated protocol and by the 22nd week with the slow protocol. There was no significant difference between the slow and accelerated protocols with regard to pain at rest (p>0.05). However, the accelerated protocol was associated with less pain during activity at weeks 5 and 16, and with less pain at night during week 5 (prehabilitation after arthroscopic rotator cuff repair to prevent the negative effects of immobilization and to support rapid reintegration to daily living activities.
Güngör, V Çagri
The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline
Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis
The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol is formali......The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol...
"Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...
US Fish and Wildlife Service, Department of the Interior — Proposal by the State of Wyoming, Wyoming Game and Fish Department, to vaccinate elk on the National Elk Refuge. The proposal provides a protocol for vaccinating elk...
Gregory M. Mueller; John Paul Schmit; Sabine M. Hubndorf Leif Ryvarden; Thomas E. O' Dell; D. Jean Lodge; Patrick R. Leacock; Milagro Mata; Loengrin Umania; Qiuxin (Florence) Wu; Daniel L. Czederpiltz
This chapter discusses several issues regarding reommended protocols for sampling macrofungi: Opportunistic sampling of macrofungi, sampling conspicuous macrofungi using fixed-size, sampling small Ascomycetes using microplots, and sampling a fixed number of downed logs.
Jongmans, Sung-Shik Theodorus Quirinus
Parallel programming has become essential for writing scalable programs on general hardware. Conceptually, every parallel program consists of workers, which implement primary units of sequential computation, and protocols, which implement the rules of interaction that workers must abide by. As
Full Text Available Rapid technological advances in the domain of Wireless Power Transfer pave the way for novel methods for power management in systems of wireless devices, and recent research works have already started considering algorithmic solutions for tackling emerging problems. In this paper, we investigate the problem of efficient and balanced Wireless Power Transfer in Wireless Sensor Networks. We employ wireless chargers that replenish the energy of network nodes. We propose two protocols that configure the activity of the chargers. One protocol performs wireless charging focused on the charging efficiency, while the other aims at proper balance of the chargers’ residual energy. We conduct detailed experiments using real devices and we validate the experimental results via larger scale simulations. We observe that, in both the experimental evaluation and the evaluation through detailed simulations, both protocols achieve their main goals. The Charging Oriented protocol achieves good charging efficiency throughout the experiment, while the Energy Balancing protocol achieves a uniform distribution of energy within the chargers.
The direct connection of information, captured in forms such as CAD databases, to the factory floor is enabling a revolution in manufacturing. Rapid response to very dynamic market conditions is becoming the norm rather than the exception. In order to provide economical rapid fabrication of small numbers of variable products, one must design with manufacturing constraints in mind. In addition, flexible manufacturing systems must be programmed automatically to reduce the time for product change over in the factory and eliminate human errors. Sensor based machine control is needed to adapt idealized, model based machine programs to uncontrolled variables such as the condition of raw materials and fabrication tolerances.
... Announcements Public Service Announcements Partnering with DBSA Rapid Cycling and its Treatment What is bipolar disorder? Bipolar ... to Depression and Manic Depression . What is rapid cycling? Rapid cycling is defined as four or more ...
Full Text Available . Microfluidics is at the forefront of developing solutions for drug discovery, diagnostics (from glucose tests to malaria and TB testing) and environmental diagnostics (E-coli monitoring of drinking water). In order to quickly implement new designs, a rapid...
Munoz, Cesar A.; Butler, Ricky (Technical Monitor)
PVSio is a conservative extension to the PVS prelude library that provides basic input/output capabilities to the PVS ground evaluator. It supports rapid prototyping in PVS by enhancing the specification language with built-in constructs for string manipulation, floating point arithmetic, and input/output operations.
Continuing educators need additional strategies for developing new programming that can both reduce the time to market and lower the cost of development. Rapid prototyping, a time-compression technique adapted from the high technology industry, represents one such strategy that merits renewed evaluation. Although in higher education rapid…
Kitaev, Alexei; Mayers, Dominic; Preskill, John
We show that superselection rules do not enhance the information-theoretic security of quantum cryptographic protocols. Our analysis employs two quite different methods. The first method uses the concept of a reference system—in a world subject to a superselection rule, unrestricted operations can be simulated by parties who share access to a reference system with suitable properties. By this method, we prove that if an n -party protocol is secure in a world subject to a superselection rule, then the security is maintained even if the superselection rule is relaxed. However, the proof applies only to a limited class of superselection rules, those in which the superselection sectors are labeled by unitary irreducible representations of a compact symmetry group. The second method uses the concept of the format of a message sent between parties—by verifying the format, the recipient of a message can check whether the message could have been sent by a party who performed charge-conserving operations. By this method, we prove that protocols subject to general superselection rules (including those pertaining to non-Abelian anyons in two dimensions) are no more secure than protocols in the unrestricted world. However, the proof applies only to two-party protocols. Our results show in particular that, if no assumptions are made about the computational power of the cheater, then secure quantum bit commitment and strong quantum coin flipping with arbitrarily small bias are impossible in a world subject to superselection rules.
Galataki, Despo; Radulescu, Andrei; Verstoep, Kees; Fokkink, Wan
Embedded networks for chip-to-chip networks are emerging as communication infrastructure in mobile devices. We present three novel embedded network protocols: a sliding window protocol, a protocol for opening and closing connections, and a bandwidth reservation protocol. The design of these protocols is tailored to the low power and low cost requirements of mobile devices. The model checker SPIN played an important role in the design and analysis of these protocols. Large instances of the protocols could be analyzed successfully using the distributed model checker DiVinE.
Malekpour, Mahyar R.
This report presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV) [SMV]. The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space. Also, additional innovative state space reduction techniques are introduced that can be used in future verification efforts applied to this and other protocols.
Crazzolara, Federico; Milicia, Giuseppe
It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort......-Spaces aids several steps in the development of a security protocol – protocol executions can be simulated in hostile environments, a security protocol can be implemented, and security properties of implementations can be formally verified....
Cremers, Cas; Rasmussen, Kasper Bonne; Čapkun, Srdjan
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main type of attack on distance bounding protocols, called Distance Hijacking. We show that many proposed distance bounding protocols are vulnerable to this type of attack, and we propose solutions to make these protocols resilient to Distance Hijacking. We further show that verifying distance bounding protocols using exist...
van de Snepscheut, Jan L.A.
In this note some struggles with the sliding window protocol and the special case known as the alternating bit protocol, are reported. We try to give a correctness proof, and discover that we cannot do so for one of the versions of the sliding window protocol. One may either require channels that satisfy stronger assumptions or, as we will do, adapt the protocol and stick to the weaker assumptions. The alternating bit protocol can be traced back to [Bartlett]. We have been unab...
Backay, Andrew; Bystrzycki, Adam; Smit, De Villiers; Keogh, Martin; O'Reilly, Gerard; Mitra, Biswadev
Objectives Rapid disposition protocols are increasingly being considered for implementation in emergency departments (EDs). Among patients presenting to an adult tertiary referral hospital, this study aimed to compare prediction accuracy of a rapid disposition decision at the conclusion of history and examination, compared with disposition following standard assessment. Methods Prospective observational data were collected for 1 month between October and November 2012. Emergency clinicians (including physicians, registrars, hospital medical officers, interns and nurse practitioners) filled out a questionnaire within 5min of obtaining a history and clinical examination for eligible patients. Predicted patient disposition (representing 'rapid disposition') was compared with final disposition (determined by 'standard assessment'). Results There were 301 patient episodes included in the study. Predicted disposition was correct in 249 (82.7%, 95% confidence interval (CI) 78.0-86.8) cases. Accuracy of predicting discharge to home appeared highest among emergency physicians at 95.8% (95% CI 78.9-99.9). Overall accuracy at predicting admission was 79.7% (95% CI 67.2-89.0). The remaining 20.3% (95% CI 11.0-32.8) were not admitted following standard assessment. Conclusion Rapid disposition by ED clinicians can predict patient destination accurately but was associated with a potential increase in admission rates. Any model of care using rapid disposition decision making should involve establishment of inpatient systems for further assessment, and a culture of timely inpatient team transfer of patients to the most appropriate treating team for ongoing patient management. What is known about the topic? In response to the National Emergency Access Targets, there has been widespread adoption of rapid-disposition-themed care models across Australia. Although there is emerging data that clinicians can predict disposition accurately, this data is currently limited. What does this
Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus
string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...
Malekpour, Mahyar R. (Inventor)
A rapid Byzantine self-stabilizing clock synchronization protocol that self-stabilizes from any state, tolerates bursts of transient failures, and deterministically converges within a linear convergence time with respect to the self-stabilization period. Upon self-stabilization, all good clocks proceed synchronously. The Byzantine self-stabilizing clock synchronization protocol does not rely on any assumptions about the initial state of the clocks. Furthermore, there is neither a central clock nor an externally generated pulse system. The protocol converges deterministically, is scalable, and self-stabilizes in a short amount of time. The convergence time is linear with respect to the self-stabilization period.
Tuck, Christopher John; Hague, Richard; Ruffo, Massimiliano; Ransley, Michelle; Adams, Paul Russell
Abstract This paper describes the production of body-fitting customised seat profiles utilising the following digital methods: three dimensional laser scanning, reverse engineering and Rapid Manufacturing (RM). The seat profiles have been manufactured in order to influence the comfort characteristics of an existing ejector seat manufactured by Martin Baker Aircraft Ltd. The seat, known as Navy Aircrew Common Ejection Seat (NACES), was originally designed with a generic profile. ...
Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)
From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)
We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...
Kim, Seong Min [College of Medicine, Chungnam National University, Daejeon (Korea, Republic of)
In myocardial perfusion scintigraphy, the results of this evaluation now confront the practitioner of nuclear medicine with methodological options. Most nuclear cardiologic studies are performed using thallium-201, Tc-99m sestamibi and Tc-99m tertrofosmin. Some part of these studies use some form of pharmacologic stress test. While tailoring each test to the individual is ideal, this may be impractical for a busy department. Accordingly, established protocols to be used for patients with similar clinical presentations will be helpful. The following review presents methodology of various imaging protocols mainly according to the guidelines of nuclear cardiology procedures in American Society of Nuclear Cardiology.
Diego Carlo D'agostino
Full Text Available The project “Tiber Personal Rapid Transit” have been presented by the author at the Rome City Vision Competition1 2010, an ideas competition, which challenges architects, engineers, designers, students and creatives individuals to develop visionary urban proposals with the intention of stimulating and supporting the contemporary city, in this case Rome. The Tiber PRT proposal tries to answer the competition questions with the definition of a provocative idea: a Personal Rapid transit System on the Tiber river banks. The project is located in the central section of the Tiber river and aims at the renewal of the river banks with the insertion of a Personal Rapid Transit infrastructure. The project area include the riverbank of Tiber from Rome Transtevere RFI station to Piazza del Popolo, an area where main touristic and leisure attractions are located. The intervention area is actually no used by the city users and residents and constitute itself a strong barrier in the heart of the historic city.
Liu, Xin; Zhang, Hongman; Ji, Xiaojun; Zheng, Hongbo; Zhang, Xin; Fu, Ninghua; Huang, He
Sampling of intracellular metabolites in Mortierella alpina was investigated as part of a metabolomics study. After comparison of four sampling protocols, rapid filtration of the culture using a laboratory-made nylon filter and absorbent gauze under normal pressure followed by quenching in liquid N(2) and grinding (the improved protocol) was the most effective. Rapid filtration under normal pressure decreased intracellular metabolites leakage and subsequent grinding of cells contributed to intracellular metabolites extraction. The above quenching method together with 75 % (v/v) ethanol, buffered with 60 mM HEPES, at 80 °C for 3 min is therefore suitable for sampling intracellular metabolites in M. alpina.
Schindelin Johannes E
Full Text Available Abstract Background In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. These diverse investigations on the function of the insect brain use gene expression patterns that can be visualized and provide the means for manipulating groups of neurons as a common ground. To take advantage of these patterns one needs to know their typical anatomy. Results This paper describes the Virtual Insect Brain (VIB protocol, a script suite for the quantitative assessment, comparison, and presentation of neuroanatomical data. It is based on the 3D-reconstruction and visualization software Amira, version 3.x (Mercury Inc. 1. Besides its backbone, a standardization procedure which aligns individual 3D images (series of virtual sections obtained by confocal microscopy to a common coordinate system and computes average intensities for each voxel (volume pixel the VIB protocol provides an elaborate data management system for data administration. The VIB protocol facilitates direct comparison of gene expression patterns and describes their interindividual variability. It provides volumetry of brain regions and helps to characterize the phenotypes of brain structure mutants. Using the VIB protocol does not require any programming skills since all operations are carried out at an intuitively usable graphical user interface. Although the VIB protocol has been developed for the standardization of Drosophila neuroanatomy, the program structure can be used for the standardization of other 3D structures as well. Conclusion Standardizing brains and gene expression patterns is a new approach to biological shape and its variability. The VIB protocol provides a first set of tools supporting this endeavor in Drosophila. The script suite is freely available at http://www.neurofly.de2
Lin, Chin-Chuen; Hung, Yi-Yung; Tsai, Meng-Chang; Huang, Tiao-Lai
The lorazepam-diazepam protocol had been proved to rapidly and effectively relieve catatonia in patients with schizophrenia or mood disorder. This study aims to investigate the efficacy of lorazepam-diazepam protocol in catatonia due to general medical conditions (GMC) and substance. Patients with catatonia that required psychiatric intervention in various settings of a medical center were included. The lorazepam-diazepam protocol had been used to treat the catatonia due to GMC or substance according to DSM-IV criteria. The treatment response had been assessed by two psychiatrists. Eighteen (85.7%) of 21 catatonic patients due to GMC or substance became free of catatonia after the lorazepam-diazepam protocol. Five (23.8%) of the 21 patients had passed away with various causes of death and wide range of time periods after catatonia. Our results showed that the lorazepam-diazepam protocol could rapidly and effectively relieve catatonia due to GMC and substance.
Bodei, Chiara; Buchholtz, Mikael; Curti, Michele
We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....
When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison
The Protocol Nature Plan is a step by step approach leading to the design of a Nature Plan for a biological farm. The aim is to increase nature values and ecological relationships on the farm. Research results are translated into easy practical measures
Huttel, Hans; Srba, Jiri
This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analysis...
Rogers, Kim R; Mulchandani, Ashok
..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...
Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher
This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.
during distributed transmit beamforming. We may, for example, assume that cooperative nodes are satellites in specific orbits with known velocities...communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer...form a foundation for achieving effective spectrum coexistence, interoperability and improved reliability in satellite transceivers in the presence of
Nordhoff, E; Krogsdam, A M; Jorgensen, H F
We report a protocol for the rapid identification of DNA-binding proteins. Immobilized DNA probes harboring a specific sequence motif are incubated with cell or nuclear extract. Proteins are analyzed directly off the solid support by matrix-assisted laser desorption/ionization time-of-flight mass...... was validated by the identification of known prokaryotic and eukaryotic DNA-binding proteins, and its use provided evidence that poly(ADP-ribose) polymerase exhibits DNA sequence-specific binding to DNA....
Full Text Available Oral breathing is a respiratory dysfunction that affects approximately 10-15% of child population. It is responsable of local effects and systemic effects, both immediate and long-term. They affect the growth of the subject and his physical health in many ways: pediatric, psycho-behavioral and cognitive. The etiology is multifactorial. It’s important the establishment of a vicious circle involving more areas and it is essential to stop it as soon as possible. In order to correct this anomaly, the pediatric dentist must be able to make a correct diagnosis to treat early the disfunction and to avoid the onset of cascade mechanisms. Who plays a central role is the pediatrician who first and frequently come into contact with little patients. He can identify the anomalies, and therefore collaborate with other specialists, including the dentist. The key aspect that guides us in the diagnosis, and allows us to identify the oral respirator, is the “adenoid facies”. The purpose of the study is to highlight the importance and benefits of an early and multidisciplinary intervention (pediatric, orthopedic-orthodontic-functional. A sample of 20 patients was selected with the following inclusion criteria: mouth breathing, transverse discrepancy > 4 mm, early mixed dentition, central and lateral permenent incisors, overjet increased, lip and nasal incompetence, snoring and/or sleep apnea episodes. The protocol of intervention includes the use of the following devices and procedures: a maxillary rapid expander (to correct the transverse discrepancy, to increase the amplitude of the upper respiratory airway and to reduce nasal resistances tract in association with myo-functional devices (nasal stimulator and oral obturator. They allow the reconstruction of a physiological balance between the perioral musculature and tongue, the acquisition of nasal and lips competence and the reduction of overjet. This protocol speeds up and stabilizes the results. The
Duby, Jeremiah J.; Berry, Andrew J.; Ghayyem, Paricheh; Wilson, Machelle D.; Cocanour, Christine S.
BACKGROUND Approximately18-25% of patients with alcohol use disorders admitted to the hospital develop alcohol withdrawal syndrome (AWS). Symptom-triggered dosing of BZDs appears to lead to shorter courses of treatment, lower cumulative BZD dose and more rapid control of symptoms in non-critically ill patients. This study compares the outcomes of critically ill patients with AWS when treated using a protocolized, symptom-triggered, dose-escalation approach versus a non-protocolized approach. METHODS This is a retrospective pre-post study of patients ≥18 years with AWS admitted to an ICU. The PRE cohort (PRE) was admitted between 2-2008 and 2-2010. The Post-intervention cohort (POST) was admitted between 2-2012 and 1-2013. PRE were treated by physician preference and compared to POST that were given escalating doses of BZDs and/or phenobarbital according to an AWS protocol, titrating to light sedations (RASS of 0 to −2). RESULTS There were 135 episodes of AWS in 132 critically ill patients. POST (n=75) were younger (50.7±13.8 vs 55.7±8.7 years, p=0.03) than PRE (n=60). SOFA scores were higher in PRE (6.1±3.7 vs 3.9±2.9, p=0.0004). There was a significant decrease in mean ICU LOS from 9.6±10.5 to 5.2±6.4 days (p=0.0004) in the POST group. The POST group also had significantly fewer ventilator days (5.6 ± 13.9 vs 1.31±5.6 days, pphenobarbital may lead to a decreased ICU LOS, decreased time spent on mechanical ventilation, and decreased BZD requirements. PMID:25248063
Parker, M.; Pinto, C.; Fabian, A.; Lohfink, A.; Buisson, D.; Alston, W.; Jiang, J.
I will present results from the 1.5Ms XMM-Newton observing campaign on the most X-ray variable AGN, IRAS 13224-3809. We find a series of nine absorption lines with a velocity of 0.24c from an ultra-fast outflow. For the first time, we are able to see extremely rapid variability of the UFO features, and can link this to the X-ray variability from the inner accretion disk. We find a clear flux dependence of the outflow features, suggesting that the wind is ionized by increasing X-ray emission.
Gregory, D.L.; Hansche, B.D.
In order to support advanced manufacturing, Sandia has acquired the capability to produce plastic prototypes using stereolithography. Currently, these prototypes are used mainly to verify part geometry and ``fit and form`` checks. This project investigates methods for rapidly testing these plastic prototypes, and inferring from prototype test data actual metal part performance and behavior. Performances examined include static load/stress response, and structural dynamic (modal) and vibration behavior. The integration of advanced non-contacting measurement techniques including scanning laser velocimetry, laser holography, and thermoelasticity into testing of these prototypes is described. Photoelastic properties of the epoxy prototypes to reveal full field stress/strain fields are also explored.
IDEO (pronounced 'eye-dee-oh') is an international design, engineering, and innovation firm that has developed thousands of products and services for clients across a wide range of industries. Its process and culture attracted the attention of academics, businesses, and journalists around the world, and are the subject of a bestselling book, The Art of Innovation by Tom Kelley. One of the keys to IDEO's success is its use of prototyping as a tool for rapid innovation. This story covers some of IDEO's projects, and gives reasons for why they were successful.
Carbone, Marco; Guttman, Joshua
uncompromised subset of the participants are still guar- anteed that their interaction will respect sessions. A protocol transfor- mation turns any protocol into a session-respecting protocol. We do this via a general theory of separability. Our main theorem ap- plies to different separability requirements......, and characterizes when we can separate protocol executions sufficiently to meet a particular require- ment. This theorem also gives direct proofs of some old and new protocol composition results. Thus, our theory of separability appears to cover protocol composition and session-like behavior within a uniform frame...
An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...
Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.
Gekle, M; Bretschneider, M; Meinel, S; Ruhs, S; Grossmann, C
The mineralocorticoid receptor (MR) is a ligand-dependent transcription factor that physiologically regulates water-electrolyte homeostasis and controls blood pressure. The MR can also elicit inflammatory and remodeling processes in the cardiovascular system and the kidneys, which require the presence of additional pathological factors like for example nitrosative stress. However, the underlying molecular mechanism(s) for pathophysiological MR effects remain(s) elusive. The inactive MR is located in the cytosol associated with chaperone molecules including HSP90. After ligand binding, the MR monomer rapidly translocates into the nucleus while still being associated to HSP90 and after dissociation from HSP90 binds to hormone-response-elements called glucocorticoid response elements (GREs) as a dimer. There are indications that rapid MR trafficking is modulated in the presence of high salt, oxidative or nitrosative stress, hypothetically by induction or posttranslational modifications. Additionally, glucocorticoids and the enzyme 11beta hydroxysteroid dehydrogenase may also influence MR activation. Because MR trafficking and its modulation by micro-milieu factors influence MR cellular localization, it is not only relevant for genomic but also for nongenomic MR effects. Copyright © 2013 Elsevier Inc. All rights reserved.
Cain, W.D. [Lockheed Martin Energy Systems, Inc., Oak Ridge, TN (United States); Waddell, W.L. [National Centers for Manufacturing Sciences, Ann Arbor, MI (United States)
US industry is fighting to maintain its competitive edge in the global market place. Today markets fluctuate rapidly. Companies, to survive, have to be able to respond with quick-to-market, improved, high quality, cost efficient products. The way products are developed and brought to market can be improved and made more efficient through the proper incorporation of emerging technologies. The RRM project was established to leverage the expertise and resources of US private industries and federal agencies to develop, integrate, and deploy new technologies that meet critical needs for effective product realization. The RRM program addressed a needed change in the US Manufacturing infrastructure that will ensure US competitiveness in world market typified by mass customization. This project provided the effort needed to define, develop and establish a customizable infrastructure for rapid response product development design and manufacturing. A major project achievement was the development of a broad-based framework for automating and integrating the product and process design and manufacturing activities involved with machined parts. This was accomplished by coordinating and extending the application of feature-based product modeling, knowledge-based systems, integrated data management, and direct manufacturing technologies in a cooperative integrated computing environment. Key technological advancements include a product model that integrates product and process data in a consistent, minimally redundant manner, an advanced computer-aided engineering environment, knowledge-based software aids for design and process planning, and new production technologies to make products directly from design application software.
Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.
Compton, Friederike; Bojarski, Christian; Siegmund, Britta; van der Giet, Markus
Early enteral nutrition is recommended for patients in intensive care units, but nutrition provision is often hindered by a variety of unit-specific problems. To evaluate the impact of a nutrition support protocol on nutrition prescription and delivery in the intensive care unit. Nutrition-related data from 73 patients receiving mechanical ventilation who were treated in an adult medical intensive care unit before introduction of an enteral nutrition support protocol were retrospectively compared with data for 87 patients admitted after implementation of the protocol. After implementation of the protocol, enteral nutrition was started significantly earlier (P = .007) and enteral feeding goals were reached significantly faster (6 vs 10 days, P enteral nutrition on the first day of invasive mechanical ventilation increased from 38% before to 54% after (P = .03) implementation of the protocol. Prescribed and delivered nutrition doses on the first 2 days of mechanical ventilation also increased significantly (P tubes were used in 52% of patients before and 56% of patients after protocol implementation P = .63). Jejunal tubes were placed earlier after the protocol was implemented than before (median 5 vs 6.5 days), and when a jejunal tube was in place, feeding goals were reached faster (median 2 vs 3 days, P = .002). Implementing an enteral nutrition support protocol shortened the time to reach feeding goals. Jejunal feeding tubes were necessary in more than half of the patients, and with a jejunal feeding tube in place, feeding goals were reached rapidly. ©2014 American Association of Critical-Care Nurses.
Malekpour, Mahyar R.
This paper presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system except for the presence of sufficient good nodes, thus making the weakest possible assumptions and producing the strongest results. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV). The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space.
Gausterer, Christian; Penker, Martina; Krisai-Greilhuber, Irmgard; Stein, Christina; Stimpfl, Thomas
Mushrooms are often poorly digested by humans. Thus, their remains (tissues, spores) may persist in the gastrointestinal tract and can be detected in feces several days after mushroom consumption. In this report, we present protocols for the rapid PCR-based detection of fungal traces in a variety of complex samples. Novel primers were designed to amplify portions of ribosomal DNA from deadly poisonous European members of the genus Amanita, namely the death cap (A. phalloides), the destroying angel (A. virosa) and the fool's mushroom (A. verna), respectively. Assay sensitivity was sufficient to discover diluted DNA traces in amounts below the genomic content of a single target mushroom cell. Specificity testing was performed with DNA extracts from a variety of mushroom species. Template amplification was exclusively observed with intended targets and it was not compromised by a vast excess of non-target DNA (i.e. DNA from human and human fecal origin, respectively). A series of experiments was conducted with prepared specimens in order to follow the course of mushroom food processing and digestion. Amplification by direct PCR was successful with raw, fried and digested mixed mushrooms. To improve assay performance with fecal samples, a rapid protocol for sample pre-processing (including water-ether sedimentation and bead beating) and a modified PCR reaction mix were applied. Thereby, it was possible to detect the presence of A. phalloides DNA in spiked feces as well as in clinical samples (vomit, stool) from two independent cases of suspected mushroom poisoning. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Khelaifia, Saber; Ramonet, Pierre-Yves; Bedotto Buffet, Marielle; Drancourt, Michel
The PCR-based detection of archaea DNA in human specimens relies on efficient DNA extraction. We previously designed one such protocol involving only manual steps. In an effort to reduce the workload involved, we compared this manual protocol to semi-automated and automated protocols for archaea DNA extraction from human specimens. We tested 110 human stool specimens using each protocol. An automated protocol using the EZ1 Advanced XL extractor with the V 1.066069118 Qiagen DNA bacteria card and the EZ1® DNA Tissue Kit (Qiagen, Courtaboeuf, France) yielded 35/110 (32%) positives for the real-time PCR detection of the Methanobrevibacter smithii 16S rRNA gene, with average Ct values of 36.1. A semi-automated protocol combining glass-powder crushing, overnight proteinase K digestion and lysis in the buffer from the EZ1 kit yielded 90/110 (82%) positive specimens (P = 0.001) with an average Ct value of 27.4 (P = 0.001). The manual protocol yielded 100/110 (91%) positive specimens (P = 0.001) with an average Ct value of 30.33 (P = 0.001). However, neither the number of positive specimens nor the Ct values were significantly different between the manual protocol and the semi-automated protocol (P > 0.1 and P > 0.1). Proteinase K digestion and glass powder crushing dramatically increase the extraction yield of archaea DNA from human stools. The semi-automated protocol described here was more rapid than the manual protocol and yielded significantly more archaeal DNA. It could be applied for extracting total stool DNA for further PCR amplification.
Chen, X; Guo, P; Xie, Z; Shen, P
A convenient and rapid method for the genetic transformation of Escherichia coli with plasmids is proposed. By mixing the recipient cells and plasmid DNA and spreading them directly on selective medium plates containing Ca2+, the so-called 'plate transformation' could achieve almost the same transformation efficiency as the classical transformation method with calcium. The whole protocol takes only about 2 min, its simplicity compared favorably, not only to the usual protocol, but also to all other documented modifications.
Background To simplify clinical scale lymphocyte expansions, we investigated the use of the WAVE®, a closed system bioreactor that utilizes active perfusion to generate high cell numbers in minimal volumes. Methods We have developed an optimized rapid expansion protocol for the WAVE bioreactor that produces clinically relevant numbers of cells for our adoptive cell transfer clinical protocols. Results TIL and genetically modified PBL were rapidly expanded to clinically relevant scales in both static bags and the WAVE bioreactor. Both bioreactors produced comparable numbers of cells; however the cultures generated in the WAVE bioreactor had a higher percentage of CD4+ cells and had a less activated phenotype. Conclusions The WAVE bioreactor simplifies the process of rapidly expanding tumor reactive lymphocytes under GMP conditions, and provides an alternate approach to cell generation for ACT protocols. PMID:22475724
Montgomery , Todd; Whetten, Brian
The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.
are determined once and for all. The net semantics allows the derivation of general properties and proof principles the use of which is demonstrated in establishing security properties for a number of protocols. The NSL public-key protocol, the ISO 5-pass authentication and the key-translation protocols......Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...
Szczykutowicz, Timothy P; Rubert, Nicholas; Belden, Daryn; Ciano, Amanda; Duplissis, Andrew; Hermanns, Ashley; Monette, Stephen; Saldivar, Elliott Janssen
At the University of Wisconsin Madison Department of Radiology, CT protocol management requires maintenance of thousands of parameters for each scanner. Managing CT protocols is further complicated by the unique configurability of each scanner. Due to recent Joint Commission requirements, now all CT protocol changes must be documented and reviewed by a site's CT protocol optimization team. The difficulty of managing the CT protocols was not in assembling the protocols, but in managing and implementing changes. This is why a wiki based solution for protocol management was implemented. A wiki inherently keeps track of all changes, logging who made the changes and when, allowing for editing and viewing permissions to be controlled, as well as allowing protocol changes to be instantly relayed to all scanner locations.
Baymani, Simaolhoda; Alexopoulos, Konstantinos; Valat, Sébastien
RapidIO (http://rapidio.org/) technology is a packet-switched high-performance fabric, which has been under active development since 1997. Originally meant to be a front side bus, it developed into a system level interconnect which is today used in all 4G/LTE base stations world wide. RapidIO is often used in embedded systems that require high reliability, low latency and scalability in a heterogeneous environment - features that are highly interesting for several use cases, such as data analytics and data acquisition (DAQ) networks. We will present the results of evaluating RapidIO in a data analytics environment, from setup to benchmark. Specifically, we will share the experience of running ROOT and Hadoop on top of RapidIO. To demonstrate the multi-purpose characteristics of RapidIO, we will also present the results of investigating RapidIO as a technology for high-speed DAQ networks using a generic multi-protocol event-building emulation tool. In addition we will present lessons learned from implementing native ports of CERN applications to RapidIO.
National Oceanic and Atmospheric Administration, Department of Commerce — The Rapid Refresh (RAP) numerical weather model took the place of the Rapid Update Cycle (RUC) on May 1, 2012. Run by the National Centers for Environmental...
National Oceanic and Atmospheric Administration, Department of Commerce — The Rapid Refresh (RAP) numerical weather model took the place of the Rapid Update Cycle (RUC) on May 1, 2012. Run by the National Centers for Environmental...
Veas P, Nicolás; Martínez, Gonzalo; Jalil M, Jorge; Martínez S, Alejandro; Castro G, Pablo
Aspirin use is necessary after a coronary angioplasty. It should not be used in patients with a history of hypersensitivity. However, rapid desensitization protocols have been reported to allow its use in such patients. One of these protocols consists in the administration of progressive doses of aspirin, from 1 to 100 mg in a period of 5.5 hours, in a controlled environment. We report four male patients aged 45,49, 59 and 73 years with a history of aspirin hypersensitivity, who were subjected to a coronary angioplasty. In all, the rapid aspirin desensitization protocol was successfully applied, allowing the use of the drug after the intervention without problems.
Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs
BACKGROUND: Unacknowledged inconsistencies in the reporting of clinical trials undermine the validity of the results of the trials. Little is known about inconsistency in the reporting of academic clinical drug trials. Therefore, we investigated the prevalence of consistency between protocols...... and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory......), primary objective, primary endpoint, and--for confirmatory trials only--hypothesis and sample size calculation. We used logistic regression, χ(2), and Fisher's exact test. RESULTS: A total of 282 applications of academic clinical drug trials were submitted to the Danish Health and Medicines Authority...
Atmospheric contamination by greenhouse gases is a global problem, and thus its solution requires global measures. Although the consequences of climate change are questioned and the foreseeable effects are not excessively serious, there are plenty of scientific reasons for all countries to make the necessary efforts to meet the objectives established by the Kyoto Protocol of reducing the six greenhouse gases over the period 2008-2012. Therefore, it seems essential that we understand the nature of the transformation that are occurring in the different systems, what changes they are causing and what costs they incur. Independently of its effectiveness and realism, the Kyoto Protocol is the first regulatory step in the direction of globalization in the environmental field. (Author)
, we consider commitment multiplication proofs, which allow to prove a multiplicative relation among three commitments, and which play a crucial role in computationally secure MPC. We study a non-interactive solution which works in a distributed-verifier setting and essentially consists of a few...... executions of Pedersen’s VSS. We simplify and improve the protocol, and we point out a (previously overlooked) property which helps to construct non-interactive proofs of partial knowledge in this setting. This allows for instance to prove the knowledge of l out of m given secrets, without revealing which......While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...
A survey is given on the progress of fast chemical separation procedures during the last few years. Fast, discontinuous separation techniques are illustrated by a procedure for niobium. The use of such techniques for the chemical characterization of the heaviest known elements is described. Other rapid separation methods from aqueous solutions are summarized. The application of the high speed liquid chromatography to the separation of chemically similar elements is outlined. The use of the gas jet recoil transport method for nuclear reaction products and its combination with a continuous solvent extraction technique and with a thermochromatographic separation is presented. Different separation methods in the gas phase are briefly discussed and the attachment of a thermochromatographic technique to an on-line mass separator is shown. (45 refs).
Chailloux, André; Kerenidis, Iordanis; Laurière, Mathieu
We consider memoryless quantum communication protocols, where the two parties do not possess any memory besides their classical input and they take turns performing unitary operations on a pure quantum state that they exchange between them. Most known quantum protocols are of this type and recently a deep connection between memoryless protocols and Bell inequality violations has been explored recently by Buhrman et al. We study the information cost of memoryless quantum protocols by looking a...
Cremers, Cas; Rasmussen, Kasper Bonne; Čapkun, Srdjan
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define a fourth main type of attacks on distance bounding protocols, called Distance Hijacking attacks. We show that many proposed distance bounding protocols are vulnerable to these attacks, and we propose solutions to make these protocols resilient to Distance Hijacking. Additionally, we generalize Distance Hijacking to Location Hijacking, to which ...
Qurat ul Ain Nizamani
Full Text Available Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.
Crazzolara, Federico; Winskel, Glynn
A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...... how the Petri-net semantics can be used to prove security properties....
Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)
The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.
Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat
Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.
internet. 2. New Features in IPv6. Harsha Srinath. IPv4, the workhorse protocol of the currently popular TePI. IP protocol suite, is fast becoming obsolete. The exponen- ... required the creation of the next generation of Internet. Protocol-IPv6. ..... using multiple access providers across the same interface to have separate ...
Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri
to ensure the finiteness of the protocol state-spaces while still being able to verify interesting protocol properties. The translations for different kinds of communication media have been implemented and successfully tested, among others, on agreement protocols from WS-Business Activity....
IPv4, the workhorse protocol of the currently popular TePI. IP protocol suite, is fast becoming obsolete. The exponen- tial growth of the Internet is the main reason that has required the creation of the next generation of Internet. Protocol- IPv6. IPv6 is much more flexible and promises to take care of the address space and ...
White, Bruce Alan
..." between "small" and "big" labs, since its use makes certain projects, especially those related to molecular cloning, now far more feasible for the small lab with a modest budget. This new volume on PCR Protocols does not attempt the impossible task of representing all PCR-based protocols. Rather, it presents a range of protocols, both analytical ...
Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.; Mader, Angelika H.
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol. Timing information allows the study of different attack scenarios. We illustrate the attacks by model
Full Text Available Yen-Michael S Hsu,1 Thorsten Haas,2 Melissa M Cushing1 1Department of Pathology and Laboratory Medicine, Weill Cornell Medical College, New York, NY, USA; 2Department of Anesthesia, University Children's Hospital Zurich, Zurich, Switzerland Abstract: Massive transfusion protocols (MTPs are established to provide rapid blood replacement in a setting of severe hemorrhage. Early optimal blood transfusion is essential to sustain organ perfusion and oxygenation. There are many variables to consider when establishing an MTP, and studies have prospectively evaluated different scenarios and patient populations to establish the best practices to attain improved patient outcomes. The establishment and utilization of an optimal MTP is challenging given the ever-changing patient status during resuscitation efforts. Much of the MTP literature comes from the trauma population, due to the fact that massive hemorrhage is the leading cause of preventable trauma-related death. As we come to further understand the positive and negative clinical impacts of transfusion-related factors, massive transfusion practice can be further refined. This article will first discuss specific MTPs targeting different patient populations and current relevant international guidelines. Then, we will examine a wide selection of therapeutic products to support MTPs, including newly available products and the most suitable of the traditional products. Lastly, we will discuss the best design for an MTP, including ratio-based MTPs and MTPs based on the use of point-of-care coagulation diagnostic tools. Keywords: hemorrhage, MTP, antifibrinolytics, coagulopathy, trauma, ratio, logistics, guidelines, hemostatic
Provides programmatic and logistical support for the operations of clinical research for Phase I and Phase II clinical trials Provides deployment of clinical support services for clinical research Streamlines protocol development timeline Provides data and document collection and compilation for regulatory filing with the FDA and other regulatory authorities Provides technical review and report preparation Provides administrative coordination and general logistical support for regulatory activities Ensures the provision of training for investigators and associate staff to reinforce and enhance a GCP culture Provides quality assurance and quality control oversight Performs regulatory review of clinical protocols, informed consent and other clinical documents Tracks and facilitates a portfolio of protocols through each process step (IRB, RAC, DSMB, Office of Protocol Services) Assists clinical investigators in preparing clinical research protocols, including writing and formatting protocol documents and consent forms Prepares protocol packages for review and ensures that protocol packages include all the required material and comply with CCR, NCI and NIH policies Collaborates with investigators to resolve any protocol/data issues Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI Institutional Review Board (IRB) and the clinical trial sponsor or the FDA Monitors the review process and maintains detailed, complete and accurate records for each protocol of the approvals at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such as adverse events Attends and prepares minutes for the Branch Protocol Review Committees For protocols that are performed with other research centers: contacts coordinators at other centers to obtain review committee approvals at these centers, maintains records of
Deborah S. Page-Dumroese; Ann M. Abbott; Thomas M. Rice
Volume I and volume II of the Forest Soil Disturbance Monitoring Protocol (FSDMP) provide information for a wide range of users, including technicians, field crew leaders, private landowners, land managers, forest professionals, and researchers. Volume I: Rapid Assessment includes the basic methods for establishing forest soil monitoring transects and consistently...
Swartz, Kevin; Wang, Di
. An emergency is defined as any event with high priority that needs to be handled immediately. It is assumed that this emergency event is important enough that energy efficiency is not a factor in our protocol. The desired effect is for fast as possible delivery to the base station for rapid event handling....
Halvorsen, Lisa; Garolis, Salomeja; Wallace-Scroggs, Allyson; Stenstrom, Judy; Maunder, Richard
The use of rapid response teams is a relatively new approach for decreasing or eliminating codes in acute care hospitals. Based on the principles of a code team for cardiac and/or respiratory arrest in non-critical care units, the rapid response teams have specially trained nursing, respiratory, and medical personnel to respond to calls from general care units to assess and manage decompensating or rapidly changing patients before their conditions escalate to a full code situation. This article describes the processes used to develop a rapid response team, clinical indicators for triggering a rapid response team call, topics addressed in an educational program for the rapid response team members, and methods for evaluating effectiveness of the rapid response team.
Kim, T D
South Korea's export-oriented development strategy has achieved a remarkable growth record, but it has also brought 2 different problems: 1) since the country's exports accounted for about 1% of total world export volume, the 1st world has become fearful about Korea's aggressive export drive; and 2) the fact that exports account for over 30% of its total gross national product (GNP) exposes the vulnerability of South Korea's economy itself. South Korea continues to be a poor nation, although it is rated as 1 of the most rapidly growing middle income economies. A World Bank 1978 report shows Korea to be 28th of 58 middle income countries in terms of per capita GNP in 1976. Of 11 newly industrializing countries (NIC), 5 in the European continent are more advanced than the others. A recent emphasis on the basic human needs approach has tended to downgrade the concept of GNP. Korea has only an abundant labor force and is without any natural resources. Consequently, Korea utilized an export-oriented development strategy. Oil requirements are met with imports, and almost all raw materials to be processed into exportable products must be imported. To pay import bills Korea must export and earn foreign exchange. It must be emphasized that foreign trade must always be 2-way traffic. In order to export more to middle income countries like Korea, the countries of the 1st world need to ease their protectionist measures against imports from developing countries.
Stolc, Viktor (Inventor); Brock, Matthew W (Inventor)
Method and system for rapid and accurate determination of each of a sequence of unknown polymer components, such as nucleic acid components. A self-assembling monolayer of a selected substance is optionally provided on an interior surface of a pipette tip, and the interior surface is immersed in a selected liquid. A selected electrical field is impressed in a longitudinal direction, or in a transverse direction, in the tip region, a polymer sequence is passed through the tip region, and a change in an electrical current signal is measured as each polymer component passes through the tip region. Each of the measured changes in electrical current signals is compared with a database of reference electrical change signals, with each reference signal corresponding to an identified polymer component, to identify the unknown polymer component with a reference polymer component. The nanopore preferably has a pore inner diameter of no more than about 40 nm and is prepared by heating and pulling a very small section of a glass tubing.
Gehan, Charlotte; Mosser, Benoît; Michel, Eric
Stellar oscillations give seismic information on the internal properties of stars. Red giants are targets of interest since they present mixed modes, wich behave as pressure modes in the convective envelope and as gravity modes in the radiative core. Mixed modes thus directly probe red giant cores, and allow in particular the study of their mean core rotation. The high-quality data obtained by CoRoT and Kepler satellites represent an unprecedented perspective to obtain thousands of measurements of red giant core rotation, in order to improve our understanding of stellar physics in deep stellar interiors. We developed an automated method to obtain such core rotation measurements and validated it for stars on the red giant branch. In this work, we particularly focus on the specific application of this method to red giants having a rapid core rotation. They show complex spectra where it is tricky to disentangle rotational splittings from mixed-mode period spacings. We demonstrate that the method based on the identification of mode crossings is precise and efficient. The determination of the mean core rotation directly derives from the precise measurement of the asymptotic period spacing ΔΠ1 and of the frequency at which the crossing of the rotational components is observed.
Oey, Christian Henry Wijaya; Moh, Sangman
The rapid growth of the elderly population in the world and the rising cost of healthcare impose big issues for healthcare and medical monitoring. A Wireless Body Sensor Network (WBSN) is comprised of small sensor nodes attached inside, on or around a human body, the main purpose of which is to monitor the functions and surroundings of the human body. However, the heat generated by the node's circuitry and antenna could cause damage to the human tissue. Therefore, in designing a routing protocol for WBSNs, it is important to reduce the heat by incorporating temperature into the routing metric. The main contribution of this paper is to survey existing temperature-aware routing protocols that have been proposed for WBSNs. In this paper, we present a brief overview of WBSNs, review the existing routing protocols comparatively and discuss challenging open issues in the design of routing protocols.
Full Text Available The rapid growth of the elderly population in the world and the rising cost of healthcare impose big issues for healthcare and medical monitoring. A Wireless Body Sensor Network (WBSN is comprised of small sensor nodes attached inside, on or around a human body, the main purpose of which is to monitor the functions and surroundings of the human body. However, the heat generated by the node’s circuitry and antenna could cause damage to the human tissue. Therefore, in designing a routing protocol for WBSNs, it is important to reduce the heat by incorporating temperature into the routing metric. The main contribution of this paper is to survey existing temperature-aware routing protocols that have been proposed for WBSNs. In this paper, we present a brief overview of WBSNs, review the existing routing protocols comparatively and discuss challenging open issues in the design of routing protocols.
Espinoza, J.; Sholander, P.; Van Leeuwen, B,
This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.
Khan, Fahd Ahmed
Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.
Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.
Provides programmatic and logistical support for the operations of clinical research Provides deployment of clinical support services for clinical research Streamlines the protocol development timeline Provides data and documents collection and compilation for regulatory filing with the Food and Drug Administration (FDA) and other regulatory authorities Provides technical review and report preparation Provides administrative coordination and general logistical support for regulatory activities Ensures the provision of training for investigators and associate staff to reinforce and enhance a Good Clinical Practices (GCP) culture Oversees quality assurance and quality control, performs regulatory review of clinical protocols, informed consent and other clinical documents Tracks and facilitates a portfolio of protocols through each process step (Institutional Review Board [IRB], Regulatory Affairs Compliance [RAC], Data Safety Monitoring Board [DSMB], Office of Protocol Services) Assists clinical investigators in preparing clinical research protocols, including writing and formatting consent forms Prepares protocol packages for review and ensures that protocol packages include all required material and complies with CCR, NCI and NIH policies Collaborates with investigators to resolve any protocol/data issues Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI IRB, and the clinical trial sponsor or the FDA Monitors the review process and maintains detailed, complete and accurate approval records for each protocol at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such as adverse events Attends and prepares minutes for the Branch Protocol Review Committees Contacts coordinators at other centers for protocols that are performed there to obtain review committee approvals at those centers
C. S. Staley; M. L. Abbott; P. D. Ritter
Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.
DeVincenzi, Donald L. (Editor); Bagby, John (Editor); Race, Margaret (Editor); Rummel, John (Editor)
The Mars Sample Quarantine Protocol (QP) Workshop was convened to deal with three specific aspects of the initial handling of a returned Mars sample: 1) biocontainment, to prevent uncontrolled release of sample material into the terrestrial environment; 2) life detection, to examine the sample for evidence of live organisms; and 3) biohazard testing, to determine if the sample poses any threat to terrestrial life forms and the Earth's biosphere. During the first part of the Workshop, several tutorials were presented on topics related to the workshop in order to give all participants a common basis in the technical areas necessary to achieve the objectives of the Workshop.
Utreras, Andres J.; Gusqui, Luis; Reyes, Andres; Mena, Ricardo I.; Licenko, Gennady L.; Amirgaliyev, Yedilkhan; Komada, Paweł; Luganskaya, Saule; Kashaganova, Gulzhan
To understand and evaluate the Optical Layer, and how it will affect the IP protocols over WDM (Switching), the present analyse is proposed. Optical communications have attractive proprieties, but also have some disadvantages, so the challenge is to combine the best of both branches. In this paper, general concepts for different options of switching are reviewed as: optical burst switching (OBS) and automatically switching optical network (ASON). Specific details such as their architectures are also discussed. In addition, the relevant characteristics of each variation for switching are reviewed.
Barrett, P.; Rots, A.
The transfer of data between different computers and programs can be a major obstacle during data analysis. We present a new data transfer protocol which is based on a simple structure containing a value, an error, and a unit. Each of these members can be arrays or another structure. The ability to nest structures allows for the concept of objects. When using an object-oriented language such as C++, reference can be made to the object name instead of each element explicitly. Prototype code has been written which implements the basic design with enhancements planned for the future.
Cancio, Leopoldo C; Salinas, Jose; Kramer, George C
Fluid resuscitation of burn patients is commonly initiated using modified Brooke or Parkland formula. The fluid infusion rate is titrated up or down hourly to maintain adequate urine output and other endpoints. Over-resuscitation leads to morbid complications. Adherence to paper-based protocols, flow sheets, and clinical practice guidelines is associated with decreased fluid resuscitation volumes and complications. Computerized tools assist providers. Although completely autonomous closed-loop control of resuscitation has been demonstrated in animal models of burn shock, the major advantages of open-loop and decision-support systems are identifying trends, enhancing situational awareness, and encouraging burn team communication. Published by Elsevier Inc.
Markulev, Connie; McGorry, Patrick D; Nelson, Barnaby
polyunsaturated fatty acids (PUFAs), coupled with the falling transition rate in ultra high-risk (UHR) samples, mean that further study of such benign, potentially neuroprotective interventions is clinically and ethically required. Employing a multicentre approach, enabling a large sample size, this study...... response to omega-3 PUFA treatment in the UHR group. CONCLUSION: This is the protocol of the NeuraproE study. Utilizing a large sample, results from this study will be important in informing indicated prevention strategies for schizophrenia and other psychotic disorders, which may be the strongest avenue...
Martin, Stephen R; Schilstra, Maria J
Almost all of the elementary steps in a biochemical reaction scheme are either unimolecular or bimolecular processes that frequently occur on sub-second, often sub-millisecond, time scales. The traditional approach in kinetic studies is to mix two or more reagents and monitor the changes in concentrations with time. Conventional spectrophotometers cannot generally be used to study reactions that are complete within less than about 20 s, as it takes that amount of time to manually mix the reagents and activate the instrument. Rapid mixing techniques, which generally achieve mixing in less than 2 ms, overcome this limitation. This chapter is concerned with the use of these techniques in the study of reactions which reach equilibrium; the application of these methods to the study of enzyme kinetics is described in several excellent texts (Cornish-Bowden, Fundamentals of enzyme kinetics. Portland Press, 1995; Gutfreund, Kinetics for the life sciences. Receptors, transmitters and catalysis. Cambridge University Press, 1995).There are various ways to monitor changes in concentration of reactants, intermediates and products after mixing, but the most common way is to use changes in optical signals (absorbance or fluorescence) which often accompany reactions. Although absorbance can sometimes be used, fluorescence is often preferred because of its greater sensitivity, particularly in monitoring conformational changes. Such methods are continuous with good time resolution but they seldom permit the direct determination of the concentrations of individual species. Alternatively, samples may be taken from the reaction volume, mixed with a chemical quenching agent to stop the reaction, and their contents assessed by techniques such as HPLC. These methods can directly determine the concentrations of different species, but are discontinuous and have a limited time resolution.
Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar
An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .
A field-deployable, battery-powered Rapid Active Sampling Package (RASP), originally designed for sampling strong materials during lunar and planetary missions, shows strong utility for terrestrial geological use. The technology is proving to be simple and effective for sampling and processing materials of strength. Although this originally was intended for planetary and lunar applications, the RASP is very useful as a powered hand tool for geologists and the mining industry to quickly sample and process rocks in the field on Earth. The RASP allows geologists to surgically acquire samples of rock for later laboratory analysis. This tool, roughly the size of a wrench, allows the user to cut away swaths of weathering rinds, revealing pristine rock surfaces for observation and subsequent sampling with the same tool. RASPing deeper (.3.5 cm) exposes single rock strata in-situ. Where a geologist fs hammer can only expose unweathered layers of rock, the RASP can do the same, and then has the added ability to capture and process samples into powder with particle sizes less than 150 microns, making it easier for XRD/XRF (x-ray diffraction/x-ray fluorescence). The tool uses a rotating rasp bit (or two counter-rotating bits) that resides inside or above the catch container. The container has an open slot to allow the bit to extend outside the container and to allow cuttings to enter and be caught. When the slot and rasp bit are in contact with a substrate, the bit is plunged into it in a matter of seconds to reach pristine rock. A user in the field may sample a rock multiple times at multiple depths in minutes, instead of having to cut out huge, heavy rock samples for transport back to a lab for analysis. Because of the speed and accuracy of the RASP, hundreds of samples can be taken in one day. RASP-acquired samples are small and easily carried. A user can characterize more area in less time than by using conventional methods. The field-deployable RASP used a Ni
Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei
Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidly to the burst traffic triggered by sensing events. Those burst traffic conditions include vital physical signal (electrocardiogram, electroencephalogram etc.) monitoring, human motion detection (fall detection, activity monitoring, gesture recognition, motion sensing etc.) and so on. To cope with aforementioned challenges, a statistical frame based TDMA (S-TDMA) protocol with multi-constrained (energy, delay, transmission efficiency and emergency management) service is proposed in this paper. The scenarios where burst traffic is often triggered rapidly with low power consumption and low delay is handled in our proposed S-TDMA. A beacon frame with the contained synchronous and poll information is designed to reduce the possibility of collisions of request frames. A statistical frame which broadcasts the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. Dynamic time slot allocation mechanism is presented to manage the burst traffic and reduce the active period in each beacon period. An emergency mechanism is proposed for vital signals to be transmitted. The theory analysis is proceed and the result is evaluated in the hardware platform. To verify its feasibility, S-TDMA was fully implemented on our independently-developed HBC platform where four sensor nodes and a coordinator are fastened on a human body. Experiment results show that S-TDMA costs 89.397 mJ every 20 s when the payload size is 122 bytes, 9.51% lower than Lightweight MAC
National Aeronautics and Space Administration — Energid Technologies will create a comprehensive software infrastructure for rapid validation of robotic designs. The software will support push-button validation...
National Aeronautics and Space Administration — Energid Technologies will create a comprehensive software infrastructure for rapid validation of robot designs. The software will support push-button validation...
Full Text Available Choreography-based programming is a powerful paradigm for defining communication-based systems from a global viewpoint. A choreography can be checked against multiparty protocol specifications, given as behavioural types, that may be instantiated indefinitely at runtime. Each protocol instance is started with a synchronisation among the involved peers. We analyse a simple transformation from a choreography with a possibly unbounded number of protocol instantiations to a choreography instantiating a single protocol, which is the merge of the original ones. This gives an effective methodology for obtaining new protocols by composing existing ones. Moreover, by removing all synchronisations required for starting protocol instances, our transformation reduces the number of communications and resources needed to execute a choreography.
Cheng, Kevin Y.; Roberts, David A.
Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.
Cheng, Kevin Y.; Roberts, David A.
Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.
Sevillano-Jiménez, Alfonso; Romero-Saldaña, Manuel; Molina-Recio, Guillermo
Rapid recovery (RR) or fast-track programmes are aimed at reducing surgical stress, leading to a reduction in nurse workload, costs and hospital stay, greater patient empowerment, early post-surgical recovery and reduced morbidity and mortality. These new protocols require the coordinated participation of a multidisciplinary team. Based on an integrative review of the literature, this paper aims to define the concept of a RR or fast track programme and show the existing evidence on the implementation of these programmes in nursing. The benefits and low incidence of damage of RR programmes in nursing justify their implementation. The programmes require greater support and diffusion in order to develop, as well as more research to increase the evidence on the effectiveness and efficiency of the protocols. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.
Suzuki, Shinichi; Yamashita, Shunichi; Fukushima, Toshihiko; Nakano, Keiichi; Midorikawa, Sanae; Ohtsuru, Akira; Yasumura, Seiji; Hosoya, Mitsunori; Kamiya, Kenji; Shimura, Hiroki; Suzuki, Satoru; Nakamura, Izumi; Abe, Masafumi
After the Fukushima nuclear power plant accident on March 11, 2011, the public of Japan became particularly concerned about the possibility of an increased risk of childhood thyroid cancer, similar to what was observed after the Chernobyl's accident. Due to serious public health perception, there was an urgency to evaluate the baseline levels of childhood thyroid status in Fukushima prefecture. Therefore we have commenced a thyroid ultrasound examination (TUE) survey of the approximately 360,000 pediatric inhabitants (0 to 18 years of age) who lived in Fukushima at the time of the accident in October 2011. The subjects were divided into three categories according to the standardized diagnostic criteria of ultrasound findings. Category A contained the subjects whose TUE findings were intact or benign. Category B were recommended a confirmatory TUE. Category C was recommended an immediate confirmatory TUE. The survey of 40,302 subjects in the first year was completed in March, 2013. There were 40,097 (99.5%), 205 (0.50%) and 0 subjects in categories A, B and C, respectively. Of the 82 category B subjects who underwent fine needle aspiration cytology (FNAC), 12 were diagnosed with a malignant tumor or were suspected to have malignancy. The 12 subjects received thyroid surgery and 11 thyroid cancers and one benign nodule were confirmed histologically after surgery. This is the first large-scaled TUE survey to employ sophisticated ultrasound screening and aim to evaluate the baseline frequency of childhood thyroid nodules and cysts. The results will become the golden standard of future comparative TUE in Fukushima, Japan.
contribution of the various factors, namely diet, malaria, intestinal parasites and other factors, in different settings and ... simplified food-frequency questionnaire; and (v) assessment of anaemia control programmes in place, ..... This could be ascribed to the contamination of the environment by bacteria and parasites and the ...
Cachin, Christian; Vukolić, Marko
A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...
Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; Renesse, Robbert,
Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...
Ákos Márk Horváth
Full Text Available Even if it sound a bit incredible rapid prototyping (RPT as production method has been used for decades in other professions. Nevertheless medical science just started discover the possibilities of this technology and use the offered benefits of 3D printing. In this paper authors have investigated the pharmaceutical usage of rapid prototyping.
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a
Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.
Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick
We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process...... but then switches to a denser coding structure towards the end. Our systematic mechanism maintains the sparse structure during the recombination of packets at the intermediate nodes. The performance of our protocol is compared by means of simulations of IEEE reference grids against standard master-slave protocols...
This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil
Full Text Available A recent letter published in Nature (Kurz et al. 2008a reports an outbreak of mountain pine beetles in British Columbia, destroying millions of trees; according to the authors, by 2020, the beetles will have done so much damage that the forest is expected to release more carbon dioxide than it absorbs. All those natural disturbances could overwhelmed all the efforts made by Canada to influence the carbon balance through forest management. Considering that Canada decided not to elect forest management within the Kyoto Protocol, it is clear that future climate mitigation agreements, aimed to encourage changes in forest management, should account for and protect against the impacts of natural disturbances.
Gao, Han; Nielson, Flemming; Nielson, Hanne Riis
We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....
Butler, Ashleigh; Hall, Helen; Copnell, Beverley
The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the
Precise deletion of gene(s) of interest, while leaving the rest of the genome unchanged, provides the ideal product to determine that particular gene’s function in the living organism. In this protocol we describe the OSCAR method of precise and rapid deletion plasmid construction. OSCAR relies on t...
Fuchs, W. K.
This paper describes recent developments in the use of memory management and compiler technology to support rapid recovery from failures in computer systems. The techniques described include cache coherence protocols for user transparent checkpointing in multiprocessor systems, compiler-based checkpoint placement, compiler-based code modification for multiple instruction retry, and forward recovery in distributed systems utilizing optimistic execution.
This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...
Woiski, Mallory D.; van Vugt, Helena C.; Dijkman, Anneke; Grol, Richard P.; Marcus, Abraham; Middeldorp, Johanna M.; Mol, Ben W.; Mols, Femke; Oudijk, Martijn A.; Porath, Martina; Scheepers, Hubertina J.; Hermens, Rosella P.
Objective Postpartum hemorrhage (PPH) has a continuously rising incidence worldwide, suggesting suboptimal care. An important step in optimizing care is the translation of evidence-based guidelines into comprehensive hospital protocols. However, knowledge about the quality of these protocols is
Kirkeby, Agnete; Nelander, Jenny; Parmar, Malin
Human pluripotent stem cells possess the potential to generate cells for regenerative therapies in patients with neurodegenerative diseases, and constitute an excellent cell source for studying human neural development and disease modeling. Protocols for neural differentiation of human pluripotent stem cells have undergone significant progress during recent years, allowing for rapid and synchronized neural conversion. Differentiation procedures can further be combined with accurate and efficient positional patterning to yield regionalized neural progenitors and subtype-specific neurons corresponding to different parts of the developing human brain. Here, we present a step-by-step protocol for neuralization and regionalization of human pluripotent cells for transplantation studies or in vitro analysis.
Ian D. Alston
Full Text Available New methodologies, engineering processes, and support environments are beginning to emerge for embedded signal processing systems. The main objectives are to enable defence industry to field state-of-the-art products in less time and with lower costs, including retrofits and upgrades, based predominately on commercial off the shelf (COTS components and the model-year concept. One of the cornerstones of the new methodologies is the concept of rapid prototyping. This is the ability to rapidly and seamlessly move from functional design to the architectural design to the implementation, through automatic code generation tools, onto real-time COTS test beds. In this paper, we try to quantify the term Ã¢Â€ÂœrapidÃ¢Â€Â and provide results, the metrics, from two independent benchmarks, a radar and sonar beamforming application subset. The metrics show that the rapid prototyping process may be sixteen times faster than a conventional process.
Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min
In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.
The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)
Molas-Ferrer, Gloria; Farré-Ayuso, Elisabet; doPazo-Oubiña, Fernando; deAndrés-Lázaro, Ana; Guell-Picazo, Jaume; Borrás-Maixenchs, Núria; Corominas-Bosch, Lourdes; Valverde-Bosch, Montserrat; Creus-Baró, Natalia
Extravasation of chemotherapy is an undesirable complication related to the administration of antineoplastic therapy. Establishing the real incidence is difficult. Because of the importance of a quick intervention after an extravasation, every hospital should have an extravasation protocol. The purpose of this study was to determine the degree of observance of an extravasation protocol by nursing staff and to determine extravasation incidence. This descriptive, longitudinal, retrospective study was set in a tertiary-level hospital. The researchers reviewed 117 extravasation notification forms received by the pharmacy department during a 10-year period. Nursing actuation, particularly observance of the extravasation protocol, was analyzed. Protocol adherence was 89%. Twelve deviations from the protocol in the application of recommended measures were detected. An antidote was used in 41 patients, and temperature measures were applied in 14 cases. Ninety-nine patients had at least one episode of reported follow-up. No cases of necrosis or skin ulcers were described, except by one patient, who developed a delayed skin ulcer to vinorelbine. Drugs most frequently reported were etoposide, carboplatin, and paclitaxel. Nursing staff should be continuously trained in extravasation protocol because a rapid actuation can prevent skin lesions.
Giseli D. Germano
Full Text Available Early identification of students at risk of dyslexia has been an educational challenge in the past years. This research had two main goals. First, we aimed to develop a screening protocol for early identification of Brazilian children at risk for dyslexia; second, we aimed to identify the predictive variables of this protocol using Principal Component Analysis. The major step involved in developing this protocol was the selection of variables, which were chosen based on the literature review and linguistic criteria. The screening protocol was composed of seven cognitive-linguistic skills: Letter naming; Phonological Awareness (which comprises the following subtests: Rhyme production, Rhyme identification, Syllabic segmentation, Production of words from a given phoneme, Phonemic Synthesis, and Phonemic analysis; Phonological Working memory, Rapid naming Speed; Silent reading; Reading of words and non-words; and Auditory Comprehension of sentences from pictures. A total of 149 children, aged from 6 years to 6 and 11, of both genders who were enrolled in the 1st grade of elementary public schools were submitted to the screening protocol. Principal Component Analysis revealed four factors, accounting for 64.45% of the variance of the Protocol variables: first factor (“pre-reading”, second factor (“decoding”, third factor (“Reading”, and fourth factor “Auditory processing.” The factors found corroborate those reported in the National and International literature and have been described as early signs of dyslexia and reading problems.
Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick
We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...
A funding protocol simply states the clinical indications for a particular procedure or treatment so that funders of ... The methodology used to develop a funding protocol is much shorter and simpler than that ... not a functional test (nuclear medicine stUdy or dobutamine echo), and therefore a positive test does not imply that ...
MMed degree. Although occasional reference will be made to qualitative approaches, it is likely that the majority of these studies will be quantitative designs and these form the focus of this paper. Keywords: MMed, protocol, protocol design, research, research design. Introduction. The introduction of compulsory research for ...
This document describes the protocol for horses in more detail. For the development of the protocol the Welfare Quality® framework was used. For each measure there is a description how to assess the measure including the method of classification.
Haan, Robbert de
This thesis discusses new results in two areas within cryptography; securely transmitting a message between two parties and securely computing a function on the inputs of multiple parties. For both of these areas we mainly consider perfectly secure protocols, which are protocols that have a zero
Wu, Ting-wan; Wu, Guo-hua
This paper presented an improved quantum key distribution protocol of the quantum cryptology. Using the same measure polarizer as BB84 protocol, the improved protocol we designed with not any classical channel, but a new looped quantum channel instead, so the job of sending and receiving can be finished only by one same person. It brings several good points: the utilization ratio of photons 100% in perfect condition, at least twice over other protocols, or even higher; the public channel easy to be attacked is avoided. Further, the improved protocol authenticates the legal communicators with pre-share information, so that no attacker can jump over the progress of authentication. Be alien from the protocol of BB84, the improved protocol uses message summary to detect whether messages intercepted by attacker. Because the message summary is encrypted by one-time-pad method using pre-share information, attacker could not alter the message summary and that not to be discovered. Moreover, some theoretical analysis to the improved protocol given with information theory: we used the measure channel concept for quantum detection, and calculated the information quantity obtained by attacker in the quantum secrecy communication. The analysis results provide the theory criterion for the legal communicators and the attackers.
S.-S.T.Q. Jongmans (Sung-Shik); F. Arbab (Farhad)
textabstractWe present PrDK: a development kit for programming protocols. PrDK is based on syntactic separation of process code, presumably written in an existing general-purpose language, and protocol code, written in a domain-specific language with explicit, high-level elements of syntax for
Juan Carlos Morales
Full Text Available Kindling, one of the most used models of experimental epilepsy is based on daily electrical stimulation in several brain structures. Unlike the classic or slow kindling protocols (SK, the rapid kindling types (RK described until now require continuous stimulation at suprathreshold intensities applied directly to the same brain structure used for subsequent electrophysiological and inmunohistochemical studies, usually the hippocampus. However, the cellular changes observed in these rapid protocols, such as astrogliosis and neuronal loss, could be due to experimental manipulation more than to epileptogenesis-related alterations. Here, we developed a new RK protocol in order to generate an improved model of temporal lobe epilepsy (TLE which allows gradual progression of the epilepsy as well as obtaining an epileptic hippocampus, thus avoiding direct surgical manipulation and electric stimulation over this structure. This new protocol consists of basolateral amygdala (BLA stimulation with 10 trains of biphasic pulses (10s;50Hz per day with 20 minutes-intervals, during 3 consecutive days, using a subconvulsive and subthreshold intensity, which guarantees tissue integrity. The progression of epileptic activity was evaluated in freely moving rats through EEG recordings from cortex and amygdala, accompanied with synchronized video recordings. Moreover, we assessed the effectiveness of RK protocol and the establishment of epilepsy by evaluating cellular alterations of hippocampal slices from kindled rats. RK protocol induced convulsive states similar to SK protocols but in 3 days, with persistently lowered threshold to seizure induction and epileptogenic-dependent cellular changes in amygdala projection areas. We concluded that this novel RK protocol introduces a new variant of the chronic epileptogenesis models in freely moving rats, which is faster, highly reproducible and causes minimum cell damage with respect to that observed in other experimental
Damgård, Ivan Bjerre
, one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...
Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)
As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.
National Aeronautics and Space Administration — ORBITEC, in collaboration with Lucigen, proposes a rapid genetic detector for spaceflight water systems to enable real-time detection of E-coli with minimal...
National Aeronautics and Space Administration — ORBITEC, in collaboration with Lucigen, proposes a rapid nucleic acid-based detector for spaceflight water systems to enable simultaneous quantification of multiple...
B. K. Singh
Full Text Available The protocol of rapid identification system consists of three chemical color reactions; two group tests for fluoroquinolone class and a compound specific test each for norfloxacin, ciprofloxacin, gatifloxacin, ofloxacin, levofloxacin and sparfloxacin. The group color reactions are based on (a Oxidizing behavior of quinolone and (b Fluorine functional groups, both of which are characteristic of fluoroquinolone class. The compound specific color reactions are developed taking into consideration unique chemical behavior of each compound. The proposed chemical color tests have high selectivity⁄specificity, are ideal for screening purpose. The color of each test was defined by two standard color systems namely CIE lab and Munsell color. A suspected counterfeit tablet of any of the above mentioned drugs can be identified within 10-15 min using this rapid identification system.
Berlin, David; Lalime, Erin; Carosso, Nancy
The purpose of this project is to develop a sterile water based rapid bioburden test. Contamination engineers use two tests to assess the level of biological contamination on hardware: the rapid five minute bioburden test, which is a molecular screening for Adenosine triphosphate (ATP), a molecule found in all cells on the hardware, and a slower colony growth test, which is used to give a more accurate representation of the amount of microbes on the hardware. However, the rapid bioburden test has limited application because it leaves a residue that can be detrimental to sensitive hardware. This can cause project delays while waiting for the results from the three day colony growth test. We address this problem by adapting the commercial germicide based ATP system to a sterile water based system. The test works by reacting ATP with D-Luciferin and Luciferase protein to yield light. The light is then detected by a luminometer that outputs a Relative Light Unit (RLU) amount depending on how much ATP is present. To analyze the effectiveness of the new test, we developed a correlation between amounts of ATP and the RLU produced using the germicide based system. From these experiments, we've generated a consistent relationship between the two in the form of a power curve. From there, we developed a correlation curve between the amount of colonies and the RLU they produced. Initial tests of the new protocol have shown that the water based system isn't as sensitive as the germicide based test.
H. S. Haj Aliwi
Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.
Full Text Available So-called psychological verbs such as Italian temere ‘fear’, preoccupare ‘worry’, and piacere ‘like’ present an extremely varied argument structure across languages, that arranges these two roles in apparently opposite hierarchies and assigns them different grammatical functions (subject, direct, indirect and prepositional objects. This paper wants to provide a descriptively adequate classification of such verbs in Latin and Italian to serve future analyses irrespective of their theoretical persuasion. We individuate six classes in Italian and seven classes in Latin, which comply with Belletti and Rizzi’s (1988 original analysis of psych verbs and focus on the three less studied classes, namely unaccusatives, unergatives and impersonals. We show that diachronic variation and apparent intra-language idiosyncrasies are due to the fact that these classes are universally available to all psych roots. The presentation is set in a protocol fashion in the sense of Giusti and Zegrean (2015 and Di Caro and Giusti (2015.
Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)
There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of
Schwartz, Stephan A
surgeries using hypnosis as the anesthetic, anticipating its usage in this capacity a century later. So great was the disapproval of Mesmer, however, that no one seems to have gotten Eliotson's point. Franklin's protocol, though, rapidly became the gold standard of science. Rupert Sheldrake, however, carried out a survey of the leading scientific journals and discovered that the main use of the blind protocol is not in medicine per se, but parapsychology and consciousness research, in which it is used for the same purposes it was originally conceived: to winnow out fraud in anomalous consciousness events and to avoid introducing experimenter effects. Ultimately, though, the protocol may be based on a false assumption, because increasingly research in areas such as therapeutic intent/healing and remote viewing suggest that all consciousness from single-celled organisms to human beings may be interlinked through a nonlocal aspect of awareness they all share.
Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not now required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already apparent as
Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not currently required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already
Full Text Available The rapidly evolving communication system enables applications for telephone communication to be carried over the data network known as VoIP (voice over internet protocol. SIP (session initiation protocol as the signaling protocol is text-based VoIP which can be implemented easily in comparison with other signalingprotocols. The purpose of this paper is designing and implementing VoIP billing up to the company to provide additional facilities for enterprise customers. The methods start with data collection, analysis, design, development, and implementation. The result achieved is a system of VoIP with SIP and Asterisk software which has functions of PBX to provide additional facilities such as VoIP which is a plus for the company and customers. After implemented, the VoIP system and billing features are found work well.
Hafeez, Baria; Paolicchi, Juliann; Pon, Steven; Howell, Joy D; Grinspan, Zachary M
Status epilepticus is a common neurologic emergency in children. Pediatric medical centers often develop protocols to standardize care. Widespread adoption of electronic health records by hospitals affords the opportunity for clinicians to rapidly, and electronically evaluate protocol adherence. We reviewed the clinical data of a small sample of 7 children with status epilepticus, in order to (1) qualitatively determine the feasibility of automated data extraction and (2) demonstrate a timeline-style visualization of each patient's first 24 hours of care. Qualitatively, our observations indicate that most clinical data are well labeled in structured fields within the electronic health record, though some important information, particularly electroencephalography (EEG) data, may require manual abstraction. We conclude that a visualization that clarifies a patient's clinical course can be automatically created using the patient's electronic clinical data, supplemented with some manually abstracted data. Future work could use this timeline to evaluate adherence to status epilepticus clinical protocols. © The Author(s) 2015.
Fallahbaghery, Azadeh; Zou, Wei; Byrne, Keren; Howitt, Crispin A; Colgrave, Michelle L
The efficiency of gluten extraction is of critical importance to the results derived from any analytical method for gluten detection and quantitation, whether it employs reagent-based technology (antibodies) or analytical instrumentation (mass spectrometry). If the target proteins are not efficiently extracted, the end result will be an under-estimation in the gluten content posing a health risk to people affected by conditions such as celiac disease (CD) and nonceliac gluten sensitivity (NCGS). Five different extraction protocols were investigated using LC-MRM-MS for their ability to efficiently and reproducibly extract gluten. The rapid and simple "IPA/DTT" protocol and related "two-step" protocol were enriched for gluten proteins, 55/86% (trypsin/chymotrypsin) and 41/68% of all protein identifications, respectively, with both methods showing high reproducibility (CV gluten class behaving the same.
Seyed Mostafa Monzavi
Full Text Available Background: Snakebite in Iran has been a health concern. However, management of snakebite is not standardized and varies from center to center. This study is aimed at devising an evidence-based comprehensive protocol for snakebite management in Iran, to reduce unnecessary variations in practice. Materials and Methods: A narrative search in electronic databases was performed. Fifty peer-reviewed articles, guidelines, and textbooks were reviewed and practical details were extracted. Our currently used protocol in the Mashhad Toxicology Center was supplemented with this information. Consequently an improved wide-range protocol was developed. The protocol was then discussed and amended within a focus group comprised of medical toxicologists and internal medicine specialists. The amended version was finally discussed with expert physicians specialized in different areas of medicine, to be optimized by supplementing other specific considerations. Results: During a one-year process, the protocol was finalized. The final version of the protocol, which was designed in six steps, comprised of three components: A schematic algorithm, a severity grading scale, and instructions for supportive and adjunctive treatments. The algorithm pertains to both Viperidae and Elapidae snakebite envenomations and consists of a planned course of action and dosing of antivenom, based on the severity of the envenomation. Conclusion: Snakebite envenomation is a clinical toxicologic emergency, which needs to be treated in a timely and organized manner. Hence, a multi-aspect protocol was designed to improve the clinical outcomes, reduce unnecessary administration of antivenom, and help physicians make more proper clinical judgments.
Bilal, Muhammad; Kang, Shin-Gak
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN
Adriel Barboza Bentos
Full Text Available ABSTRACT Agriculture, urbanization, and industrialization are some of the anthropogenic activities that constantly generate negative impacts on natural environments. Part of this degradation directly affects aquatic systems. This study aimed to evaluate the visual characteristics of the Araras Stream, located in the municipality of Araras, São Paulo state, Brazil. Data was collected at six different assessment sites along the river in both rural and urban areas. The evaluation used a Rapid Habitat Diversity Assessment (RHDA protocol composed of 22 parameters, which define levels of preservation of ecological conditions. According to this protocol, the 32 Km-long study transect along the Araras Stream was rated as impacted (39.6 points. A separate assessment by transects showed that only Transect 1 presented a natural level of preservation (71.8 points. Transects located in the urban area contributed the most to impacts on the aquatic environment. The RHDA protocol proved to be an important tool to evaluate and monitor aquatic environments.
Polyana Kelly Martins
Full Text Available The production and use of sugarcane in Brazil is very important for bioenergy production and is recognized as one of the most efficient in the world. In our laboratory, Setaria viridis is being tested as a model plant for sugarcane. S. viridis has biological attributes (rapid life cycle, small genome, diploid, short stature and simple growth requirements that make it suitable for use as a model system. We report a highly efficient protocol for Agrobacterium-mediated genetic transformation of S. viridis. The optimization of several steps in tissue culture allowed the rapid regeneration of plants and increased the rate of transformation up to 29%. This protocol could become a powerful tool for functional genomics in sugarcane.
Full Text Available There is an increasing call for the absolute quantification of time-resolved metabolite data. However, a number of technical issues exist, such as metabolites being modified/degraded either chemically or enzymatically during the extraction process. Additionally, capillary electrophoresis mass spectrometry (CE-MS is incompatible with high salt concentrations often used in extraction protocols. In microbial systems, metabolite yield is influenced by the extraction protocol used and the cell disruption rate. Here we present a method that rapidly quenches metabolism using dry-ice ethanol bath and methanol N-ethylmaleimide solution (thus stabilising thiols, disrupts cells efficiently using bead-beating and avoids artefacts created by live-cell pelleting. Rapid sample processing minimised metabolite leaching. Cell weight, number and size distribution was used to calculate metabolites to an attomol/cell level. We apply this method to samples obtained from the respiratory oscillation that occurs when yeast are grown continuously.
Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja
In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.
The unique features of a multisatellite network, which distinguish it from ordinary terrestrial networks, are the large propagation delay on the links, the constant changes in the network topology, and additional constraints such as limitation on power consumption. It is noted that ordinary protocols, which are designed to operate in stable, benign environments, will perform poorly under the dynamic conditions of multisatellite network. The author analyzes the limitations to existing protocols and describes protocols, such as routing, topology control, and reliable transport, that are suitable for multisatellite networks.
Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)
Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.
Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu
Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja
In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.
Full Text Available Wireless sensor networks are widely used in military applications, monitoring of environmental information, health, domestic, and industrial applications. Despite of these wide usages, the main problem of this kind of topologies is the increasing security needs. This paper has been targeted to develop a novel message identity validation protocol in WSN to provide secure data identity in order to decrease some security threads. Introduced protocol also includes key distribution, node identification, sensitivity mechanisms, to strengthen the introduced method. Moreover, there is also repeated symmetrical key update mechanism without the need to synchronization. Finally, the developed protocol has also been tested in terms of various network parameters.
Martins, João Soares; Zwi, Anthony B; Hobday, Karen; Bonaparte, Fernando; Kelly, Paul M
Background Timor-Leste changed its malaria treatment protocol in 2007, replacing the first-line for falciparum malaria from sulphadoxine-pyrimethamine to artemether-lumefantrine. This study explored the factors affecting the implementation of the revised treatment protocol, with an emphasis on identifying key constraints. Methods A mixed method approach drew on both qualitative and quantitative data. The study included data from District Health Services in seven districts, community health centres in 14 sub-districts, four hospitals, five private clinics, one private pharmacy and the country's autonomous medical store. In-depth interviews with 36 key informants, five group interviews and 15 focus group discussions were conducted. A survey was also undertaken at community health centres and hospitals to assess the availability of a physical copy of the Malaria Treatment Protocol, as well as the availability and utilization of artemether-lumefantrine and sulphadoxine-pyrimethamine. Results Many factors impeded the implementation of the new malaria protocol. These included: inadequate introduction and training around the revised treatment protocol; unclear phasing out of sulphadoxine-pyrimethamine and phasing in of the revised treatment, artemether-lumefantrine, and the rapid diagnostic test (RDT); lack of supervision; lack of adherence to the revised guidelines by foreign health workers; lack of access to the new drug by the private sector; obstacles in the procurement process; and the use of trade names rather than generic drug description. Insufficient understanding of the rapid diagnostic test and the untimely supply of drugs further hampered implementation. Conclusion To effectively implement a revised malaria treatment protocol, barriers should be identified during the policy formulation process and those emerging during implementation should be recognized promptly and addressed. PMID:22460007
Zhao, S.; Raedt, H. De
We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.
Roça, Guilherme Berto; Foggiatto, José Aguiomar; Ono, Maria Cecilia Closs; Ono, Sergio Eiji; da Silva Freitas, Renato
This study aims to compare orbital volume obtained by helical tomography and rapid prototyping. The study sample was composed of 6 helical tomography scans. Eleven healthy orbits were identified to have their volumes measured. The volumetric analysis with the helical tomography utilized the same protocol developed by the Plastic Surgery Unit of the Federal University of Paraná. From the CT images, 11 prototypes were created, and their respective volumes were analyzed in 2 ways: using software by SolidWorks and by direct analysis, when the prototype was filled with saline solution. For statistical analysis, the results of the volumes of the 11 orbits were considered independent. The average orbital volume measurements obtained by the method of Ono et al was 20.51 cm, the average obtained by the SolidWorks program was 20.64 cm, and the average measured using the prototype method was 21.81 cm. The 3 methods demonstrated a strong correlation between the measurements. The right and left orbits of each patient had similar volumes. The tomographic method for the analysis of orbital volume using the Ono protocol yielded consistent values, and by combining this method with rapid prototyping, both reliability validations of results were enhanced.
Butts, Ian; Sørensen, Sune Riis; Politis, Sebastian Nikitas
Standardization of artificial fertilization protocols for the European eel, Anguilla anguilla, is a prerequisite for optimizing the use of available gametes in hatchery facilities and for conserving sperm from high quality males, which is either cryopreserved or in living gene banks. The objectives...... of this research were to provide a rapid, accurate and precise method to quantify sperm density by examining the relationship between sperm density and absorbance by use of a spectrophotometer, determine the optimal number of sperm required to fertilize eggs in a controlled setting, and explore how long eggs...... are receptive to fertilization post-stripping. Mean sperm density and absorbance at 350nm were 1.54e+10±4.95e+9sperm/mL and 1.91±0.22nm, respectively. Regression analysis demonstrated a highly significant positive relationship between sperm density and absorbance using a spectrophotometer at 350nm (R2=0.94, p
Amir V. Tavakoli
Full Text Available Perception, cognition and consciousness can be modulated as a function of oscillating neural activity, while ongoing neuronal dynamics are influenced by synaptic activity and membrane potential. Consequently, transcranial alternating current stimulation (tACS may be used for neurological intervention. The advantageous features of tACS include the biphasic and sinusoidal tACS currents, the ability to entrain large neuronal populations, and subtle control over somatic effects. Through neuromodulation of phasic, neural activity, tACS is a powerful tool to investigate the neural correlates of cognition. The rapid development in this area requires clarity about best practices. Here we briefly introduce tACS and review the most compelling findings in the literature to provide a starting point for using tACS. We suggest that tACS protocols be based on functional brain mechanisms and appropriate control experiments, including active sham and condition blinding.
Finke, Aaron D; Panepucci, Ezequiel; Vonrhein, Clemens; Wang, Meitian; Bricogne, Gérard; Oliéric, Vincent
Experimental phasing by single- or multi-wavelength anomalous dispersion (SAD or MAD) has become the most popular method of de novo macromolecular structure determination. Continuous advances at third-generation synchrotron sources have enabled the deployment of rapid data collection protocols that are capable of recording SAD or MAD data sets. However, procedural simplifications driven by the pursuit of high throughput have led to a loss of sophistication in data collection strategies, adversely affecting measurement accuracy from the viewpoint of anomalous phasing. In this chapter, we detail optimized strategies for collecting high-quality data for experimental phasing, with particular emphasis on minimizing errors from radiation damage as well as from the instrument. This chapter also emphasizes data processing for "on-the-fly" decision-making during data collection, a critical process when data quality depends directly on information gathered while at the synchrotron.
Pinu, Farhana R; Villas-Boas, Silas G; Aggio, Raphael
Sample preparation is one of the most important steps in metabolome analysis. The challenges of determining microbial metabolome have been well discussed within the research community and many improvements have already been achieved in last decade. The analysis of intracellular metabolites is particularly challenging. Environmental perturbations may considerably affect microbial metabolism, which results in intracellular metabolites being rapidly degraded or metabolized by enzymatic reactions. Therefore, quenching or the complete stop of cell metabolism is a pre-requisite for accurate intracellular metabolite analysis. After quenching, metabolites need to be extracted from the intracellular compartment. The choice of the most suitable metabolite extraction method/s is another crucial step. The literature indicates that specific classes of metabolites are better extracted by different extraction protocols. In this review, we discuss the technical aspects and advancements of quenching and extraction of intracellular metabolite analysis from microbial cells.
River classification is important for reporting ecological status and for the general ecological management of river systems by partitioning natural variability. A priori river classification by abiotic variables and validation of classifications obtained using aquatic macroinvertebrates from reference sites for selected Tanzanian ...
Waite, Ian R.; Kennen, Jonathan G.; May, Jason T.; Brown, Larry R.; Cuffney, Thomas F.; Jones, Kimberly A.; Orlando, James L.
We aggregated invertebrate data from various sources to assemble data for modeling in two ecoregions in Oregon and one in California. Our goal was to compare the performance of models developed using multiple linear regression (MLR) techniques with models developed using three relatively new techniques: classification and regression trees (CART), random forest (RF), and boosted regression trees (BRT). We used tolerance of taxa based on richness (RICHTOL) and ratio of observed to expected taxa (O/E) as response variables and land use/land cover as explanatory variables. Responses were generally linear; therefore, there was little improvement to the MLR models when compared to models using CART and RF. In general, the four modeling techniques (MLR, CART, RF, and BRT) consistently selected the same primary explanatory variables for each region. However, results from the BRT models showed significant improvement over the MLR models for each region; increases in R2 from 0.09 to 0.20. The O/E metric that was derived from models specifically calibrated for Oregon consistently had lower R2 values than RICHTOL for the two regions tested. Modeled O/E R2 values were between 0.06 and 0.10 lower for each of the four modeling methods applied in the Willamette Valley and were between 0.19 and 0.36 points lower for the Blue Mountains. As a result, BRT models may indeed represent a good alternative to MLR for modeling species distribution relative to environmental variables.
Benthic macroinvertebrate community composition is used to assess wetland and stream condition and to help differentiate the effects of stressors among sites. Deoxyribonucleic acid (DNA) barcoding has been promoted as a way to increase taxonomic resolution and, thereby, to increa...
The growing challenges for environmental monitoring and assessment have pushed standard techniques to the limits of their application. Current biological monitoring programs often require considerable time and workload to provide environmental condition assessments. New molecular...
Impact of pollution on aquatic biota is usually assessed by comparing the assemblage at an impacted site with those at a control or reference site. In South Africa, except in rivers where not all biotopes are represented, the characterisation of a macroinvertebrate-based pollution effect is usually based on samples collected ...
Apr 3, 2015 ... At the reach scale in freshwater ecosystems, available biotopes, i.e. microhabitats, .... Analysis of similarity (ANOSIM), which is a non-parametric multivariate statistical technique, was used to .... scaling (NMDS), because it indicates the degree of species prefer- ence for a given biotope and can detect both ...
Full Text Available Summary Introduction/objective: fast-tract surgery (FTS has been rapidly embraced by surgeons as a mechanism for improving patient care and driving down complications and costs. The aim of this study was to determine if any improvement in outcomes occurred after FTS protocol for selective double portazygous disconnection with preserving vagus (SDPDPV compared with non-FTS postoperative care. Methods: patients eligible for SDPDPV in the period January 2012-April 2014 were randomly selected for the FTS group or non-FTS group. A designed protocol was used in the FTS group with emphasis on an interdisciplinary approach. The non-FTS group was treated using previously established standard procedures. The number of postoperative complications, time of functional recovery and duration of hospital stay were recorded. Results: patients in the FTS group (n=59 and non-FTS group (n=57 did not differ in terms of preoperative data and operative details (p>0.05. The FTS procedure led to significantly better control and faster restoration of gastrointestinal functions, food tolerance, rehabilitation and hospital discharge (p<0.05. Postoperative complications, including nausea/vomiting, severe ascites, wound infection, urinary tract infection and pulmonary infection were all significantly lower in the FTS group (p<0.05. According to the postoperative morbidity classification used by Clavien, overall complications and grade I complications were both significantly lower in the FTS group compared with the non-FTS group (p<0.05. Conclusion: adopting the FTS protocol helped to recover gastrointestinal functions, to reduce frequency of postoperative complications and to reduce hospital stay. The FTS strategy is safe and effective in improving postoperative outcomes.
Agnete eKirkeby; Jenny eNelander; Malin eParmar
Human pluripotent stem cells possess the potential to generate cells for regenerative therapies in patients with neurodegenerative diseases, and constitute an excellent cell source for studying human neural development and disease modeling. Protocols for neural differentiation of human pluripotent stem cells have undergone significant progress during recent years, allowing for rapid and synchronized neural conversion. Differentiation procedures can further be combined with accurate and effici...
Hori, Tomohide; Oike, Fumitaka; Furuyama, Hiroaki; Machimoto, Takafumi; Kadokawa, Yoshio; Hata, Toshiyuki; Kato, Shigeru; Yasukawa, Daiki; Aisu, Yuki; Sasaki, Maho; Kimura, Yusuke; Takamatsu, Yuichiro; Naito, Masato; Nakauchi, Masaya; Tanaka, Takahiro; Gunji, Daigo; Nakamura, Kiyokuni; Sato, Kiyoko; Mizuno, Masahiro; Iida, Taku; Yagi, Shintaro; Uemoto, Shinji; Yoshimura, Tsunehiro
Laparoscopic cholecystectomy (LC) does not require advanced techniques, and its performance has therefore rapidly spread worldwide. However, the rate of biliary injuries has not decreased. The concept of the critical view of safety (CVS) was first documented two decades ago. Unexpected injuries are principally due to misidentification of human factors. The surgeon's assumption is a major cause of misidentification, and a high level of experience alone is not sufficient for successful LC. We herein describe tips and pitfalls of LC in detail and discuss various technical considerations. Finally, based on a review of important papers and our own experience, we summarize the following mandatory protocol for safe LC: (1) consideration that a high level of experience alone is not enough; (2) recognition of the plateau involving the common hepatic duct and hepatic hilum; (3) blunt dissection until CVS exposure; (4) Calot's triangle clearance in the overhead view; (5) Calot's triangle clearance in the view from underneath; (6) dissection of the posterior right side of Calot's triangle; (7) removal of the gallbladder body; and (8) positive CVS exposure. We believe that adherence to this protocol will ensure successful and beneficial LC worldwide, even in patients with inflammatory changes and rare anatomies.
Full Text Available Introduction. Pelvic floor dysfunction syndromes present with voiding, sexual, and anorectal disturbances, which may be associated with one another, resulting in complex presentation. Thus, an integrated diagnosis and management approach may be required. Pelvic muscle rehabilitation (PMR is a noninvasive modality involving cognitive reeducation, modification, and retraining of the pelvic floor and associated musculature. We describe our standardized PMR protocol for the management of pelvic floor dysfunction syndromes. Pelvic Muscle Rehabilitation Program. The diagnostic assessment includes electromyography and manometry analyzed in 4 phases: (1 initial baseline phase; (2 rapid contraction phase; (3 tonic contraction and endurance phase; and (4 late baseline phase. This evaluation is performed at the onset of every session. PMR management consists of 6 possible therapeutic modalities, employed depending on the diagnostic evaluation: (1 down-training; (2 accessory muscle isolation; (3 discrimination training; (4 muscle strengthening; (5 endurance training; and (6 electrical stimulation. Eight to ten sessions are performed at one-week intervals with integration of home exercises and lifestyle modifications. Conclusions. The PMR protocol offers a standardized approach to diagnose and manage pelvic floor dysfunction syndromes with potential advantages over traditional biofeedback, involving additional interventions and a continuous pelvic floor assessment with management modifications over the clinical course.
Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.
Full Text Available powder is a fiber, problems of manufacturing occur. The method has also been used to make Metal Matrix Composite (MMC), e.g Fe and graphite , WC-Co [18,19], WC-Co and Cu [20,21], Fe, Ni and TiC  etc and Ceramic Matrix Composite (CMC) e.g. Si... of various materials used. Key words: : Rapid Prototyping (RP), Laser, Composites 1 Introduction Rapid Prototyping (RP) initially focussed on polymers. These were later re- placed/supplemented by ceramics, metals and composites. Composites are used in RP...
Muñoz Machio, Angel
Memoria del projecte Modelat protocol MAC de xarxes GPON multioperador. Aquest projecte ha consistit en: L'estudi de la xarxa GPON El funcionamient del programa de simulació OPNET Implementació de la xarxa en OPNET
Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.
Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)
As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.
US Fish and Wildlife Service, Department of the Interior — This handbook provides a standard and guidance for developing and reviewing survey protocols used in the National Wildlife Refuge System. In the handbook, survey...
US Fish and Wildlife Service, Department of the Interior — This document describes monitoring protocols for marshbirds in North America. Monitoring parameters, field procedures, survey methods, timing of surveys, recording...
On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...
National Aeronautics and Space Administration — The Geometry Manipulation Protocol (GMP) is a library which serializes datatypes between XML and ANSI C data structures to support CFD applications. This library...
Atri, Dimitra; Haqq-Misra, Jacob
Messaging to extraterrestrial intelligence (METI) is a branch of study concerned with constructing and broadcasting a message toward habitable planets. Since the Arecibo message of 1974, the handful of METI broadcasts have increased in content and complexity, but the lack of an established protocol has produced unorganized or cryptic messages that could be difficult to interpret. Here we outline the development of a self-consistent protocol for messaging to extraterrestrial intelligence that provides constraints and guidelines for the construction of a message in order to maximize the probability that the message effectively communicates. A METI protocol considers several factors including signal encoding, message length, information content, anthropocentrism, transmission method, and transmission periodicity. Once developed, the protocol will be released for testing on different human groups worldwide and across cultural boundaries. An effective message to extraterrestrials should at least be understandable ...
Ruben Recabarren; Bogdan Carbunar
.... In this paper we exploit Stratum’s lack of encryption to develop passive and active attacks on Bitcoin’s mining protocol, with important implications on the privacy, security and even safety of mining equipment owners...
Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.
Maria Yolanda Teran
This article is about Indigenous peoples' involvement in the Nagoya Protocol negotiations from 2006 to 2010, as well as in its implementation to stop biopiracy in order to protect Pachamama, Mother...
Szczykutowicz, Timothy P; Bour, Robert K; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N
This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two-tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade-offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be
Boyd, Gerlad M.; Farrow, Jeffrey
A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.
Atri, Dimitra; DeMarines, Julia; Haqq-Misra, Jacob
Messaging to extraterrestrial intelligence (METI) is a branch of study concerned with constructing and broadcasting a message toward habitable planets. Since the Arecibo message of 1974, the handful of METI broadcasts have increased in content and complexity, but the lack of an established protocol has produced unorganized or cryptic messages that could be difficult to interpret. Here we outline the development of a self-consistent protocol for messaging to extraterrestrial intelligence that ...
Tannous, C.; Langlois, J.
Quantum Key Distribution is a practically implementable information-theoretic secure method for transmitting keys to remote partners performing quantum communication. After examining various protocols from the simplest such as QC and BB84 we move on to describe BBM92, DPSK, SARG04 and finally MDI from the largest possible communication distance and highest secret key bitrate. We discuss how any protocol can be optimized by reviewing the various steps and underlying assumptions proper to every...
Abdullah AlOtaibi; Hamza Aldabbas
Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...
Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.
This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.
Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)
This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.
Huttel, Hans; Srba, Jiri
's spectrum, become undecidable for a very simple recursive extension of the protocol. The result holds even if no nondeterministic choice operator is allowed. We also show that the extended calculus is capable of an implicit description of the active intruder, including full analysis and synthesis...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....
Muhammad Amjad Nawaz
Full Text Available Extraction of deoxyribose nucleic acid (DNA from plants is preliminary step in molecular biology. Fast and cost effective genomic DNA isolation from Glycine species for downstream application is a major bottleneck. Here we report a high throughput and trouble free method for genomic DNA extraction from leaf and seeds of Glycine species with high quality and quantity. Protocol reports the optimization by employing different concentrations of CTAB and PVP in extraction buffer. Efficiency of optimized protocol was compared with frequently used DNA extraction methods. Wide adoptability and utility of this protocol was confirmed by DNA extraction from leaves as well as seeds of G. max, G. soja, G. tomentella and G. latifolia. Extracted DNA was successfully subjected to PCR amplification of five microsatellite markers and four putative glycosyltransferase genes. DNA extraction protocol is reproducible, trouble free, rapid and can be adopted for plant molecular biology applications.
Yen, Stephen L-K
This paper describes the protocols used at Childrens Hospital Los Angeles (CHLA) to protract the maxilla during early adolescence. It is a modification of techniques introduced by Eric Liou with his Alternate Rapid Maxillary Expansion and Constriction (ALT-RAMEC) technique. The main differences between the CHLA protocol and previous maxillary protraction protocols are the age the protraction is attempted, the sutural loosening by alternating weekly expansion with constriction and the use of Class III elastics to support and redirect the protraction by nightly facemask wear. The CHLA protocol entirely depends on patient compliance and must be carefully taught and monitored. In a cooperative patient, the technique can correct a Class III malocclusion that previously would have been treated with LeFort 1 maxillary advancement surgery. Thus, it is not appropriate for patients requiring 2 jaw surgeries to correct mandibular prognathism, occlusal cants or facial asymmetry. The maxillary protraction appears to work by a combination of skeletal advancement, dental compensation and rotation of the occlusal planes. Microscrew/microimplant/temporary anchorage devices have been used with these maxillary protraction protocols to assist in expanding the maxilla, increasing skeletal anchorage during protraction, limiting dental compensations and reducing skeletal relapse. PMID:21765629
Lin, Hui; Kazlauskas, Romas J; Travisano, Michael
Developmental evolution has frequently been identified as a mode for rapid adaptation, but direct observations of the selective benefits and associated mechanisms of developmental evolution are necessarily challenging to obtain. Here we show rapid evolution of greatly increased rates of dispersal by developmental changes when populations experience stringent selection. Replicate populations of the filamentous fungus Trichoderma citrinoviride underwent 85 serial transfers, under conditions initially favoring growth but not dispersal. T. citrinoviride populations shifted away from multicellular growth toward increased dispersal by producing one thousand times more single-celled asexual conidial spores, three times sooner than the ancestral genotype. Conidia of selected lines also germinated fifty percent faster. Gene expression changed substantially between the ancestral and selected fungi, especially for spore production and growth, demonstrating rapid evolution of tight regulatory control for down-regulation of growth and up-regulation of conidia production between 18 and 24 hours of growth. These changes involved both developmentally fixed and plastic changes in gene expression, showing that complex developmental changes can serve as a mechanism for rapid adaptation.
Multigrade classes have been recognized as part of elementary education for many years, but their special needs have been largely ignored. This manual focuses on the survey research that should predate the design of instructional management strategies in multigrade classrooms. It describes rapid and reliable ways to collect information about the…
Borisenko, Victor E
Rapid thermal processing has contributed to the development of single wafer cluster processing tools and other innovations in integrated circuit manufacturing environments Borisenko and Hesketh review theoretical and experimental progress in the field, discussing a wide range of materials, processes, and conditions They thoroughly cover the work of international investigators in the field
Roozeboom, F.; Duine, P.A.; Sluis, P. van der
A Method (1) for Rapid Thermal Processing of a wafer (7), wherein the wafer (7) is heated by lamps (9), and the heat radiation is reflected by an optical switching device (15,17) which is in the reflecting state during the heating stage. During the cooling stage of the wafer (7), the heat is
BIM Building Information Modeling BPA Building Performance Analysis BTU British Thermal Unit CBECS Commercial Building ...geometry, orientation, weather, and materials, generates 3D Building Information Models ( BIM ) guided by satellite views of building footprints and...Rapid Energy Modeling (REM) workflows that employed building information modeling ( BIM ) approaches and conceptual energy analysis.
Dunn, Zachary Spencer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
In the Bioenergy and Defense Department of Sandia National Laboratories, characterization of the BaDx (Bacillus anthracis diagnostic cartridge) was performed and rapid germination chemistry was investigated. BaDx was tested with complex sample matrixes inoculated with Bacillus anthracis, and the trials proved that BaDx will detect Bacillus anthracis in a variety of the medium, such as dirt, serum, blood, milk, and horse fluids. The dimensions of the device were altered to accommodate an E. coli or Listeria lateral flow immunoassay, and using a laser printer, BaDx devices were manufactured to identify E. coli and Listeria. Initial testing with E. coli versions of BaDx indicate that the device will be viable as a portable diagnostic cartridge. The device would be more effective with faster bacteria germination; hence studies were performed the use of rapid germination chemistry. Trials with calcium dipicolinic acid displayed increased cell germination, as shown by control studies using a microplate reader. Upon lyophilization the rapid germination chemistry failed to change growth patterns, indicating that the calcium dipicolinic acid was not solubilized under the conditions tested. Although incompatible with the portable diagnostic device, the experiments proved that the rapid germination chemistry was effective in increasing cell germination.
Sahoo Khirod K
Full Text Available Abstract Background Rice genome sequencing projects have generated remarkable amount of information about genes and genome architecture having tremendous potential to be utilized in both basic and applied research. Success in transgenics is paving the way for preparing a road map of functional genomics which is expected to correlate action of a gene to a trait in cellular and organismal context. However, the lack of a simple and efficient method for transformation and regeneration is a major constraint for such studies in this important cereal crop. Results In the present study, we have developed an easy, rapid and highly efficient transformation and regeneration protocol using mature seeds as explants and found its successful applicability to a choice of elite indica rice genotypes. We have optimized various steps of transformation and standardized different components of the regeneration medium including growth hormones and the gelling agent. The modified regeneration medium triggers production of large number of shoots from smaller number of calli and promotes their faster growth, hence significantly advantageous over the existing protocols where the regeneration step requires maximum time. Using this protocol, significantly higher transformation efficiency (up to 46% and regeneration frequency (up to 92% for the untransformed calli and 59% for the transformed calli were achieved for the four tested cultivars. We have used this protocol to produce hundreds of independent transgenic lines of different indica rice genotypes. Upon maturity, these transgenic lines were fertile thereby indicating that faster regeneration during tissue culture did not affect their reproductive potential. Conclusions This speedy, yet less labor-intensive, protocol overcomes major limitations associated with genetic manipulation in rice. Moreover, our protocol uses mature seeds as the explant, which can easily be obtained in quantity throughout the year and kept
Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modiﬁcation. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the inﬂuence of the modiﬁcation of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efﬁciency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.
Malumbres-Olarte, Jagoba; Scharff, Nikolaj; Pape, Thomas; Coddington, Jonathan A; Cardoso, Pedro
Characterizing and monitoring biodiversity and assessing its drivers require accurate and comparable data on species assemblages, which, in turn, should rely on efficient and standardized field collection. Unfortunately, protocols that follow such criteria remain scarce and it is unclear whether they can be applied to megadiverse communities, whose study can be particularly challenging. Here, we develop and evaluate the first optimized and standardized sampling protocol for megadiverse communities, using tropical forest spiders as a model taxon. We designed the protocol COBRA-TF (Conservation Oriented Biodiversity Rapid Assessment for Tropical Forests) using a large dataset of semiquantitative field data from different continents. This protocol combines samples of different collecting methods to obtain as many species as possible with minimum effort (optimized) and widest applicability and comparability (standardized). We ran sampling simulations to assess the efficiency of COBRA-TF (optimized, non-site-specific) and its reliability for estimating taxonomic, phylogenetic, and functional diversity, and community structure by comparing it with (1) commonly used expert-based ad hoc protocols (nonoptimized, site-specific) and (2) optimal protocols (optimized, site-specific). We then tested the performance and feasibility of COBRA-TF in the field. COBRA-TF yielded similar results as ad hoc protocols for species (observed and estimated) and family richness, phylogenetic and functional diversity, and species abundance distribution. Optimal protocols detected more species than COBRA-TF. Data from the field test showed high sampling completeness and yielded low numbers of singletons and doubletons. Optimized and standardized protocols can be as effective in sampling and studying megadiverse communities as traditional sampling, while allowing data comparison. Although our target taxa are spiders, COBRA-TF can be modified to apply to any highly diverse taxon and habitat as
Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren
An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in
Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.; Mader, Angelika H.
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols
Franco Pettenati; Livio Sirovich
After a destructive earthquake, national Governments need to know the approximate amount of damage, the number of casualties, and the financial losses as soon as possible. Rapid scenarios are also used to inform the general public; see the widely used Shakemap package [Wald et al. 1999, 2006] of the US Geological Survey (USGS) and the one modified by the Istituto Nazionale di Geofisica e Vulcanologia (INGV; National Institute of Geophysics and Volcanology), which is reproduced for Figure 1. T...
Fan, Wei; Chang, Chun -Chih; Dornath, Paul; Wang, Zhuopeng
The invention provides methods for rapidly synthesizing heteroatom containing zeolites including Sn-Beta, Si-Beta, Ti-Beta, Zr-Beta and Fe-Beta. The methods for synthesizing heteroatom zeolites include using well-crystalline zeolite crystals as seeds and using a fluoride-free, caustic medium in a seeded dry-gel conversion method. The Beta zeolite catalysts made by the methods of the invention catalyze both isomerization and dehydration reactions.
Marcela Leite Candeias
Full Text Available The effect of the utilization of three semen protocols (Inra 82®, Merck Gema and Botu-crio® and two filling techniques (0.25 and 0.50 mL straws in Mangalarga Marchador stallions were studied in this experiment. Sperm parameters were assessed during processing and post-freezing. No interactions between the protocols and type of filling were observed, so they were assessed separately. Sperm parameters were not altered when the extender was added to the centrifugation; however, there was reduction of motility and strength when freezing extenders were added. The Botu-crio® protocol preserved the parameters of total and progressive sperm motility, smoothed path velocity (µm/s, straight line velocity (µm/s, track velocity (µm/s and the average and fast spermatozoa percentage better than the others. No difference between the extenders for the percentage of sperm integrity was observed. There was no difference in the responses studied on the filling techniques. The stallions presented better freezing with the use of the Botu-crio® protocol. The best post-freezing viability results were found for semen frozen using the Botu-crio® protocol and there were no differences concerning the sperm quality comparing 0.25 and 0.50 mL straws.
Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang
Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle (n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.
Arvidsson-Shukur, D. R. M.; Barnes, C. H. W.; Gottfries, A. N. O.
We provide an in-depth investigation of parameter estimation in nested Mach-Zehnder interferometers (NMZIs) using two information measures: the Fisher information and the Shannon mutual information. Protocols for counterfactual communication have, so far, been based on two different definitions of counterfactuality. In particular, some schemes have been based on NMZI devices, and have recently been subject to criticism. We provide a methodology for evaluating the counterfactuality of these protocols, based on an information-theoretical framework. More specifically, we make the assumption that any realistic quantum channel in MZI structures will have some weak uncontrolled interaction. We then use the Fisher information of this interaction to measure counterfactual violations. The measure is used to evaluate the suggested counterfactual communication protocol of H. Salih et al. [Phys. Rev. Lett. 110, 170502 (2013), 10.1103/PhysRevLett.110.170502]. The protocol of D. R. M. Arvidsson-Shukur and C. H. W. Barnes [Phys. Rev. A 94, 062303 (2016), 10.1103/PhysRevA.94.062303], based on a different definition, is evaluated with a probability measure. Our results show that the definition of Arvidsson-Shukur and Barnes is satisfied by their scheme, while that of Salih et al. is only satisfied by perfect quantum channels. For realistic devices the latter protocol does not achieve its objective.
In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...
Poulsen, Michael J; Coto, Jeffrey
Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.
Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.
Kirci, Pinar; Zaim, Abdul Halim
Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM), it is easier to take the advantage of optical networks and optical burst switching (OBS) and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET) and Just In Time (JIT) reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.
Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.
Anne T Gallagher
Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.
Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.
Full Text Available The ovarian stimulation has been applied in order to increase the number of oocytes to compensate for the poor results of in vitro fertilization, allowing the selection of one or more embryos to be transferred. Our aim is to compare the results obtained in IVF/ICSI cycles using the short protocol for controlled ovarian stimulation to the results from the modified mild protocol used in our department. A total of 240 cycles were conducted from January 2010 to December 2011. When comparing both protocols, it could be observed that there was a significant difference in the quantity of gonadotropins doses in the mild protocol and in the short protocol. No significant difference was observed regarding pregnancy rates per cycle, 22% and 26.2%, in short and mild protocols, respectively. The protocols of controlled ovarian stimulation are often associated with high risk of complications such as ovarian hyperstimulation syndrome, excessive emotional stress, high rates of treatment dropouts, and abdominal discomfort. With the data obtained in this study, one can conclude that there are less risks and complications for the patient when using the mild stimulation protocol. It was also observed that in this group there was a slightly higher rate.
Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.
Full Text Available After a destructive earthquake, national Governments need to know the approximate amount of damage, the number of casualties, and the financial losses as soon as possible. Rapid scenarios are also used to inform the general public; see the widely used Shakemap package [Wald et al. 1999, 2006] of the US Geological Survey (USGS and the one modified by the Istituto Nazionale di Geofisica e Vulcanologia (INGV; National Institute of Geophysics and Volcanology, which is reproduced for Figure 1. The general matter of the use of intensities in damage scenarios was discussed in a special session at the 2008 Annual Meeting of the Seismological Society of America (http://www.seismosoc.org/meetings/2008/specialsessions.html, and was also discussed in the NIS-1 session of the European Congress in Moscow, in August 2012 (http://www.esc2012-moscow.org/esc_thematicareas.html. The purposes of the present report are to: (i compare different types of intensities; (ii check two rapid scenarios of intensity; and (iii understand whether the KF formula [Sirovich 1996, Sirovich et al. 2009] can be used as a new 'attenuation' relationship to improve rapid scenarios. […
Menking, Darrell E.; Kracke, Suzanne K.; Emanuel, Peter A.; Valdes, James J.
Polymerase Chain Reaction (PCR) is an in vitro enzymatic, synthetic method used to amplify specific DNA sequences from organisms. Detection of DNA using gene probes allows for absolute identification not only of specific organisms, but also of genetic material in recombinant organisms. PCR is an exquisite biological method for detecting bacteria in aerosol samples. A major challenge facing detection of DNA from field samples is that they are almost sure to contain impurities, especially impurities that inhibit amplification through PCR. DNA is being extracted from air, sewage/stool samples, food, sputum, a water and sediment; however, multi- step, time consuming methods are required to isolate the DNA from the surrounding contamination. This research focuses on developing a method for rapid cleanup of DNA which combines extraction and purification of DNA while, at the same time, removing inhibitors from 'dirty samples' to produce purified, PCR-ready DNA. GeneReleaser produces PCR-ready DNA in a rapid five-minute protocol. GeneReleaser resin was able to clean up sample contain micrograms of typical aerosol and water contaminants. The advantages of using GR are that it is rapid, inexpensive, requires one-step, uses no hazardous material and produces PCR-ready DNA.
Busskamp, Volker; Lewis, Nathan E; Guye, Patrick; Ng, Alex H M; Shipman, Seth L; Byrne, Susan M; Sanjana, Neville E; Murn, Jernej; Li, Yinqing; Li, Shangzhong; Stadler, Michael; Weiss, Ron; Church, George M
Advances in cellular reprogramming and stem cell differentiation now enable ex vivo studies of human neuronal differentiation. However, it remains challenging to elucidate the underlying regulatory programs because differentiation protocols are laborious and often result in low neuron yields. Here, we overexpressed two Neurogenin transcription factors in human-induced pluripotent stem cells and obtained neurons with bipolar morphology in 4 days, at greater than 90% purity. The high purity enabled mRNA and microRNA expression profiling during neurogenesis, thus revealing the genetic programs involved in the rapid transition from stem cell to neuron. The resulting cells exhibited transcriptional, morphological and functional signatures of differentiated neurons, with greatest transcriptional similarity to prenatal human brain samples. Our analysis revealed a network of key transcription factors and microRNAs that promoted loss of pluripotency and rapid neurogenesis via progenitor states. Perturbations of key transcription factors affected homogeneity and phenotypic properties of the resulting neurons, suggesting that a systems-level view of the molecular biology of differentiation may guide subsequent manipulation of human stem cells to rapidly obtain diverse neuronal types. © 2014 The Authors. Published under the terms of the CC BY 4.0 license.
Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E
A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365
Yuan, Liang; Ji, Meng
Abstract: Ethernet is the most important Local Area Network (LAN) technology since more than 90% data traffic in access layer is carried on Ethernet. From 10M to 10G, the improving Ethernet technology can be not only used in LAN, but also a good choice for MAN even WAN. MAN are always constructed in ring topology because the ring network could provide resilient path protection by using less resource (fibre or cable) than other network topologies. In layer 2 data networks, spanning tree protocol (STP) is always used to protect transmit link and preventing the formation of logic loop in networks. However, STP cannot guarantee the efficiency of service convergence when link fault happened. In fact, convergent time of networks with STP is about several minutes. Though Rapid Spanning Tree Protocol (RSTP) and Multi-Spanning Tree Protocol (MSTP) improve the STP technology, they still need a couple of seconds to achieve convergence, and can not provide sub-50ms protection switching. This paper presents a novel rapid ring protection method (RRPM) for carrier Ethernet. Unlike other link-fault detection method, it adopts distributed algorithm to detect link fault rapidly (sub-50ms). When networks restore from link fault, it can revert to the original working state. RRPM can provide single ring protection and interconnected ring protection without the formation of super loop. In normal operation, the master node blocks the secondary port for all non-RRPM Ethernet frames belonging to the given RRPM Ring, thereby avoiding a loop in the ring. When link fault happens, the node on which the failure happens moves from the "ring normal" state to the "ring fault" state. It also sends "link down" frame immediately to other nodes and blocks broken port and flushes its forwarding database. Those who receive "link down" frame will flush forwarding database and master node should unblock its secondary port. When the failure restores, the whole ring will revert to the normal state. That is
This thesis studies the Message Queue Telemetry Transport protocol (MQTT) as an application layer protocol in geographical location sharing applications using third generation cellular communication (3G). The MQTT protocol is compared in terms of energy efficiency and amount of data generated with the Hypertext Transfer Protocol (HTTP), which is currently used in typical location sharing applications. In order to compare the communication energy efficiency of both protocols a location sharing...
The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute
Full Text Available Abstract Background The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC, organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. Results We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation. The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches. Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79–0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86–0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Conclusion Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT
The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not....... The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA...
Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.
Hüttel, Hans; Srba, Jiri
's spectrum, become undecidable for a very simple recursive extension of the protocol. The result holds even if no nondeterministic choice operator is allowed. We also show that the extended calculus is capable of an implicit description of the active intruder, including full analysis and synthesis...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable.......We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek...
Raina, Rupesh; Wang, Joseph; Krishnappa, Vinod
The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE). This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives. PMID:28913329
Ahmed, Naveed; Jensen, Christian D.
Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...
Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.
This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.
Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia
The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them. Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...... for describing protocol behaviors, message structures, and the gateway logic. Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range...
A nanosized magnesium oxide catalyzed three-component condensation reaction of aldehyde, malononitrile and ¿-naphthol proceeded rapidly in water/PEG to afford corresponding 2-amino-2-chromenes in high yields at room temperature. The greener protocol was found to be fairly general...
Mohammad Amir Amirkhani
Conclusion: The current protocol based on the sonication-mediated cavitation is a rapid, safe and cost-effective method, which is proposed for isolation of SVF and of course ADSCs cultures in a large scale for the clinical trials or therapeutic purposes.
Full Text Available Biochemical tests have been previously developed to identify carbapenemase-producing Enterobacteriaceae, Pseudomonas spp. (Carba NP test and Acinetobacter spp. (CarbAcineto NP test. We evaluated a modified Carba NP test to detect carbapenemase production in Enterobacteriaceae, Pseudomonas and Acinetobacter species using a single protocol with rapid results and found good reliability and speed.
Lazzara, Elizabeth H; Riss, Robert; Patzer, Brady; Smith, Dustin C; Chan, Y Raymond; Keebler, Joseph R; Fouquet, Sarah D; Palmer, Evan M
Handoff protocols are often developed by brainstorming and consensus, and few are directly compared. We hypothesized that a handoff protocol (Flex 11) developed using a rigorous methodology would be more favorable in terms of clinicians' attitudes, behaviors, cognitions, or time-on-task when performing handoffs compared with a prevalent protocol (Situation Background Assessment Recommendation [SBAR]). Using a between-groups, randomized control trial design (Flex 11 versus SBAR) during a pilot study in a simulated environment, 20 clinicians (13 attending physicians and 7 residents) received 3 patient handoffs from a standardized physician, managed the patients, and handed off the patients to the same standardized physician. Participants completed surveys assessing their attitudes and cognitions, and behaviors and handoff duration were assessed through observations. All data were analyzed using independent samples t tests. For attitudes, "ease of use" ratings were lower for SBAR participants than Flex 11 participants (P < .01), and "being helpful" ratings were lower for SBAR participants than Flex 11 participants (P = .02). For behaviors, results indicate no significant difference in the information acquired between the SBAR and Flex 11 protocols. However, SBAR participants gave significantly less information than Flex 11 participants (P < .01). For cognitions, SBAR and Flex 11 participants reported similar workload except for frustration. For handoff duration, there were no significant differences between the protocols (P = .36). The results suggest that Flex 11 is an efficient, beneficial tool in a simulated environment with pediatric clinicians. Future studies should evaluate this protocol in the inpatient setting. Copyright © 2016 by the American Academy of Pediatrics.
Ghane, Mohammad Reza; Gharib, Mohammad Hadi; Ebrahimi, Ali; Samimi, Kaveh; Rezaee, Maryam; Rasouli, Hamid Reza; Kazemi, Hossein Mohammad
Rapid ultrasound in shock (RUSH) is the most recent emergency ultrasound protocol, designed to help clinicians better recognize distinctive shock etiologies in a shorter time frame. In this study, we evaluated the accuracy of the RUSH protocol, performed by an emergency physician or radiologist, in predicting the type of shock in critical patients. An emergency physician or radiologist performed the RUSH protocol for all patients with shock status at the emergency department. All patients were closely followed to determine their final clinical diagnosis. The agreement between the initial impression provided by RUSH and the final diagnosis was investigated by calculating the Kappa index. Sensitivity, specificity, positive predictive value (PPV) and negative predictive value (NPV) of RUSH for diagnosis of each case. We performed RUSH on 77 patients. Kappa index was 0.71 (P Value = 0.000), reflecting acceptable general agreement between initial impression and final diagnosis. For hypovolemic, cardiogenic and obstructive shock, the protocol had an NPV above 97% yet it had a lower PPV. For shock with distributive or mixed etiology, RUSH showed a PPV of 100% but it had low sensitivity. Subgroup analysis showed a similar Kappa index for the emergency physician and radiologist (0.70 and 0.73, respectively) in performing rush. This study highlights the role of the RUSH exam performed by an emergency physician, to make a rapid and reliable diagnosis of shock etiology, especially in order to rule out obstructive, cardiogenic and hypovolemic shock types in initial exam of shock patients.
This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies.
Modak, Ranjan; Vidmar, Lev; Rigol, Marcos
We present two applications of emergent local Hamiltonians to speed up quantum adiabatic protocols for isolated noninteracting and weakly interacting fermionic systems in one-dimensional lattices. We demonstrate how to extract maximal work from initial band-insulating states, and how to adiabatically transfer systems from linear and harmonic traps into box traps. Our protocols consist of two stages. The first one involves a free expansion followed by a quench to an emergent local Hamiltonian. In the second stage, the emergent local Hamiltonian is "turned off" quasistatically. For the adiabatic transfer from a harmonic trap, we consider both zero- and nonzero-temperature initial states.
Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)
This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.
Guida, M; Marger, R S; Papp, A C; Snyder, P J; Sedra, M S; Kissel, J T; Mendell, J R; Prior, T W
Myotonic dystrophy (DM) is an autosomal dominant genetic disease caused by an unstable CTG repeat sequence in the 3' untranslated region of the myotonin protein kinase gene. The CTG repeat is present 5-30 times in the normal population, whereas DM patients have CTG expansions of 50 to several thousand repeats. The age of onset of the disorder and the severity of the phenotype is roughly correlated with the size of the CTG expansion. We developed a molecular protocol for the diagnosis of DM based on an initial polymerase chain reaction screen to detect normal-sized alleles and small expansions, followed by an improved Southern protocol to detect larger expansions.
Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian
are infeasible to invert. In fact, the security proofs of all currently employed cryptographic protocols need to assume some component being a one-way function. Unfortunately, at our current point i history, we really have no idea whether one-way functions even exist, and though most researchers in computational...... complexity would be surprised if one-way functions do not exist [Gas02], it is perfectly conceivable that all currently cryptographic protocols in use today are insecure. Three popular approaches to unconditional security are noisy-channel cryptography, bounded-storage cryptography and quantum cryptography...
Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)
This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.
Full Text Available This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies.
Luo, Qing-bin; Yang, Guo-wu; She, Kun; Li, Xiaoyu
In this paper, we propose an innovative quantum private comparison(QPC) protocol based on partial Bell-state measurement from the view of linear optics, which enabling two parties to compare the equality of their private information with the help of a semi-honest third party. Partial Bell-state measurement has been realized by using only linear optical elements in experimental measurement-device-independent quantum key distribution(MDI-QKD) schemes, which makes us believe that our protocol can be realized in the near future. The security analysis shows that the participants will not leak their private information.
Christensen, Robin; Langberg, Henning
In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research...... (rigorous) protocol writing too troublesome, will realize that they have already written the first half of the final paper if they follow these recommendations; authors simply need to change the protocols future tense into past tense. Thus, the aim of this clinical commentary is to describe and explain...
Carter, Kenneth; Olshan-Perlmutter, Michelle
National Acupuncture Detoxification Association (NADA) acupuncture is a simple, standardized, 1- to 5-point auricular needling protocol that originated as a grass-roots response to the opiate epidemic of the 1970s. NADA acupuncture is increasingly recognized as a universally useful intervention in the treatment of addictions specifically and in behavior health more generally. It is recognized as a best practice in the treatment of substance use disorders. Integrative programs using the NADA protocol are likely to see improvements in engagement, retention, decreased drug cravings, anxiety, and less physical symptoms.
Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan
Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.
Suzuki, Yusuke; Kabayama, Kazuya
Although detergents are often essential in protocols, they are usually incompatible with further biochemical analysis. There are several methods for detergent removal, but the procedures are complicated or suffer from sample loss. Here, we describe a convenient and rapid method for detergent removal from sialic acid-containing glycosphingolipids (gangliosides) and neutral glycolipids in detergent-resistant membrane (DRM) microdomain. It is based on selective detergent extraction, in which the...
Discussion: Students demonstrated a good intubation success and first pass-success rate. However, newly qualified paramedics require strict protocols, clinical governance, and support to gain experience and perform pre-hospital rapid sequence intubation at an acceptable level in operational practice. More research is needed to understand the low rate of post-intubation paralysis, along with non-uniform administration of post-intubation sedation and analgesia, and the 5% prevalence of cardiac arrest.
McGaughey, Jennifer; O'Halloran, Peter; Porter, Sam; Trinder, John; Blackwood, Bronagh
To test the Rapid Response Systems programme theory against actual practice components of the Rapid Response Systems implemented to identify those contexts and mechanisms which have an impact on the successful achievement of desired outcomes in practice. Rapid Response Systems allow deteriorating patients to be recognized using Early Warning Systems, referred early via escalation protocols and managed at the bedside by competent staff. Realist evaluation. The research design was an embedded multiple case study approach of four wards in two hospitals in Northern Ireland which followed the principles of Realist Evaluation. We used various mixed methods including individual and focus group interviews, observation of nursing practice between June-November 2010 and document analysis of Early Warning Systems audit data between May-October 2010 and hospital acute care training records over 4.5 years from 2003-2008. Data were analysed using NiVivo8 and SPPS. A cross-case analysis highlighted similar patterns of factors which enabled or constrained successful recognition, referral and response to deteriorating patients in practice. Key enabling factors were the use of clinical judgement by experienced nurses and the empowerment of nurses as a result of organizational change associated with implementation of Early Warning System protocols. Key constraining factors were low staffing and inappropriate skill mix levels, rigid implementation of protocols and culturally embedded suboptimal communication processes. Successful implementation of Rapid Response Systems was dependent on adopting organizational and cultural changes that facilitated staff empowerment, flexible implementation of protocols and ongoing experiential learning. © 2017 John Wiley & Sons Ltd.
Micoulaud-Franchi, J-A; Richieri, R; Lancon, C; Vion-Dury, J
The efficiency of repetitive transcranial magnetic stimulation (rTMS) in the treatment of psychiatric disorders is robust for major depressive episode (MDE) while results are encouraging for schizophrenia. However, rTMS protocols need to be optimized. Basic researches in TMS led to the concept of "state dependency TMS". This concept suggests that the neural circuits' activation states, before and during the stimulation, influence the pulse effect. Indeed, TMS effect must be seen, not simply as a stimulus, but also as the result of an interaction between a stimulus and a level of brain activity. Those data suggest that rTMS efficiency could be increased in psychiatric disorders by triggering patients' neurocognitive activities during stimulation. Thus "interactive rTMS protocols" have been submitted. This article provides a review and a classification of different interactive protocols implemented in the treatment of MDE and schizophrenia. Protocols' interactions with cognitive activities and brain electrical activities will be discussed. Interactive rTMS protocols that manipulate cognitive activities have been developed for MDE treatments. They aim at regulating emotional states of depressed patients during the stimulation. The patients perform emotional tasks in order to activate cortical networks involving the left dorsolateral prefrontal cortex (DLPFC) into a state that may be more sensitive to the rTMS pulse effect. Simultaneous cognitive behavioral therapy ("CBT rTMS") and cognitive-emotional reactivation ("affective rTMS") have thus been tested during left DLPFC rTMS in MDE. Interactive rTMS protocols that manipulate brain electrical activities have been developed for MDE and schizophrenia treatments. Two categories of protocols should be identified. In the first set, personalized brain activity has been analyzed to determine the parameters of stimulation (i.e. frequency of stimulation) matching the patient ("personalized rTMS"). Personalized rTMS protocols
Cox, Jeremy W; Ballweg, Richard A; Taft, Diana H; Velayutham, Prakash; Haslam, David B; Porollo, Aleksey
Metagenomics is a rapidly emerging field aimed to analyze microbial diversity and dynamics by studying the genomic content of the microbiota. Metataxonomics tools analyze high-throughput sequencing data, primarily from 16S rRNA gene sequencing and DNAseq, to identify microorganisms and viruses within a complex mixture. With the growing demand for analysis of the functional microbiome, metatranscriptome studies attract more interest. To make metatranscriptomic data sufficient for metataxonomics, new analytical workflows are needed to deal with sparse and taxonomically less informative sequencing data. We present a new protocol, IMSA+A, for accurate taxonomy classification based on metatranscriptome data of any read length that can efficiently and robustly identify bacteria, fungi, and viruses in the same sample. The new protocol improves accuracy by using a conservative reference database, employing a new counting scheme, and by assembling shotgun reads. Assembly also reduces analysis runtime. Simulated data were utilized to evaluate the protocol by permuting common experimental variables. When applied to the real metatranscriptome data for mouse intestines colonized by ASF, the protocol showed superior performance in detection of the microorganisms compared to the existing metataxonomics tools. IMSA+A is available at https://github.com/JeremyCoxBMI/IMSA-A . The developed protocol addresses the need for taxonomy classification from RNAseq data. Previously not utilized, i.e., unmapped to a reference genome, RNAseq reads can now be used to gather taxonomic information about the microbiota present in a biological sample without conducting additional sequencing. Any metatranscriptome pipeline that includes assembly of reads can add this analysis with minimal additional cost of compute time. The new protocol also creates an opportunity to revisit old metatranscriptome data, where taxonomic content may be important but was not analyzed.
Fister, Andrew S; Shi, Zi; Zhang, Yufan; Helliwell, Emily E; Maximova, Siela N; Guiltinan, Mark J
Theobroma cacao L., the source of cocoa, is a crop of significant economic value around the world. To facilitate the study of gene function in cacao we have developed a rapid Agrobacterium-mediated transient genetic transformation protocol. Here we present a detailed methodology for our transformation assay, as well as an assay for inoculation of cacao leaves with pathogens. Agrobacterium tumefaciens cultures are induced then vacuum-infiltrated into cacao leaves. Transformation success can be gauged 48 h after infiltration by observation of green fluorescent protein and by qRT-PCR. We clarify the characteristics of cacao leaf stages and demonstrate that our strategy efficiently transforms leaves of developmental stage C. The transformation protocol has high efficacy in stage C leaves of four of eight tested genotypes. We also present the functional analysis of cacao chitinase overexpression using the transient transformation system, which resulted in decreased pathogen biomass and lesion size after infection with Phytophthora tropicalis. Leaves expressing transgenes of interest can be used in subsequent functional genetic assays such as pathogen bioassay, metabolic analysis, gene expression analysis etc. This transformation protocol can be carried out in 1 day, and the transgenes expressing leaf tissue can be maintained in petri dishes for 5-7 days, allowing sufficient time for performance of additional downstream gene functional analysis. Application of these methods greatly increases the rapidity with which candidate genes with roles in defense can be tested.
Disilvestro, Leonardo; Markham, Damian
Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.
Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo
Fraglets represent an execution model for communication protocols that resembles the chemical reactions in living organisms. The strong connection between their way of transforming and reacting and formal rewriting systems makes a fraglet program amenable to automatic verification. Grounded on pa...
Marin Perianu, Raluca; Hartel, Pieter H.; Scholten, Johan
Service discovery is an emerging field in the area of ubiquitous computing. There are various techniques and protocols (proposed or/and already implemented) particularly tailored to specific sets of objectives. This paper analyses the current state of the art and presents a taxonomy of service
Klerk, de G.J.M.; Rook, W.; Vark, van A.; Linde, van der P.
De veredeling van tulp gaat traag door de lange generatietijd en door langzame vermeerdering op het veld. Een veredelingsprogramma van tulp duurt al snel 25 jaar. Dit kan aanzienlijk verkort worden door vermeerdering in weefselkweek. Er is nu een werkbaar protocol
Keywords. Quantum cryptography; quantum key distribution. Abstract. Kak's quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, ...
Newell, John D; Sieren, Jered; Hoffman, Eric A
The purpose of this review article is to review the process of developing optimal computed tomography (CT) protocols for quantitative lung CT (QCT). In this review, we discuss the following important topics: QCT-derived metrics of lung disease; QCT scanning protocols; quality control; and QCT image processing software. We will briefly discuss several QCT-derived metrics of lung disease that have been developed for the assessment of emphysema, small airway disease, and large airway disease. The CT scanning protocol is one of the most important elements in a successful QCT. We will provide a detailed description of the current move toward optimizing the QCT protocol for the assessment of chronic obstructive pulmonary disorder and asthma. Quality control of CT images is also a very important part of the QCT process. We will discuss why it is necessary to use CT scanner test objects (phantoms) to provide frequent periodic checks on the CT scanner calibration to ensure precise and accurate CT numbers. We will discuss the use of QCT image processing software to segment the lung and extract the desired QCT metrics of lung disease. We will discuss the practical issues of using this software. The data obtained from the image processing software are then combined with those from other clinical examinations, health status questionnaires, pulmonary physiology, and genomics to increase our understanding of obstructive lung disease and improve our ability to design new therapies for these diseases.
Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.
... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test... operating components that could affect child resistance to verify that they are within reasonable operating... — but your said it was OK for you to try to make a noise with this special lighter because it can't hurt...
... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child... could affect child resistance to verify that they are within reasonable operating tolerances for the...'s right—never touch a real lighter—but your said it was OK for you to try to make a noise with this...
Nov 13, 2013 ... A young researcher wanting to develop an idea into a research protocol is often overwhelmed by issues that arise in what is initially perceived to be a simple process. In this review, we present pragmatic considerations that will assist in making this process successful. The format of this paper is shaped by ...
This document is one of a series describing protocols associated with the Livermore Interactive Network Communication System (LINCS) hierarchical architecture. At the heart of LINCS is its basic interprocess communication (LINCS-IPC) service. LINCS-IPC defines a reliable, flow controlled, full duplex, uninterpreted, labeled bit stream communication service. LINCS-IPC is level 4 in the LINCS architecture. Level 3 of LINCS is the Network layer defining an internetwork datagram type service. LINCS-IPC interfaces to User processes that utilize higher level syntactic and semantic conventions for process interaction. The transport service provided by the Delta-t protocol can be considered a sublayer of the LINCS-IPC layer. Delta-t augments the Network level service as required to support LINCS-IPC. This document specifies the services provided by the Delta-t protocol to support LINCS-IPC, the operation of Delta-t, and the services Delta-t requires of the Network level. This document was written to be self-contained but the reader will find it useful to have available for reference the LINCS-IPC and LINCS DeltaGram Network layer protocol specifications. Implementations are underway in Pascal for the PDP-11 running under RT11 and RX11, in BLISS for the VAX running under VMS, in MODEL for the CRAY-1 and CDC 7600 running under NLTSS and LTSS, and for the SEL 32/75 running under PORT.