WorldWideScience

Sample records for rapid bioassessment protocol

  1. Use of Chironomidae (Diptera) Surface-Floating Pupal Exuviae as a Rapid Bioassessment Protocol for Water Bodies.

    Science.gov (United States)

    Kranzfelder, Petra; Anderson, Alyssa M; Egan, Alexander T; Mazack, Jane E; Bouchard, R William; Rufer, Moriya M; Ferrington, Leonard C

    2015-07-24

    Rapid bioassessment protocols using benthic macroinvertebrate assemblages have been successfully used to assess human impacts on water quality. Unfortunately, traditional benthic larval sampling methods, such as the dip-net, can be time-consuming and expensive. An alternative protocol involves collection of Chironomidae surface-floating pupal exuviae (SFPE). Chironomidae is a species-rich family of flies (Diptera) whose immature stages typically occur in aquatic habitats. Adult chironomids emerge from the water, leaving their pupal skins, or exuviae, floating on the water's surface. Exuviae often accumulate along banks or behind obstructions by action of the wind or water current, where they can be collected to assess chironomid diversity and richness. Chironomids can be used as important biological indicators, since some species are more tolerant to pollution than others. Therefore, the relative abundance and species composition of collected SFPE reflect changes in water quality. Here, methods associated with field collection, laboratory processing, slide mounting, and identification of chironomid SFPE are described in detail. Advantages of the SFPE method include minimal disturbance at a sampling area, efficient and economical sample collection and laboratory processing, ease of identification, applicability in nearly all aquatic environments, and a potentially more sensitive measure of ecosystem stress. Limitations include the inability to determine larval microhabitat use and inability to identify pupal exuviae to species if they have not been associated with adult males.

  2. Rapid Bioassessment Methods for Assessing Stream Macroinvertebrate Community on the Savannah River Site

    Energy Technology Data Exchange (ETDEWEB)

    Specht, W.L.

    1999-11-22

    Macroinvertebrate sampling was performed at 16 locations in the Savannah River Site (SRS) streams using Hester-Dendy multiplate samplers and EPA Rapid Bioassessment Protocols (RBP). Some of the sampling locations were unimpacted, while other locations had been subject to various forms of perturbation by SRS activities. In general, the data from the Hester-Dendy multiplate samplers were more sensitive at detecting impacts than were the RBP data. We developed a Biotic Index for the Hester-Dendy data which incorporated eight community structure, function, and balance parameters. when tested using a data set that was unrelated to the data set that was used in developing the Biotic Index, the index was very successful at detecting impact.

  3. Rapid Bioassessment Methods for Assessing Stream Macroinvertebrate Community on the Savannah River Site

    International Nuclear Information System (INIS)

    Specht, W.L.

    1999-01-01

    Macroinvertebrate sampling was performed at 16 locations in the Savannah River Site (SRS) streams using Hester-Dendy multiplate samplers and EPA Rapid Bioassessment Protocols (RBP). Some of the sampling locations were unimpacted, while other locations had been subject to various forms of perturbation by SRS activities. In general, the data from the Hester-Dendy multiplate samplers were more sensitive at detecting impacts than were the RBP data. We developed a Biotic Index for the Hester-Dendy data which incorporated eight community structure, function, and balance parameters. when tested using a data set that was unrelated to the data set that was used in developing the Biotic Index, the index was very successful at detecting impact

  4. Field evaluation of hazardous waste site bioassessment protocols

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, J.M.; Cline, J.F.; Cushing, C.E.; McShane, M.C.; Rogers, J.E.; Rogers, L.E.; Simpson, J.C.; Skalski, J.R.

    1983-04-01

    The goals were: (1) determine the variability (both within and between laboratories) for the various bioassay procedures using contaminated soil samples from the Rocky Mountain Arsenal (RMA); (2) assess variability within and between plots for several assessment techniques (for sampling small mammals, plants, insects including honeybees and microarthropods) so that field studies could be designed to detect a defined biotic change; (3) establish three field plant transects which are apparently (a) contaminated, (b) appear contaminated and (c) could serve as a control; (4) assess the feasibility (in the laboratory) of using Basin F water to contaminate RMA soil artificially, and to supply information for the design of a field plot study in 1983; (5) attempt to obtain preliminary data on any promising field or laboratory bioassessment techniques not currently mentioned in the statement of work; and (6) obtain field data to assess the ecological status of RMA lakes and compare these observations to results from bioassessment testing.

  5. Implementing Rapid Bioassessment Protocols (RBP’s) for Watershed Monitoring

    Science.gov (United States)

    2010-08-01

    indicate greater stream quality. ............................... 16 Figure 7. Percent EPT (Ephemeroptera, Plecoptera , and Trichoptera) within sampled...greater stream quality. Figure 7. Percent EPT (Ephemeroptera, Plecoptera , and Trichoptera) within sampled basins at Fort Benning, 2002-2005; greater

  6. Ship Creek bioassessment investigations

    Energy Technology Data Exchange (ETDEWEB)

    Cushing, C.E.; Mueller, R.P.; Murphy, M.T.

    1995-06-01

    Pacific Northwest Laboratory (PNL) was asked by Elmendorf Air Force Base (EAFB) personnel to conduct a series of collections of macroinvertebrates and sediments from Ship Creek to (1) establish baseline data on these populations for reference in evaluating possible impacts from Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) activities at two operable units, (2) compare current population indices with those found by previous investigations in Ship Creek, and (3) determine baseline levels of concentrations of any contaminants in the sediments associated with the macroinvertebrates. A specific suite of indices established by the US Environmental Protection Agency (EPA) was requested for the macroinvertebrate analyses; these follow the Rapid Bioassessment Protocol developed by Plafkin et al. (1989) and will be described. Sediment sample analyses included a Microtox bioassay and chemical analysis for contaminants of concern. These analyses included, volatile organic compounds, total gasoline and diesel hydrocarbons (EPA method 8015, CA modified), total organic carbon, and an inductive-coupled plasma/mass spectrometry (ICP/MS) metals scan. Appendix A reports on the sediment analyses. The Work Plan is attached as Appendix B.

  7. Microplastic contamination in natural mussel beds from a Brazilian urbanized coastal region: Rapid evaluation through bioassessment.

    Science.gov (United States)

    Santana, M F M; Ascer, L G; Custódio, M R; Moreira, F T; Turra, A

    2016-05-15

    Microplastic pollution (particles urbanized area of the coast of São Paulo State, Brazil. A simple and rapid assessment showed that 75% of sampled mussels had ingested microplastics, an issue of human and environmental concern. All sampling points had contaminated mussels and this contamination had no clear pattern of distribution along the estuary. This was the first time that microplastic bioavailability was assessed in nature for the southern hemisphere and that wild P. perna was found contaminated with this pollutant. This is an important issue that should be better assessed due to an increase in seafood consumption and culture in Brazil and worldwide. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. BioData: a national aquatic bioassessment database

    Science.gov (United States)

    MacCoy, Dorene

    2011-01-01

    -retrieval web site provides access to bioassessment data. BioData currently accepts data collected using two national protocols: (1) NAWQA and (2) U.S. Environmental Protection Agency (USEPA) National Rivers and Streams Assessment (NRSA). Additional collection protocols are planned for future versions.

  9. Efficient protocol for rapid Aloe vera micropropagation.

    Science.gov (United States)

    Molsaghi, Mozhgan; Moieni, Ahmad; Kahrizi, Danial

    2014-06-01

    Aloe vera Linn. (Liliaceae) is a medicinal plant and has a number of curative properties. Vegetative propagation has not enough potential for supplying market demand. However, via in vitro propagation makes possible the mass production of Aloe plants. The current study was conducted to investigate growth regulators' effects on proliferation of A. vera. In this study, for comparison of plant growth regulators' effects on proliferation, the shoot tips and auxiliary buds of A. vera were cultured in the Murashige and Skoog (MS) medium. Rooted plantlets were transferred to garden soil, compost, and sand in the proportion of 1:1:1, respectively, after hardening. The maximum number of shoots was obtained on the medium supplemented with 1 mg/L IAA+4 mg/L BAP and 0.2 mg/L IAA+0.8 BAP mg/L. Rooting was also achieved in the same media composition proliferation of shoot. The acclimatized plants showed 100% of survival. The regenerated plants looked healthy, and they were morphologically similar to that of stock plants. These results suggest that in vitro culture may be used as a technique for rapid propagation of A. vera.

  10. Bioassessment of the ecological integrity of river ecosystems using ...

    African Journals Online (AJOL)

    Bioassessment of the ecological integrity of river ecosystems using aquatic macroinvertebrates: an overview with a focus on South Africa. ... In conclusion, a number of potential avenues for further research regarding the use of macroinvertebrates in the bioassessment of river ecosystems are identified. Keywords: benthic ...

  11. Efficiency of the SASS4 rapid bioassessment protocol in determining river health: A case study on the Mhlathuze River, KwaZulu-Natal, South Africa

    CSIR Research Space (South Africa)

    Vos, P

    2002-01-01

    Full Text Available the labour and time factors confronting freshwater ecologists, since the number of habitats examined and the replicated sample units taken per site are reduced (Chutter, 1994). Dallas (1995, 1997) addressed some of the uncertainties associated with SASS4... 3b 4l 4a 4b 5l 5a 5b 6l 6a 6b I II III VI V Number of taxa ASPT values 2c 2d 2e 3c 3d 3e 4c 4d 4e 5c5d 5e 6c 6d 6e I II III IV V VI VII 2f 2g 2h 3f 3g 3h 4f 4g 4h 5f5g 5h 6g 6h I II III IV V VI 2i 2j 2k 3i 3j 3k 4i4j 4k 5i 5j 5k 6i 6j6k I II III IV V...

  12. Use of traits-based bioassessment approaches in biomonitoring and ecological risk assessment

    NARCIS (Netherlands)

    Brink, van den P.J.; Alexander, A.; Desrosiers, M.; Goedkoop, W.; Goethals, P.L.M.; Liess, M.; Dyer, S.

    2011-01-01

    We discuss the application of traits-based bioassessment approaches in retrospective bioassessment as well as in prospective ecological risk assessments in regulatory frameworks. Both approaches address the interaction between species and stressors and their consequences at different levels of

  13. Sinusoidal voltage protocols for rapid characterisation of ion channel kinetics.

    Science.gov (United States)

    Beattie, Kylie A; Hill, Adam P; Bardenet, Rémi; Cui, Yi; Vandenberg, Jamie I; Gavaghan, David J; de Boer, Teun P; Mirams, Gary R

    2018-03-24

    Ion current kinetics are commonly represented by current-voltage relationships, time constant-voltage relationships and subsequently mathematical models fitted to these. These experiments take substantial time, which means they are rarely performed in the same cell. Rather than traditional square-wave voltage clamps, we fitted a model to the current evoked by a novel sum-of-sinusoids voltage clamp that was only 8 s long. Short protocols that can be performed multiple times within a single cell will offer many new opportunities to measure how ion current kinetics are affected by changing conditions. The new model predicts the current under traditional square-wave protocols well, with better predictions of underlying currents than literature models. The current under a novel physiologically relevant series of action potential clamps is predicted extremely well. The short sinusoidal protocols allow a model to be fully fitted to individual cells, allowing us to examine cell-cell variability in current kinetics for the first time. Understanding the roles of ion currents is crucial to predict the action of pharmaceuticals and mutations in different scenarios, and thereby to guide clinical interventions in the heart, brain and other electrophysiological systems. Our ability to predict how ion currents contribute to cellular electrophysiology is in turn critically dependent on our characterisation of ion channel kinetics - the voltage-dependent rates of transition between open, closed and inactivated channel states. We present a new method for rapidly exploring and characterising ion channel kinetics, applying it to the hERG potassium channel as an example, with the aim of generating a quantitatively predictive representation of the ion current. We fitted a mathematical model to currents evoked by a novel 8 second sinusoidal voltage clamp in CHO cells overexpressing hERG1a. The model was then used to predict over 5 minutes of recordings in the same cell in response to

  14. Outcomes of a rapid refeeding protocol in Adolescent Anorexia Nervosa.

    Science.gov (United States)

    Madden, Sloane; Miskovic-Wheatley, Jane; Clarke, Simon; Touyz, Stephen; Hay, Phillipa; Kohn, Michael R

    2015-01-01

    The impact of severe malnutrition and medical instability in adolescent Anorexia Nervosa (AN) on immediate health and long-term development underscores the need for safe and efficient methods of refeeding. Current refeeding guidelines in AN advocate low initial caloric intake with slow increases in energy intake to avoid refeeding syndrome. This study demonstrates the potential for more rapid refeeding to promote initial weight recovery and correct medical instability in adolescent AN. Seventy-eight adolescents with AN (12-18 years), hospitalised in two specialist paediatric eating disorder units, for medical instability (bradycardia, hypotension, hypothermia, orthostatic instability and/or cardiac arrhythmia) were followed during a 2.5 week admission. Patients were refed using a standardised protocol commencing with 24-72 hours of continuous nasogastric feeds (ceased with daytime medical stability) and routine oral phosphate supplementation, followed by nocturnal feeds and a meal plan of 1200-2400 kcal/day aiming for a total caloric intake of 2400-3000 kcal/day. Along with indicators of medical stability, weight, phosphate and glucose levels were recorded. All patients gained weight in week one (M = 2.79 kg, SD = 1.27 kg) and at subsequent measurement points with an average gain of 5.12 kg (SD = 2.96) at 2.5 weeks. No patient developed hypophosphatemia, hypoglycaemia, or stigmata of the refeeding syndrome. The refeeding protocol resulted in immediate weight gain and was well tolerated with no indicators of refeeding syndrome. There were no significant differences in outcomes between the treatment sites, suggesting the protocol is replicable. Australian Clinical Trials Register number: ACTRN012607000009415.

  15. Safety of a rapid diagnostic protocol with accelerated stress testing.

    Science.gov (United States)

    Soremekun, Olan A; Hamedani, Azita; Shofer, Frances S; O'Conor, Katie J; Svenson, James; Hollander, Judd E

    2014-02-01

    Most patients at low to intermediate risk for an acute coronary syndrome (ACS) receive a 12- to 24-hour "rule out." Recently, trials have found that a coronary computed tomographic angiography-based strategy is more efficient. If stress testing were performed within the same time frame as coronary computed tomographic angiography, the 2 strategies would be more similar. We tested the hypothesis that stress testing can safely be performed within several hours of presentation. We performed a retrospective cohort study of patients presenting to a university hospital from January 1, 2009, to December 31, 2011, with potential ACS. Patients placed in a clinical pathway that performed stress testing after 2 negative troponin values 2 hours apart were included. We excluded patients with ST-elevation myocardial infarction or with an elevated initial troponin. The main outcome was safety of immediate stress testing defined as the absence of death or acute myocardial infarction (defined as elevated troponin within 24 hours after the test). A total of 856 patients who presented with potential ACS were enrolled in the clinical pathway and included in this study. Patients had a median age of 55.0 (interquartile range, 48-62) years. Chest pain was the chief concern in 86%, and pain was present on arrival in 73% of the patients. There were no complications observed during the stress test. There were 0 deaths (95% confidence interval, 0%-0.46%) and 4 acute myocardial infarctions within 24 hours (0.5%; 95% confidence interval, 0.14%-1.27%). The peak troponins were small (0.06, 0.07, 0.07, and 0.19 ng/mL). Patients who present to the ED with potential ACS can safely undergo a rapid diagnostic protocol with stress testing. © 2013.

  16. Influence of selected biotopes on chironomid-based bioassessment ...

    African Journals Online (AJOL)

    ... three distinct biotopes, i.e., stones, vegetation and sediments. In this study, the influence of reducing the numbers of biotopes on chironomid-based bioassessment of pollution in the Swartkops River was investigated. This paper addresses the following questions: (i) can the chironomid species assemblage from any single ...

  17. Implementation of a Rapid, Protocol-based TIA Management Pathway.

    Science.gov (United States)

    Jarhult, Susann J; Howell, Melissa L; Barnaure-Nachbar, Isabelle; Chang, Yuchiao; White, Benjamin A; Amatangelo, Mary; Brown, David F; Singhal, Aneesh B; Schwamm, Lee H; Silverman, Scott B; Goldstein, Joshua N

    2018-03-01

    Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED) with symptoms of transient ischemic attack (TIA). We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6-12 months after implementation. Outcomes included ED length of stay (LOS), hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18). Following the intervention, the inpatient admission rate decreased from 62% to 24% (pTIA among those with final diagnosis of TIA was 3% for both periods. Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  18. The Namibian Scoring System (NASS) version 2 rapid bio ...

    African Journals Online (AJOL)

    This paper presents a rapid bio-assessment method for assessing the ... The method uses the composition and abundance of aquatic invertebrates, which are ... Training of Namibian personnel to apply the method, as part of the National ...

  19. Field evaluation of hazardous waste site bioassessment protocols. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, J.M.; Cline, J.F.; Gano, K.A.; McShane, M.C.; Rogers, J.E.; Rogers, L.E.; Simpson, J.C.; Skalski, J.R.

    1984-04-01

    The overall goal of the plan was to demonstrate that honeybees could be used in detecting likely areas of chemical pollution, to demonstrate the usefulness of microbial and plant phytoassays, and to demonstrate a relationship between laboratory derived phytotoxicity results and field observations of plant community structure and diversity. Field studies were conducted through a cooperative arrangement with the US Army arsenal in Commerce City, Colorado.

  20. The RAPID protocol enhances patient recovery after both laparoscopic and open colorectal resections.

    LENUS (Irish Health Repository)

    Lloyd, G M

    2010-06-01

    Enhanced recovery after surgery (ERAS) programs can accelerate recovery and shorten the hospital stay after colorectal resections. The RAPID (remove, ambulate, postoperative analgesia, introduce diet) protocol is a simplified ERAS program that consists of a simplified, user-friendly single-page pro forma schedule. This study aimed to evaluate the impact of the RAPID protocol on patients undergoing both laparoscopic and open colorectal resections in two specialized colorectal units.

  1. Implementation of a Rapid, Protocol-based TIA Management Pathway

    Directory of Open Access Journals (Sweden)

    Susann J. Jarhult

    2018-02-01

    Full Text Available Introduction: Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED with symptoms of transient ischemic attack (TIA. Methods: We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6–12 months after implementation. Outcomes included ED length of stay (LOS, hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. Results: From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18. Following the intervention, the inpatient admission rate decreased from 62% to 24% (p<0.001, median ED LOS decreased by 1.2 hours (5.7 to 4.9 hours, p=0.027, and median total hospital LOS from 29.4 hours to 23.1 hours (p=0.019. The proportion of patients receiving head computed tomography (CT went from 68% to 58% (p=0.087; brain magnetic resonance (MR imaging from 83% to 88%, (p=0.44 neck CT angiography from 32% to 22% (p=0.039; and neck MR angiography from 61% to 72% (p=0.046. Ninety-day stroke or recurrent TIA among those with final diagnosis of TIA was 3% for both periods. Conclusion: Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  2. Rapid bioassessment of the effects of repeated rotenone treatments ...

    African Journals Online (AJOL)

    The potential collateral effects of eradicating invasive fishes in streams necessitate the monitoring of invertebrate communities during treatment. In an environmental rehabilitation programme, non-native smallmouth bass were removed from the lower reaches of the Rondegat River, Western Cape, South Africa, in 2012 and ...

  3. Implementation of a rapid chest pain protocol in the emergency department: A quality improvement project.

    Science.gov (United States)

    Bunch, Azalea Marie; Leasure, A Renee; Carithers, Cathrin; Burnette, Robert E; Berryman, Michael Scott

    2016-02-01

    The purpose of this quality improvement (QI) project is to compare the effectiveness of a rapid 90-min chest pain screening and evaluation protocol to a 120-min screening and evaluation protocol in determining patient readiness for hospital admission or discharge home. The existing chest pain protocol utilized in the emergency department (ED) was revised based on a review of current research changing initial screening and reevaluation times from 120 to 90 min. A prospective comparative study of patients presenting to the ED with chest pain was performed comparing the existing chest pain protocol of 120 min (standard care) with a rapid screening evaluation protocol of 90 min. A total of 128 patients presenting to an ED in Texas with chest pain comprised the sample for this study. There was a significant difference in the number of minutes between the groups for readiness for disposition. The average time from chest pain evaluation to readiness for disposition home, observation, or admission decreased from an average of 191 min in the standard care group to an average of 118 min in the rapid screening group. Use of the rapid screening and evaluation protocol decreased the time to disposition by an average of 73 min, which enhanced ED flow without influencing disposition and patient safety. ©2015 American Association of Nurse Practitioners.

  4. Comparing two periphyton collection methods commonly used for stream bioassessment and the development of numeric nutrient standards.

    Science.gov (United States)

    Rodman, Ashley R; Scott, J Thad

    2017-07-01

    Periphyton is an important component of stream bioassessment, yet methods for quantifying periphyton biomass can differ substantially. A case study within the Arkansas Ozarks is presented to demonstrate the potential for linking chlorophyll-a (chl-a) and ash-free dry mass (AFDM) data sets amassed using two frequently used periphyton sampling protocols. Method A involved collecting periphyton from a known area on the top surface of variably sized rocks gathered from relatively swift-velocity riffles without discerning canopy cover. Method B involved collecting periphyton from the entire top surface of cobbles systematically gathered from riffle-run habitat where canopy cover was intentionally avoided. Chl-a and AFDM measurements were not different between methods (p = 0.123 and p = 0.550, respectively), and there was no interaction between method and time in the repeated measures structure of the study. However, significantly different seasonal distinctions were observed for chl-a and AFDM from all streams when data from the methods were combined (p methods may effectively be used together with some minor considerations due to potential confounding factors. This study provides motivation for the continued investigation of combining data sets derived from multiple methods of data collection, which could be useful in stream bioassessment and particularly important for the development of regional stream nutrient criteria for the southern Ozarks.

  5. Bio-assessment of water pollution in coal belt

    International Nuclear Information System (INIS)

    Mishra, P.K.

    1998-01-01

    Water pollution in coal belt has attracted attention of scientists as well as general people. Implication of water pollution on bio-system is still a more important issue and a lot of information has been accumulated. Apart from conventional methods of pollution monitoring, bio-monitoring is comparatively a new approach and a proper methodology is still in pipeline. The present study reviews various methods of bio-monitoring and compare various methodologies suggested at population level with conventional methods. The results indicated that the bio-assessment methodology can be a tool and hence be developed. (author)

  6. A rapid infusion protocol is safe for total dose iron polymaltose: time for change.

    Science.gov (United States)

    Garg, M; Morrison, G; Friedman, A; Lau, A; Lau, D; Gibson, P R

    2011-07-01

    Intravenous correction of iron deficiency by total dose iron polymaltose is inexpensive and safe, but current protocols entail prolonged administration over more than 4 h. This results in reduced patient acceptance, and hospital resource strain. We aimed to assess prospectively the safety of a rapid intravenous protocol and compare this with historical controls. Consecutive patients in whom intravenous iron replacement was indicated were invited to have up to 1.5 g iron polymaltose by a 58-min infusion protocol after an initial 15-min test dose without pre-medication. Infusion-related adverse events (AE) and delayed AE over the ensuing 5 days were also prospectively documented and graded as mild, moderate or severe. One hundred patients, 63 female, mean age 54 (range 18-85) years were studied. Thirty-four infusion-related AE to iron polymaltose occurred in a total of 24 patients--25 mild, 8 moderate and 1 severe; higher than previously reported for a slow protocol iron infusion. Thirty-one delayed AE occurred in 26 patients--26 mild, 3 moderate and 2 severe; similar to previously reported. All but five patients reported they would prefer iron replacement through the rapid protocol again. The presence of inflammatory bowel disease (IBD) predicted infusion-related reactions (54% vs 14% without IBD, P cost, resource utilization and time benefits for the patient and hospital system. © 2011 The Authors. Internal Medicine Journal © 2011 Royal Australasian College of Physicians.

  7. A SAFE PROTOCOL FOR RAPID DESENSITIZATION IN PATIENTS WITH CYSTIC FIBROSIS AND ANTIBIOTIC HYPERSENSITIVITY

    Science.gov (United States)

    Legere, Henry J.; Palis, Ross I.; Bouza, Tito Rodriguez; Uluer, Ahmet Z.; Castells, Mariana C.

    2009-01-01

    Background CF patients often demonstrate hypersensitivity to one or multiple antibiotics due to frequent and repeated exposures. Attempts at antibiotic desensitization in this population are historically complicated by higher reaction rates, failure to complete the procedure and consequent withholding of first-line therapy. This study evaluates the outcomes of a rapid desensitization protocol developed at our institution. Methods We retrospectively reviewed the medical records of 15 patients undergoing 52 rapid antibiotic desensitizations at Brigham and Women’s Hospital and Children’s Hospital Boston utilizing our protocol. Results Mean FEV1 % predicted was 44.1 (SD 16.5), with two patients at desensitized during bilateral lung transplantation. Adverse reactions during desensitization occurred in 13.4%, and most were mild. 100% of patients completed the protocol and ultimately tolerated subsequent full-strength antibiotic courses. Conclusions CF patients with antibiotic hypersensitivity can safely receive first-line antibiotics via our rapid desensitization protocol, including those with severe obstructive lung disease. PMID:19740711

  8. 76 FR 20974 - Implications of Climate Change for Bioassessment Programs and Approaches To Account for Effects

    Science.gov (United States)

    2011-04-14

    ... resource management to determine the ecological consequences of environmental stressors. All states utilize... environmental factors. We found that climatically vulnerable components of bioassessment programs include... reference condition). Implementation (e.g., data collection and analysis). Environmental management (e.g...

  9. A rapid and efficient DNA extraction protocol from fresh and frozen human blood samples.

    Science.gov (United States)

    Guha, Pokhraj; Das, Avishek; Dutta, Somit; Chaudhuri, Tapas Kumar

    2018-01-01

    Different methods available for extraction of human genomic DNA suffer from one or more drawbacks including low yield, compromised quality, cost, time consumption, use of toxic organic solvents, and many more. Herein, we aimed to develop a method to extract DNA from 500 μL of fresh or frozen human blood. Five hundred microliters of fresh and frozen human blood samples were used for standardization of the extraction procedure. Absorbance at 260 and 280 nm, respectively, (A 260 /A 280 ) were estimated to check the quality and quantity of the extracted DNA sample. Qualitative assessment of the extracted DNA was checked by Polymerase Chain reaction and double digestion of the DNA sample. Our protocol resulted in average yield of 22±2.97 μg and 20.5±3.97 μg from 500 μL of fresh and frozen blood, respectively, which were comparable to many reference protocols and kits. Besides yielding bulk amount of DNA, our protocol is rapid, economical, and avoids toxic organic solvents such as Phenol. Due to unaffected quality, the DNA is suitable for downstream applications. The protocol may also be useful for pursuing basic molecular researches in laboratories having limited funds. © 2017 Wiley Periodicals, Inc.

  10. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    DEFF Research Database (Denmark)

    Beran, David; Yudkin, John S; de Courten, Maximilian

    2006-01-01

    In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol...... for the gathering of other data through site visits, discussions, and document reviews....

  11. A Rapid and Efficient Sonogashira Protocol and Improved Synthesis of Free Fatty Acid 1 (FFA1) Receptor Agonists

    DEFF Research Database (Denmark)

    Christiansen, Elisabeth; Due-Hansen, Maria E; Ulven, Trond

    2010-01-01

    A protocol for rapid and efficient Pd/Cu-catalyzed coupling of aryl bromides and iodides to terminal alkynes has been developed with use of 2-(di-tert-butylphosphino)-N-phenylindole (cataCXium PIntB) as ligand in TMEDA and water. The new protocol successfully couples substrates which failed...

  12. Rivers rapid assessment protocols and insertion of society in monitoring of water resources

    Directory of Open Access Journals (Sweden)

    Guilherme Malafaia

    2008-12-01

    Full Text Available The degradation of water resources has been detected and changes both institutional and in the legislation have been demanded. The careless use of rivers has ecological changes as direct consequence, causing serious modifications in the landscape and fluvial regime, besides altering the availability of habitats and the trophic composition of the aquatic environment. Pressed by this scenario, scientists have been developing assessment methods that are efficient both for the evaluation itself and for supporting decision taking in the environmental management processes. In this perspective, the objective of this study is to present the Rapid River Assessment Protocols (RAPs and to emphasize how these protocols can promote the community participation in water resources monitoring. The RAPs can used to evaluate in an integrated form the characteristics of a river section according to the conservation or degradation condition of the fluvial environment and it is characterized by its economic viability and easy applicability. In regions with poor financial resources and serious problems of water quality, the RAPs can be used in environmental management programs. By using these protocols, the integration of the community in water resources monitoring generates data which represent the quality of fluvial ecosystems throughout time, without requesting high costs or specialized professionals. The RAPs in a simplified but not simplistic tool, which can be used in activities that aim at promoting a quick and reliable assessment of the “health” of a river.

  13. Bioassessment in nonperennial streams: Hydrologic stability influences assessment validity

    Science.gov (United States)

    Mazor, R. D.; Stein, E. D.; Schiff, K.; Ode, P.; Rehn, A.

    2011-12-01

    Nonperennial streams pose a challenge for bioassessment, as assessment tools developed in perennial streams may not work in these systems. For example, indices of biotic integrity (IBIs) developed in perennial streams may give improper indications of impairment in nonperennial streams, or may be unstable. We sampled benthic macroinvertebrates from 12 nonperennial streams in southern California. In addition, we deployed loggers to obtain continuous measures of flow. 3 sites were revisited over 2 years. For each site, we calculated several metrics, IBIs, and O/E scores to determine if assessments were consistent and valid throughout the summer. Hydrology varied widely among the streams, with several streams drying between sampling events. IBIs suggested good ecological health at the beginning of the study, but declined sharply at some sites. Multivariate ordination suggested that, despite differences among sites, changes in community structure were similar, with shifts from Ephemeroptera, Plecoptera, and Trichoptera to Coleoptera and more tolerant organisms. Site revisits revealed a surprising level of variability, as 2 of the 3 revisited sites had perennial or near-perennial flow in the second year of sampling. IBI scores were more consistent in streams with stable hydrographs than in those with strongly intermittent hydrographs. These results suggest that nonperennial streams can be monitored successfully, but they may require short index periods and distinct metrics from those used in perennial streams. In addition, better approaches to mapping nonperennial streams are required.

  14. Comparison of two protocols for maxillary protraction: bone anchors versus face mask with rapid maxillary expansion

    Science.gov (United States)

    Cevidanes, Lucia; Baccetti, Tiziano; Franchi, Lorenzo; McNamara, James A.; De Clerck, Hugo

    2010-01-01

    Objective To test the hypothesis that there is no difference in the active treatment effects for maxillary advancement induced by bone-anchored maxillary protraction (BAMP) and the active treatment effects for face mask in association with rapid maxillary expansion (RME/FM). Materials and Methods This is a study on consecutively treated patients. The changes in dentoskeletal cephalometric variables from start of treatment (T1) to end of active treatment (T2) with an average T1–T2 interval of about 1 year were contrasted in a BAMP sample of 21 subjects with a RME/FM sample of 34 patients. All subjects were prepubertal at T1. Statistical comparison was performed with t-tests for independent samples. Results The BAMP protocol produced significantly larger maxillary advancement than the RME/FM therapy (with a difference of 2 mm to 3 mm). Mandibular sagittal changes were similar, while vertical changes were better controlled with BAMP. The sagittal intermaxillary relationships improved 2.5 mm more in the BAMP patients. Additional favorable outcomes of BAMP treatment were the lack of clockwise rotation of the mandible as well as a lack of retroclination of the lower incisors. Conclusions The hypothesis is rejected. The BAMP protocol produced significantly larger maxillary advancement than the RME/FM therapy. PMID:20578848

  15. Adapting a rapid river assessment protocols to be used by elementary school children

    Directory of Open Access Journals (Sweden)

    Guilherme Malafaia

    2012-12-01

    Full Text Available The present study aimed to adapt a rapid river assessment protocols (RAP to be used by elementary school children. The study was conducted in Ipameri, GO and the RAP was adapted for the evaluation of streams in the Cerrado biome. Based on two protocol models, the developed RAP included: physical parameters that affect the functioning of streams, language adapted to the educational level of elementary school and the presence of drawings that could facilitate the field application of RAP by the students. For consolidation of the adapted instrument, it was offered a monitoring workshop to 95 students from two public education institutions, and developed an analysis and interpretation of the pattern of responses obtained during the practical step of the workshop. The Bartlett and Levene tests revealed no statistical differences between the response patterns of the students, allowing to infer that the developed RAP was understandable by the evaluators. The application of the RAP was fast (20 to 40 minutes and the students reported that the developed instrument helped them to familiarize with environmental issues. In addition, the monitoring workshop helped them to understand the instrument and the available illustrations facilitated the field evaluation. In addition, the students concluded that they have become aware of the issues related to the water resource preservation and also that participation in the environmental monitoring workshop allowed the appropriation of knowledge about the river system functioning. It was concluded that adapted RAP has been proved to be a useful and interesting tool for using in environmental education projects and programs.

  16. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    Directory of Open Access Journals (Sweden)

    de Courten Maximilian

    2006-02-01

    Full Text Available Abstract Background In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol for the gathering of other data through site visits, discussions, and document reviews. Methods The Rapid Assessment Protocol for Insulin Access draws on the principles of Rapid Assessment Protocols which have been developed and implemented in several different areas. This protocol was adapted through a thorough literature review on diabetes, chronic condition management and medicine supply in developing countries. A visit to three countries in sub-Saharan Africa and meetings with different experts in the field of diabetes helped refine the questionnaires. Following the development of the questionnaires these were tested with various people familiar with diabetes and/or healthcare in developing countries. The Protocol was piloted in Mozambique then refined and had two further iterations in Zambia and Mali. Translations of questionnaires were made into local languages when necessary, with back translation to ensure precision. Results In each country the protocol was implemented in 3 areas – the capital city, a large urban centre and a predominantly rural area and their respective surroundings. Interviews were carried out by local teams trained on how to use the tool. Data was then collected and entered into a database for analysis. Conclusion The Rapid Assessment Protocol for Insulin Access was developed to provide a situational analysis of Type 1 diabetes, in order to make recommendations to the national Ministries of Health and Diabetes Associations. It provided valuable information on patients' access to insulin, syringes, monitoring and care. It was thus able to sketch a picture of the health care system with regards to its ability to

  17. Use of multiple functional traits of protozoa for bioassessment of marine pollution.

    Science.gov (United States)

    Zhong, Xiaoxiao; Xu, Guangjian; Xu, Henglong

    2017-06-30

    Ecological parameters based on multiply functional traits have many advantages for monitoring programs by reducing "signal to noise" ratios of observed species data. To identify potential indicators for bioassessment of marine pollution in function space, the functional patterns of protozoan communities and relationships with environmental changes were studied in coastal waters of the Yellow Sea during a 1-year period. The results showed that: (1) the spatial variability in functional trait distributions of the protozoa was significantly associated with changes in environmental variables, especially chemical oxygen demand (COD) and nutrients on spatial scale; (2) the functional traits, especially food resources and feeding type, were significantly correlated with COD and nutrients; and (3) the functional diversity indices were generally related to nutrients or COD. Based on the results, we suggest that the functional traits and diversity indices of protozoan communities may be used as more effective indicators for bioassessment of marine pollution. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Evaluation of alternative macroinvertebrate sampling techniques for use in a new tropical freshwater bioassessment scheme

    OpenAIRE

    Isabel Eleanor Moore; Kevin Joseph Murphy

    2015-01-01

    Aim: The study aimed to determine the effectiveness of benthic macroinvertebrate dredge net sampling procedures as an alternative method to kick net sampling in tropical freshwater systems, specifically as an evaluation of sampling methods used in the Zambian Invertebrate Scoring System (ZISS) river bioassessment scheme. Tropical freshwater ecosystems are sometimes dangerous or inaccessible to sampling teams using traditional kick-sampling methods, so identifying an alternative procedure that...

  19. Bioassessment of a Drinking Water Reservoir Using Plankton: High Throughput Sequencing vs. Traditional Morphological Method

    Directory of Open Access Journals (Sweden)

    Wanli Gao

    2018-01-01

    Full Text Available Drinking water safety is increasingly perceived as one of the top global environmental issues. Plankton has been commonly used as a bioindicator for water quality in lakes and reservoirs. Recently, DNA sequencing technology has been applied to bioassessment. In this study, we compared the effectiveness of the 16S and 18S rRNA high throughput sequencing method (HTS and the traditional optical microscopy method (TOM in the bioassessment of drinking water quality. Five stations reflecting different habitats and hydrological conditions in Danjiangkou Reservoir, one of the largest drinking water reservoirs in Asia, were sampled May 2016. Non-metric multi-dimensional scaling (NMDS analysis showed that plankton assemblages varied among the stations and the spatial patterns revealed by the two methods were consistent. The correlation between TOM and HTS in a symmetric Procrustes analysis was 0.61, revealing overall good concordance between the two methods. Procrustes analysis also showed that site-specific differences between the two methods varied among the stations. Station Heijizui (H, a site heavily influenced by two tributaries, had the largest difference while station Qushou (Q, a confluence site close to the outlet dam, had the smallest difference between the two methods. Our results show that DNA sequencing has the potential to provide consistent identification of taxa, and reliable bioassessment in a long-term biomonitoring and assessment program for drinking water reservoirs.

  20. Rapid maxillary distraction protocol utilizing the halo distraction system and rigid internal fixation.

    Science.gov (United States)

    Baker, Stephen B; Reid, Russell R; Burkey, Brooke; Bartlett, Scott P

    2007-09-01

    To shorten head frame wear time associated with external halo distraction (HD), we have adapted a protocol for maxillary distraction with the halo system that integrates plate fixation. All patients had a history of cleft lip and/or palate and maxillary retrusion > or = 8 mm. Five patients treated with this protocol and followed for at least 1 year were included in this study. The protocol included a 3-day latency period, variable maxillary distraction, and removal of the halo device with simultaneous rigid internal fixation. Two patients had a variable period of maxillomandibular fixation (MMF), which maintained the maxillary advancement and idealized intercuspal position while permitting further callus maturation. Cephalographs were obtained preoperatively, immediately following distractor removal, and 1 year after rigid internal fixation. The mean age at time of surgery was 18.7 years. The maxillary deficiency ranged from 8 to 15 mm (mean = 10.6 mm). All five patients demonstrated excellent occlusion. Cephalometric analysis 1-year post rigid internal fixation revealed minimal (maxillary distraction followed by MMF to maintain maxillary advancement may reduce halo device wear to 1 to 2 weeks. MMF optimizes occlusion by forcing the maxillary teeth into maximal intercuspal position. Rigid fixation is not only associated with less long-term relapse compared to nonrigid forms of fixation, but also minimizes the incidence of nonunion. This treatment protocol provides the advancement possible with distraction osteogenesis and the accuracy of orthognathic surgery, thereby minimizing external head frame wear.

  1. A rapid and efficient protocol for in vitro multiplication of genetically uniform Stevia rebaudiana (Bertoni).

    Science.gov (United States)

    Khan, A; Jayanthi, M; Gantasala, Nagavara Prasad; Bhooshan, N; Rao, Uma

    2016-07-01

    Stevia rebaudiana (Bertoni), commonly called candy leaf or sweet leaf, endemic to South America, is an important medicinal plant. As a source of low calorie natural sweetener 'stevoside', it is used in obesity, diabetes, treatment of heartburn and tooth decay, and also serves as a food supplement. Large scale commercial propagation of S. rebaudiana demands a suitable protocol. Here, we propose an improved protocol for in vitro multiplication of S. rebaudiana from nodal explants. In this protocol, the effect of laboratory grade urea on multiple shoot induction from nodal explants was studied. The nodal explants were initially cultured on Murashige and Skoog (MS) basal media for 2 weeks which facilitated the axillary bud break. Further, culturing of these explants on MS medium fortified with 6 benzyl amninopurine (BAP) (2 mg/L) and Naphthalene acetic acid (NAA) (1 mg/L) with and .without urea (5 mg/L) for a period of 40 days revealed maximum shoot production of 44.56 from a single nodal explant in media supplemented with urea as compared to 22.44 without urea. The differences in the number of shoots produced were significant and these shoots readily rooted in MS media with NAA (4 mg/L). Primary and secondary hardening was successful in these plants. There were no visible morphological abnormalities observed in the micropropagated plantlets. Genetic analysis from random samples also revealed that these plants are genetically uniform. The advantage of the present protocol is that the complete process of multiple shoot induction, rooting and hardening could be completed within a period of 6 months as compared to the existing protocols.

  2. Integration of DNA barcoding approaches into aquatic bioassessments

    Science.gov (United States)

    The Clean Water Act directs states to protect water resources by developing criteria based in part on biological assessments of natural aquatic ecosystems. Current protocols can be limited by the availability of taxonomic expertise and concerns about precision and accuracy in mor...

  3. A rapid two step protocol of in vitro propagation of an important ...

    African Journals Online (AJOL)

    chandrakant tiwari

    2013-03-06

    Mar 6, 2013 ... Attempts were made to evolve a rapid in vitro technology ..... Values are given as mean ± standard error (SE) of three replicates; each replicate consisted of 24 .... Seminar on Herbal Conservation, Cultivation, Marketing and.

  4. A Comparison of ectoparasite infestation by chigger mite larvae (Acarina: Trombiculidae) on resident and migratory birds in Chiapas, Mexico illustrating a rapid visual assessment protocol

    Science.gov (United States)

    Thomas V. Dietsch

    2005-01-01

    This study presents a protocol developed to rapidly assess ectoparasite prevalence and intensity. Using this protocol during a mist-netting project in two different coffee agroecosystems in Chiapas, Mexico, data were collected on ectoparasitic chigger mite larvae (Acarina: Trombiculidae) found on resident and migratory birds. Surprisingly high infestation rates were...

  5. Evaluation of alternative macroinvertebrate sampling techniques for use in a new tropical freshwater bioassessment scheme

    Directory of Open Access Journals (Sweden)

    Isabel Eleanor Moore

    2015-06-01

    Full Text Available Aim: The study aimed to determine the effectiveness of benthic macroinvertebrate dredge net sampling procedures as an alternative method to kick net sampling in tropical freshwater systems, specifically as an evaluation of sampling methods used in the Zambian Invertebrate Scoring System (ZISS river bioassessment scheme. Tropical freshwater ecosystems are sometimes dangerous or inaccessible to sampling teams using traditional kick-sampling methods, so identifying an alternative procedure that produces similar results is necessary in order to collect data from a wide variety of habitats.MethodsBoth kick and dredge nets were used to collect macroinvertebrate samples at 16 riverine sites in Zambia, ranging from backwaters and floodplain lagoons to fast flowing streams and rivers. The data were used to calculate ZISS, diversity (S: number of taxa present, and Average Score Per Taxon (ASPT scores per site, using the two sampling methods to compare their sampling effectiveness. Environmental parameters, namely pH, conductivity, underwater photosynthetically active radiation (PAR, temperature, alkalinity, flow, and altitude, were also recorded and used in statistical analysis. Invertebrate communities present at the sample sites were determined using multivariate procedures.ResultsAnalysis of the invertebrate community and environmental data suggested that the testing exercise was undertaken in four distinct macroinvertebrate community types, supporting at least two quite different macroinvertebrate assemblages, and showing significant differences in habitat conditions. Significant correlations were found for all three bioassessment score variables between results acquired using the two methods, with dredge-sampling normally producing lower scores than did the kick net procedures. Linear regression models were produced in order to correct each biological variable score collected by a dredge net to a score similar to that of one collected by kick net

  6. A rapid Q-PCR titration protocol for adenovirus and helper-dependent adenovirus vectors that produces biologically relevant results

    Science.gov (United States)

    Gallaher, Sean D.; Berk, Arnold J.

    2013-01-01

    Adenoviruses are employed in the study of cellular processes and as expression vectors used in gene therapy. The success and reproducibility of these studies is dependent in part on having accurate and meaningful titers of replication competent and helper-dependent adenovirus stocks, which is problematic due to the use of varied and divergent titration protocols. Physical titration methods, which quantify the total number of viral particles, are used by many, but are poor at estimating activity. Biological titration methods, such as plaque assays, are more biologically relevant, but are time consuming and not applicable to helper-dependent gene therapy vectors. To address this, a protocol was developed called “infectious genome titration” in which viral DNA is isolated from the nuclei of cells ~3 h post-infection, and then quantified by Q-PCR. This approach ensures that only biologically active virions are counted as part of the titer determination. This approach is rapid, robust, sensitive, reproducible, and applicable to all forms of adenovirus. Unlike other Q-PCR-based methods, titers determined by this protocol are well correlated with biological activity. PMID:23624118

  7. A rapid two step protocol of in vitro propagation of an important ...

    African Journals Online (AJOL)

    Attempts were made to evolve a rapid in vitro technology to conserve, as well as, mass propagate this valuable medicinal herb in very short duration. The combinations of ... MS media supplemented with BAP with IBA (4:0.5 and 5:0.5) resulted in shooting, as well as, rooting simultaneously. Micro propagated plantlets were ...

  8. A Simple, Rapid and Efficient One-pot Protocol for the Synthesis of 2 ...

    African Journals Online (AJOL)

    NJD

    A rapid and efficient condensation reaction of 2-aminothiophenol with various fatty acids in solvent-free conditions with or without microwave irradiation was ... heterocyclic compounds that have widespread applications in pharmaceutical and ... catalyzed reaction of aryl halides with o-aminothiophenol in presence of carbon ...

  9. An efficient regeneration and rapid micropropagation protocol for Almond using dormant axillary buds as explants.

    Science.gov (United States)

    Choudhary, Ravish; Chaudhury, Rekha; Malik, Surendra Kumar; Sharma, Kailash Chandra

    2015-07-01

    An efficient in vitro protocol was standardized for Almond (Prunus dulcis) propagation using dormant axillary buds as explants. Explants were cultured on Murashige and Skoog (MS) and woody plant medium (WPM) supplemented with different concentration/combination(s) of phytohormones. MS basal medium showed lowest shoot induction and took longest duration for shoot initiation. Multiple shoots were induced in MS medium supplemented with the combination of BAP (0.5 mgL(-1)). Cultures showed poor response for rooting in all combinations of plant growth regulators (PGRs) and took 90 days for initiation. Rooting was higher in half strength of MS than in full-strength. The highest root induction (33.33%) was recorded in half MS medium supplemented with 0.1 mgL(-1) IBA (indole-3-butyric acid) followed by full strength of MS medium (20%) supplemented with IBA (0.1 mgL(-1)). α-Naphthalene acetic acid (NAA) was less effective for rooting than IBA. The highest root induction (25%) was found in half strength of MS medium supplemented with 0.1 mgL(-1) NAA followed by full strength of MS medium (20%). The protocol developed would be of use in mass propagation of almond and also support in vitro conservation.

  10. Integrating DNA-based data into bioassessments improves our understanding of species distributions and species habitat relationships

    Science.gov (United States)

    The integration of DNA-based identification methods into bioassessments could result in more accurate representations of species distributions and species-habitat relationships. DNA-based approaches may be particularly informative for tracking the distributions of rare and/or inv...

  11. A rapid challenge protocol for determination of non-specific bronchial responsiveness

    DEFF Research Database (Denmark)

    Madsen, F; Nielsen, N H; Holstein-Rathlou, N H

    1986-01-01

    A rapid method for determination of non-specific bronchial hyperreactivity was developed. Resistance to breathing was determined by a modified expiratory airway interrupter technique and combined with a dosimeter-controlled nebulizer which made continuous determination of response possible during...... hyperreactivity since individual dose titration is easily performed, and the method could be valuable in epidemiological and occupational surveys as well.......A rapid method for determination of non-specific bronchial hyperreactivity was developed. Resistance to breathing was determined by a modified expiratory airway interrupter technique and combined with a dosimeter-controlled nebulizer which made continuous determination of response possible during...... challenge. The patients inhaled histamine chloride 8 mg/ml at every eighth breath until resistance to breathing (Rt) was increased by 60%. The number of inhalations (NI) or the provocative concentration (PC60-Rt) of histamine increasing Rt by 60% were determined in 68 patients. The new method correlated...

  12. Rapid and efficient protocol for DNA extraction and molecular identification of the basidiomycete Crinipellis perniciosa.

    Science.gov (United States)

    Melo, S C O; Pungartnik, C; Cascardo, J C M; Brendel, M

    2006-12-14

    DNA isolation from some fungal organisms is difficult because they have cell walls or capsules that are relatively unsusceptible to lysis. Beginning with a yeast Saccharomyces cerevisiae genomic DNA isolation method, we developed a 30-min DNA isolation protocol for filamentous fungi by combining cell wall digestion with cell disruption by glass beads. High-quality DNA was isolated with good yield from the hyphae of Crinipellis perniciosa, which causes witches' broom disease in cacao, from three other filamentous fungi, Lentinus edodes, Agaricus blazei, Trichoderma stromaticum, and from the yeast S. cerevisiae. Genomic DNA was suitable for PCR of specific actin primers of C. perniciosa, allowing it to be differentiated from fungal contaminants, including its natural competitor, T. stromaticum.

  13. Rapid and Easy Protocol for Quantification of Next-Generation Sequencing Libraries.

    Science.gov (United States)

    Hawkins, Steve F C; Guest, Paul C

    2018-01-01

    The emergence of next-generation sequencing (NGS) over the last 10 years has increased the efficiency of DNA sequencing in terms of speed, ease, and price. However, the exact quantification of a NGS library is crucial in order to obtain good data on sequencing platforms developed by the current market leader Illumina. Different approaches for DNA quantification are available currently and the most commonly used are based on analysis of the physical properties of the DNA through spectrophotometric or fluorometric methods. Although these methods are technically simple, they do not allow exact quantification as can be achieved using a real-time quantitative PCR (qPCR) approach. A qPCR protocol for DNA quantification with applications in NGS library preparation studies is presented here. This can be applied in various fields of study such as medical disorders resulting from nutritional programming disturbances.

  14. Development of a new protocol for rapid bacterial identification and susceptibility testing directly from urine samples.

    Science.gov (United States)

    Zboromyrska, Y; Rubio, E; Alejo, I; Vergara, A; Mons, A; Campo, I; Bosch, J; Marco, F; Vila, J

    2016-06-01

    The current gold standard method for the diagnosis of urinary tract infections (UTI) is urine culture that requires 18-48 h for the identification of the causative microorganisms and an additional 24 h until the results of antimicrobial susceptibility testing (AST) are available. The aim of this study was to shorten the time of urine sample processing by a combination of flow cytometry for screening and matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF-MS) for bacterial identification followed by AST directly from urine. The study was divided into two parts. During the first part, 675 urine samples were processed by a flow cytometry device and a cut-off value of bacterial count was determined to select samples for direct identification by MALDI-TOF-MS at ≥5 × 10(6) bacteria/mL. During the second part, 163 of 1029 processed samples reached the cut-off value. The sample preparation protocol for direct identification included two centrifugation and two washing steps. Direct AST was performed by the disc diffusion method if a reliable direct identification was obtained. Direct MALDI-TOF-MS identification was performed in 140 urine samples; 125 of the samples were positive by urine culture, 12 were contaminated and 3 were negative. Reliable direct identification was obtained in 108 (86.4%) of the 125 positive samples. AST was performed in 102 identified samples, and the results were fully concordant with the routine method among 83 monomicrobial infections. In conclusion, the turnaround time of the protocol described to diagnose UTI was about 1 h for microbial identification and 18-24 h for AST. Copyright © 2016 European Society of Clinical Microbiology and Infectious Diseases. Published by Elsevier Ltd. All rights reserved.

  15. A novel stent inflation protocol improves long-term outcomes compared with rapid inflation/deflation deployment method.

    Science.gov (United States)

    Vallurupalli, Srikanth; Kasula, Srikanth; Kumar Agarwal, Shiv; Pothineni, Naga Venkata K; Abualsuod, Amjad; Hakeem, Abdul; Ahmed, Zubair; Uretsky, Barry F

    2017-08-01

    High-pressure inflation for coronary stent deployment is universally performed. However, the duration of inflation is variable and does not take into account differences in lesion compliance. We developed a standardized "pressure optimization protocol" (POP) using inflation pressure stability rather than an arbitrary inflation time or angiographic balloon appearance for stent deployment. Whether this approach improves long-term outcomes is unknown. 792 patients who underwent PCI using either rapid inflation/deflation (n = 376) or POP (n = 416) between January 2009 and March 2014 were included. Exclusion criteria included PCI for acute myocardial infarction, in-stent restenosis, chronic total occlusion, left main, and saphenous vein graft lesions. Primary endpoint was target vessel failure [TVF = combined end point of target vessel revascularization (TVR), myocardial infarction, and cardiac death]. Outcomes were analyzed in the entire cohort and in a propensity analysis. Stent implantation using POP with a median follow-up of 1317 days was associated with lower TVF compared with rapid inflation/deflation (10.1 vs. 17.8%, P inflation/deflation (10 vs. 18%, P < 0.0001). Stent deployment using POP led to reduced TVF compared to rapid I/D. These results recommend this method to improve long-term outcomes. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  16. Adapting a rapid assessment protocol to environmentally assess palm swamp (Veredas) springs in the Cerrado biome, Brazil.

    Science.gov (United States)

    Guimarães, Ariane; de Lima Rodrigues, Aline Sueli; Malafaia, Guilherme

    2017-10-30

    The exploitation and degradation of natural environments exert intense pressure on important ecosystems worldwide. Thus, it is necessary developing or adapting assessment methods to monitor environmental changes and to generate results to be applied to environmental management programs. The Brazilian Veredas (phytophysiognomies typical to the Cerrado biome) are threatened by several human activities; thus, the aim of the present study is to adapt a rapid assessment protocol (RAP) to be applied to Veredas springs, by using the upper course of the Vai-e-Vem stream watershed (Ipameri County, Goiás State, Brazil). Therefore, several springs in the study site were visited and 11 of them were considered Veredas springs. After the RAP was adapted, the instrument was validated and used to environmentally assess the springs in order to demonstrate its applicability. The present study has provided an instrument of option to monitor Veredas springs.

  17. Establishment of an efficient in vitro regeneration protocol for rapid and mass propagation of Dendrobium chrysotoxum Lindl. using seed culture.

    Science.gov (United States)

    Nongdam, Potshangbam; Tikendra, Leimapokpam

    2014-01-01

    An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species.

  18. Establishment of an Efficient In Vitro Regeneration Protocol for Rapid and Mass Propagation of Dendrobium chrysotoxum Lindl. Using Seed Culture

    Science.gov (United States)

    2014-01-01

    An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species. PMID:25401154

  19. A rapid echocardiographic screening protocol for rheumatic heart disease in Samoa: a high prevalence of advanced disease.

    Science.gov (United States)

    Allen, Marvin; Allen, John; Naseri, Take; Gardner, Rebecca; Tolley, Dennis; Allen, Lori

    2017-10-01

    Echocardiography has been proposed as a method to screen children for rheumatic heart disease. The World Heart Federation has established guidelines for echocardiographic screening. In this study, we describe a rapid echocardiogram screening protocol according to the World Heart Federation guidelines in Samoa, endemic for rheumatic heart disease. We performed echocardiogram screening in schoolchildren in Samoa between 2013 and 2015. A brief screening echocardiogram was performed on all students. Children with predefined criteria suspicious for rheumatic hear diseases were referred for a more comprehensive echocardiogram. Complete echocardiograms were classified according to the World Heart Federation guidelines and severity of valve disease. Echocardiographic screening was performed on 11,434 children, with a mean age of 10.2 years; 51% of them were females. A total of 558 (4.8%) children underwent comprehensive echocardiography, including 49 students who were randomly selected as controls. Definite rheumatic heart disease was observed in 115 students (10.0 per 1000): 92 students were classified as borderline (8.0 per 1000) and 23 with CHD. Advanced disease was identified in 50 students (4.4 per 1000): 15 with severe mitral regurgitation, five with severe aortic regurgitation, 11 with mitral stenoses, and 19 with mitral and aortic valve disease. We successfully applied a rapid echocardiographic screening protocol to a large number of students over a short time period - 28 days of screening over a 3-year time period - to identify a high prevalence of rheumatic heart disease. We also reported a significantly higher rate of advanced disease compared with previously published echocardiographic screening programmes.

  20. Effectiveness of a Rapid Lumbar Spine MRI Protocol Using 3D T2-Weighted SPACE Imaging Versus a Standard Protocol for Evaluation of Degenerative Changes of the Lumbar Spine.

    Science.gov (United States)

    Sayah, Anousheh; Jay, Ann K; Toaff, Jacob S; Makariou, Erini V; Berkowitz, Frank

    2016-09-01

    Reducing lumbar spine MRI scanning time while retaining diagnostic accuracy can benefit patients and reduce health care costs. This study compares the effectiveness of a rapid lumbar MRI protocol using 3D T2-weighted sampling perfection with application-optimized contrast with different flip-angle evolutions (SPACE) sequences with a standard MRI protocol for evaluation of lumbar spondylosis. Two hundred fifty consecutive unenhanced lumbar MRI examinations performed at 1.5 T were retrospectively reviewed. Full, rapid, and complete versions of each examination were interpreted for spondylotic changes at each lumbar level, including herniations and neural compromise. The full examination consisted of sagittal T1-weighted, T2-weighted turbo spin-echo (TSE), and STIR sequences; and axial T1- and T2-weighted TSE sequences (time, 18 minutes 40 seconds). The rapid examination consisted of sagittal T1- and T2-weighted SPACE sequences, with axial SPACE reformations (time, 8 minutes 46 seconds). The complete examination consisted of the full examination plus the T2-weighted SPACE sequence. Sensitivities and specificities of the full and rapid examinations were calculated using the complete study as the reference standard. The rapid and full studies had sensitivities of 76.0% and 69.3%, with specificities of 97.2% and 97.9%, respectively, for all degenerative processes. Rapid and full sensitivities were 68.7% and 66.3% for disk herniation, 85.2% and 81.5% for canal compromise, 82.9% and 69.1% for lateral recess compromise, and 76.9% and 69.7% for foraminal compromise, respectively. Isotropic SPACE T2-weighted imaging provides high-quality imaging of lumbar spondylosis, with multiplanar reformatting capability. Our SPACE-based rapid protocol had sensitivities and specificities for herniations and neural compromise comparable to those of the protocol without SPACE. This protocol fits within a 15-minute slot, potentially reducing costs and discomfort for a large subgroup of

  1. The Value of the Freshwater Snail Dip Scoop Sampling Method in Macroinvertebrates Bioassessment of Sugar Mill Wastewater Pollution in Mbandjock, Cameroon

    Directory of Open Access Journals (Sweden)

    Emmanuel Noumi

    2008-03-01

    Full Text Available Macroinvertebrates identification and enumeration may be used as a simple and affordable alternative to chemical analysis in water pollution monitoring. However, the ecological responses of various taxa to pollution are poorly known in resources-limited tropical countries. While freshwater macroinvertebrates have been used in the assessment of water quality in Europe and the Americas, investigations in Africa have mainly focused on snail hosts of human parasites. There is a need for sampling methods that can be used to assess both snails and other macroinvertebrates. The present study was designed to evaluate the usefulness of the freshwater snail dip scoop method in the study of macroinvertebrates for the assessment of the SOSUCAM sugar mill effluents pollution. Standard snail dip scoop samples were collected upstream and downstream of the factory effluent inputs, on the Mokona and Mengoala rivers. The analysis of the macroinvertebrate communities revealed the absence of Ephemeroptera and Trichoptera, and the thriving of Syrphidae in the sections of the rivers under high effluent load. The Shannon and Weaver diversity index was lower in these areas. The dip scoop sampling protocol was found to be a useful method for macroinvertebrates collection. Hence, this method is recommended as a simple, cost-effective and efficient tool for the bio-assessment of freshwater pollution in developing countries with limited research resources.

  2. Towards a rapid assessment protocol for identifying pit lakes worthy of restoration.

    Science.gov (United States)

    de Lange, W J; Genthe, B; Hill, L; Oberholster, P J

    2018-01-15

    Before the introduction of reclamation legislation in South Africa, final cut lakes in mining areas were left without any restoration while the final excavation was not back filled. Characteristics of these lacustrine water bodies vary considerably, but they are often linear in shape, large (1-30 ha), deep (2-30 m) and have poorly developed littoral zones. With water tables often near the surface; a variety of vascular hydrophytes can colonize these bodies, thus establishing emerging wetland type ecosystems. These, man-made aquatic structures that are (unintentionally) created potentially offers some realistic and inexpensive mitigation options for some of the negative impacts associated with mining, i.e. these water bodies can become useful by yielding potentially valuable services. However, no method currently exists to compare and rank these water bodies according ecological integrity and the expected monetary value to be derived from them in order to select sites for restoration. To answer this need, we applied an index to determine the ability of these water bodies to provide useful services in their current state. The index was then used to derive estimates of the monetary value of potential services in order to allow comparison with the cost of restoring the water body in question or to compare with other pit lakes. We present a South African case study to illustrate the method. As far as could be established, this is the first attempt towards creating a rapid assessment tool as standardised way of comparing pit lakes that allows for the ranking and identification of those pit lakes worthy of restoration. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. The effects of interventions targeting multiple health behaviors on smoking cessation outcomes: a rapid realist review protocol.

    Science.gov (United States)

    Minian, Nadia; deRuiter, Wayne K; Lingam, Mathangee; Corrin, Tricia; Dragonetti, Rosa; Manson, Heather; Taylor, Valerie H; Zawertailo, Laurie; Ebnahmady, Arezoo; Melamed, Osnat C; Rodak, Terri; Hahn, Margaret; Selby, Peter

    2018-03-01

    Health behaviors directly impact the health of individuals, and populations. Since individuals tend to engage in multiple unhealthy behaviors such as smoking, excessive alcohol use, physical inactivity, and eating an unhealthy diet simultaneously, many large community-based interventions have been implemented to reduce the burden of disease through the modification of multiple health behaviors. Smoking cessation can be particularly challenging as the odds of becoming dependent on nicotine increase with every unhealthy behavior a smoker exhibits. This paper presents a protocol for a rapid realist review which aims to identify factors associated with effectively changing tobacco use and target two or more additional unhealthy behaviors. An electronic literature search will be conducted using the following bibliographic databases: MEDLINE, Embase, PsycINFO, Cumulative Index to Nursing and Allied Health Literature (CINAHL), The Cochrane Library, Social Science Abstracts, Social Work Abstracts, and Web of Science. Two reviewers will screen titles and abstracts for relevant research, and the selected full papers will be used to extract data and assess the quality of evidence. Throughout this process, the rapid realist approach proposed by Saul et al., 2013 will be used to refine our initial program theory and identify contextual factors and mechanisms that are associated with successful multiple health behavior change. This review will provide evidence-based research on the context and mechanisms that may drive the success or failure of interventions designed to support multiple health behavior change. This information will be used to guide curriculum and program development for a government funded project on improving smoking cessation by addressing multiple health behaviors in people in Canada. PROSPERO CRD42017064430.

  4. RApid Primary care Initiation of Drug treatment for Transient Ischaemic Attack (RAPID-TIA): study protocol for a pilot randomised controlled trial.

    Science.gov (United States)

    Edwards, Duncan; Fletcher, Kate; Deller, Rachel; McManus, Richard; Lasserson, Daniel; Giles, Matthew; Sims, Don; Norrie, John; McGuire, Graham; Cohn, Simon; Whittle, Fiona; Hobbs, Vikki; Weir, Christopher; Mant, Jonathan

    2013-07-02

    People who have a transient ischaemic attack (TIA) or minor stroke are at high risk of a recurrent stroke, particularly in the first week after the event. Early initiation of secondary prevention drugs is associated with an 80% reduction in risk of stroke recurrence. This raises the question as to whether these drugs should be given before being seen by a specialist--that is, in primary care or in the emergency department. The aims of the RAPID-TIA pilot trial are to determine the feasibility of a randomised controlled trial, to analyse cost effectiveness and to ask: Should general practitioners and emergency doctors (primary care physicians) initiate secondary preventative measures in addition to aspirin in people they see with suspected TIA or minor stroke at the time of referral to a specialist? This is a pilot randomised controlled trial with a sub-study of accuracy of primary care physician diagnosis of TIA. In the pilot trial, we aim to recruit 100 patients from 30 general practices (including out-of-hours general practice centres) and 1 emergency department whom the primary care physician diagnoses with TIA or minor stroke and randomly assign them to usual care (that is, initiation of aspirin and referral to a TIA clinic) or usual care plus additional early initiation of secondary prevention drugs (a blood-pressure lowering protocol, simvastatin 40 mg and dipyridamole 200 mg m/r bd). The primary outcome of the main study will be the number of strokes at 90 days. The diagnostic accuracy sub-study will include these 100 patients and an additional 70 patients in whom the primary care physician thinks the diagnosis of TIA is possible, rather than probable. For the pilot trial, we will report recruitment rate, follow-up rate, a preliminary estimate of the primary event rate and occurrence of any adverse events. For the diagnostic study, we will calculate sensitivity and specificity of primary care physician diagnosis using the final TIA clinic diagnosis as the

  5. Gamma-H2AX biodosimetry for use in large scale radiation incidents: comparison of a rapid ‘96 well lyse/fix’ protocol with a routine method

    Directory of Open Access Journals (Sweden)

    Jayne Moquet

    2014-03-01

    Full Text Available Following a radiation incident, preliminary dose estimates made by γ-H2AX foci analysis can supplement the early triage of casualties based on clinical symptoms. Sample processing time is important when many individuals need to be rapidly assessed. A protocol was therefore developed for high sample throughput that requires less than 0.1 ml blood, thus potentially enabling finger prick sampling. The technique combines red blood cell lysis and leukocyte fixation in one step on a 96 well plate, in contrast to the routine protocol, where lymphocytes in larger blood volumes are typically separated by Ficoll density gradient centrifugation with subsequent washing and fixation steps. The rapid ‘96 well lyse/fix’ method reduced the estimated sample processing time for 96 samples to about 4 h compared to 15 h using the routine protocol. However, scoring 20 cells in 96 samples prepared by the rapid protocol took longer than for the routine method (3.1 versus 1.5 h at zero dose; 7.0 versus 6.1 h for irradiated samples. Similar foci yields were scored for both protocols and consistent dose estimates were obtained for samples exposed to 0, 0.2, 0.6, 1.1, 1.2, 2.1 and 4.3 Gy of 250 kVp X-rays at 0.5 Gy/min and incubated for 2 h. Linear regression coefficients were 0.87 ± 0.06 (R2 = 97.6% and 0.85 ± 0.05 (R2 = 98.3% for estimated versus actual doses for the routine and lyse/fix method, respectively. The lyse/fix protocol can therefore facilitate high throughput processing for γ-H2AX biodosimetry for use in large scale radiation incidents, at the cost of somewhat longer foci scoring times.

  6. USING ANT COMMUNITIES FOR RAPID ASSESSMENT OF TERRESTRIAL ECOSYSTEM HEALTH

    Energy Technology Data Exchange (ETDEWEB)

    Wike, L; Doug Martin, D; Michael Paller, M; Eric Nelson, E

    2007-01-12

    Ecosystem health with its near infinite number of variables is difficult to measure, and there are many opinions as to which variables are most important, most easily measured, and most robust, Bioassessment avoids the controversy of choosing which physical and chemical parameters to measure because it uses responses of a community of organisms that integrate all aspects of the system in question. A variety of bioassessment methods have been successfully applied to aquatic ecosystems using fish and macroinvertebrate communities. Terrestrial biotic index methods are less developed than those for aquatic systems and we are seeking to address this problem here. This study had as its objective to examine the baseline differences in ant communities at different seral stages from clear cut back to mature pine plantation as a precursor to developing a bioassessment protocol. Comparative sampling was conducted at four seral stages; clearcut, 5 year, 15 year and mature pine plantation stands. Soil and vegetation data were collected at each site. All ants collected were preserved in 70% ethyl alcohol and identified to genus. Analysis of the ant data indicates that ants respond strongly to the habitat changes that accompany ecological succession in managed pine forests and that individual genera as well as ant community structure can be used as an indicator of successional change. Ants exhibited relatively high diversity in both early and mature seral stages. High ant diversity in the mature seral stages was likely related to conditions on the forest floor which favored litter dwelling and cool climate specialists.

  7. DNAqua-Net: Developing new genetic tools for bioassessment and monitoring of aquatic ecosystems in Europe

    Directory of Open Access Journals (Sweden)

    Florian Leese

    2016-11-01

    Full Text Available The protection, preservation and restoration of aquatic ecosystems and their functions are of global importance. For European states it became legally binding mainly through the EU-Water Framework Directive (WFD. In order to assess the ecological status of a given water body, aquatic biodiversity data are obtained and compared to a reference water body. The quantified mismatch obtained determines the extent of potential management actions. The current approach to biodiversity assessment is based on morpho-taxonomy. This approach has many drawbacks such as being time consuming, limited in temporal and spatial resolution, and error-prone due to the varying individual taxonomic expertise of the analysts. Novel genomic tools can overcome many of the aforementioned problems and could complement or even replace traditional bioassessment. Yet, a plethora of approaches are independently developed in different institutions, thereby hampering any concerted routine application. The goal of this Action is to nucleate a group of researchers across disciplines with the task to identify gold-standard genomic tools and novel eco-genomic indices for routine application in biodiversity assessments of European fresh- and marine water bodies. Furthermore, DNAqua-Net will provide a platform for training of the next generation of European researchers preparing them for the new technologies. Jointly with water managers, politicians, and other stakeholders, the group will develop a conceptual framework for the standard application of eco-genomic tools as part of legally binding assessments.

  8. A Rapid and Reproducible Genomic DNA Extraction Protocol for Sequence-Based Identification of Archaea, Bacteria, Cyanobacteria, Diatoms, Fungi, and Green Algae

    OpenAIRE

    Farkhondeh Saba; Moslem Papizadeh; Javad Khansha; Mahshid Sedghi; Mehrnoosh Rasooli; Mohammad Ali Amoozegar; Mohammad Reza Soudi; Seyed Abolhassan Shahzadeh Fazeli

    2016-01-01

    Background:  Sequence-based identification of various microorganisms including Archaea, Bacteria, Cyanobacteria, Diatoms, Fungi, and green algae necessitates an efficient and reproducible genome extraction procedure though which a pure template DNA is yielded and it can be used in polymerase chain reactions (PCR). Considering the fact that DNA extraction from these microorganisms is time consuming and laborious, we developed and standardized a safe, rapid and inexpensive miniprep protocol. Me...

  9. The Resin-Embedded Cornea Prepared Via Rapid Processing Protocol : A Good Histomorphometric Target for Clinical Investigation in Ophthalmology and Optometry

    Science.gov (United States)

    Cheah, Pike See; Mohidin, Norhani; Mohd Ali, Bariah; Maung, Myint; Latif, Azian Abdul

    2008-01-01

    This study illustrates and quantifies the changes on corneal tissue between the paraffin-embedded and resin-embedded blocks and thus, selects a better target in investigational ophthalmology and optometry via light microscopy. Corneas of two cynomolgus monkeys (Macaca fascicularis) were used in this study. The formalin-fixed cornea was prepared in paraffin block via the conventional tissue processing protocol (4-day protocol) and stained with haematoxylin and eosin. The glutaraldehyde-fixed cornea was prepared in resin block via the rapid and modified tissue processing procedure (1.2-day protocol) and stained with toluidine blue. The paraffin-embedded sample exhibits various undesired tissue damage and artifact such as thinner epithelium (due to the substantial volumic extraction from the tissue), thicker stroma layer (due to the separation of lamellae and the presence of voids) and the distorted endothelium. In contrast, the resin-embedded corneal tissue has demonstrated satisfactory corneal ultrastructural preservation. The rapid and modified tissue processing method for preparing the resin-embedded is particularly beneficial to accelerate the microscopic evaluation in ophthalmology and optometry. PMID:22570589

  10. Rapid Bioavailability and Disposition protocol: A novel higher throughput approach to assess pharmacokinetics and steady-state brain distribution with reduced animal usage.

    Science.gov (United States)

    Fu, Tingting; Gao, Ruina; Scott-Stevens, Paul; Chen, Yan; Zhang, Chalmers; Wang, Jianfei; Summerfield, Scott; Liu, Houfu; Sahi, Jasminder

    2018-05-29

    Besides routine pharmacokinetic (PK) parameters, unbound brain-to-blood concentration ratio (K p,uu ) is an index particularly crucial in drug discovery for central nervous system (CNS) indications. Despite advantages of K p,uu from steady state after constant intravenous (i.v.) infusion compared with one- or multiple time points after transient dosing, it is seldom obtained for compound optimization in early phase of CNS drug discovery due to requirement of prerequisite PK data to inform the study design. Here, we designed a novel rat in vivo PK protocol, dubbed as Rapid Bioavailability and Disposition (RBD), which combined oral (p.o.) dosing and i.v. infusion to obtain steady-state brain penetration, along with blood clearance, oral exposure and oral bioavailability for each discovery compound, within a 24 hour in-life experiment and only a few (e.g., 3) animals. Protocol validity was verified through simulations with a range of PK parameters in compartmental models as well as data comparison for nine compounds with distinct PK profiles. PK parameters (K p,brain , CL b and oral AUC) measured from the RBD protocol for all compounds, were within two-fold and/or statistically similar to those derived from conventional i.v./p.o. crossover PK studies. Our data clearly indicates that the RBD protocol offers reliable and reproducible data over a wide range of PK properties, with reduced turnaround time and animal usage. Copyright © 2017. Published by Elsevier B.V.

  11. A Protocol for Rapid, Measurable Plant Tissue Culture Using Stem Disc Meristem Micropropagation of Garlic ("Allium Sativum L.")

    Science.gov (United States)

    Peat, Gerry; Jones, Meriel

    2012-01-01

    Plant tissue culture is becoming an important technique for the mass propagation of plants. Problems with existing techniques, such as slow growth and contamination, have restricted the practical work in plant tissue culture carried out in schools. The new protocol using garlic meristematic stem discs explained in this article addresses many of…

  12. Acute Postexercise Time Course Responses of Hypertrophic vs. Power-Endurance Squat Exercise Protocols on Maximal and Rapid Torque of the Knee Extensors.

    Science.gov (United States)

    Conchola, Eric C; Thiele, Ryan M; Palmer, Ty B; Smith, Doug B; Thompson, Brennan J

    2015-05-01

    The aim of this study was to examine the effects of a medium-intensity high-volume vs. explosive squat protocol on the postexercise time course responses of maximal and rapid strength of the knee extensors. Seventeen resistance-trained men (mean ± SD: age = 22.0 ± 2.6 years) performed maximal voluntary contractions (MVCs) of the knee extensors before and after performing a squat workout using either a low-intensity fast velocity (LIFV) (5 × 16 at 40% 1 repetition maximum) or a traditional high-intensity slow velocity (TISV) (5 × 8 at 80% 1RM) exercise protocol. For each MVC, peak torque (PT), peak rate of torque development (RTDpeak), absolute (RTDabs), and relative RTD (RTDnorm) at early (0-50 milliseconds) and late (100-200 milliseconds) phases of muscle contraction were examined at pre- (Pre) and post-exercise at 0, 7, 15, and 30 (Post0...30) minutes. There were no intensity × time interactions for any variables (p = 0.098-0.832). Peak torque was greater at Pre than Post0 and Post7 (p = 0.001-0.016) but was not greater than Post15 and Post30 (p = 0.010-0.189). RTDpeak and early absolute RTD (RTD50abs) were greater at Pre than all postexercise time phases (p = 0.001-0.050); however, later absolute RTD (RTD100-200abs) was only greater at Pre than Post0 and Post30 (p = 0.013-0.048). Early relative RTD (RTD50norm) was only higher at Pre compared with Post0 (p = 0.023), whereas no differences were observed for later relative RTD (RTD100-200norm) (p = 0.920-0.990). Low-intensity fast velocity and TISV squat protocols both yielded acute decreases in maximal and rapid strength capacities following free-weight squats, with rapid strength showing slower recovery characteristics than maximal strength.

  13. Evaluation of a transposase protocol for rapid generation of shotgun high-throughput sequencing libraries from nanogram quantities of DNA.

    Science.gov (United States)

    Marine, Rachel; Polson, Shawn W; Ravel, Jacques; Hatfull, Graham; Russell, Daniel; Sullivan, Matthew; Syed, Fraz; Dumas, Michael; Wommack, K Eric

    2011-11-01

    Construction of DNA fragment libraries for next-generation sequencing can prove challenging, especially for samples with low DNA yield. Protocols devised to circumvent the problems associated with low starting quantities of DNA can result in amplification biases that skew the distribution of genomes in metagenomic data. Moreover, sample throughput can be slow, as current library construction techniques are time-consuming. This study evaluated Nextera, a new transposon-based method that is designed for quick production of DNA fragment libraries from a small quantity of DNA. The sequence read distribution across nine phage genomes in a mock viral assemblage met predictions for six of the least-abundant phages; however, the rank order of the most abundant phages differed slightly from predictions. De novo genome assemblies from Nextera libraries provided long contigs spanning over half of the phage genome; in four cases where full-length genome sequences were available for comparison, consensus sequences were found to match over 99% of the genome with near-perfect identity. Analysis of areas of low and high sequence coverage within phage genomes indicated that GC content may influence coverage of sequences from Nextera libraries. Comparisons of phage genomes prepared using both Nextera and a standard 454 FLX Titanium library preparation protocol suggested that the coverage biases according to GC content observed within the Nextera libraries were largely attributable to bias in the Nextera protocol rather than to the 454 sequencing technology. Nevertheless, given suitable sequence coverage, the Nextera protocol produced high-quality data for genomic studies. For metagenomics analyses, effects of GC amplification bias would need to be considered; however, the library preparation standardization that Nextera provides should benefit comparative metagenomic analyses.

  14. One-day pulsed-field gel electrophoresis protocol for rapid determination of emetic Bacillus cereus isolates.

    Science.gov (United States)

    Kaminska, Paulina S; Fiedoruk, Krzysztof; Jankowska, Dominika; Mahillon, Jacques; Nowosad, Karol; Drewicka, Ewa; Zambrzycka, Monika; Swiecicka, Izabela

    2015-04-01

    Bacillus cereus, the Gram-positive and spore-forming ubiquitous bacterium, may cause emesis as the result of food intoxication with cereulide, a heat-stable emetic toxin. Rapid determination of cereulide-positive B. cereus isolates is of highest importance due to consequences of this intoxication for human health and life. Here we present a 1-day pulsed-field gel electrophoresis for emetic B. cereus isolates, which allows rapid and efficient determination of their genomic relatedness and helps determining the source of intoxication in case of outbreaks caused by these bacilli. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. Diagnostic value of a new myocardial perfusion agent, teboroxime (SO 30,217), utilizing a rapid planar imaging protocol: Preliminary results

    International Nuclear Information System (INIS)

    Hendel, R.C.; McSherry, B.; Karimeddini, M.; Leppo, J.A.

    1990-01-01

    Technetium-99m-labeled agents have advantages over thallium-201 in terms of photon statistics, cost and clinical availability. They have been suggested as an alternative to thallium for myocardial perfusion imaging. Teboroxime is a new boronic acid adduct of technetium dioxime (BATO) compound that demonstrates favorable characteristics in preliminary studies. With use of a novel (seated) patient positioning technique and a rapid dynamic acquisition protocol, 30 patients underwent planar imaging with teboroxoime while at rest and after maximal treadmill exercise. Postexercise scans were completed in an average time (mean +/- SD) of 4.4 +/- 1.6 min, with 4.8 +/- 1.5 min for the views at rest. These results were compared with coronary arteriography or thallium scintigraphy after treadmill exercise, or both. Diagnostic agreement (abnormal versus normal) was present in 28 of the 30 patients (p less than 0.001). Regarding physiologic assessment as compared with thallium scintigraphy, the finding of infarction and ischemia was concordant in 89% and 86% of patients, respectively. This report describes the initial use of teboroxime with a rapid dynamic planar imaging technique, resulting in a high correlation with exercise thallium scintigraphy. Delayed postexercise images obtained 5 to 10 min after exercise demonstrated rapid disappearance of exercise-induced defects noted on the initial (0 to 5 min) postexercise views. The rapid differential washout with teboroxime has not been previously described and the possible clinical significance is discussed

  16. Rapid assessment of visual impairment (RAVI in marine fishing communities in South India - study protocol and main findings

    Directory of Open Access Journals (Sweden)

    Madala Sreenivas R

    2011-09-01

    Full Text Available Abstract Background Reliable data are a pre-requisite for planning eye care services. Though conventional cross sectional studies provide reliable information, they are resource intensive. A novel rapid assessment method was used to investigate the prevalence and causes of visual impairment and presbyopia in subjects aged 40 years and older. This paper describes the detailed methodology and study procedures of Rapid Assessment of Visual Impairment (RAVI project. Methods A population-based cross-sectional study was conducted using cluster random sampling in the coastal region of Prakasam district of Andhra Pradesh in India, predominantly inhabited by fishing communities. Unaided, aided and pinhole visual acuity (VA was assessed using a Snellen chart at a distance of 6 meters. The VA was re-assessed using a pinhole, if VA was Results The data collection was completed in Conclusion There is a high prevalence of visual impairment in marine fishing communities in Prakasam district in India. The data from this rapid assessment survey can now be used as a baseline to start eye care services in this region. The rapid assessment methodology (RAVI reported in this paper is robust, quick and has the potential to be replicated in other areas.

  17. Mapping of Schistosomiasis and Soil-Transmitted Helminths in Namibia: The First Large-Scale Protocol to Formally Include Rapid Diagnostic Tests.

    Directory of Open Access Journals (Sweden)

    José Carlos Sousa-Figueiredo

    Full Text Available Namibia is now ready to begin mass drug administration of praziquantel and albendazole against schistosomiasis and soil-transmitted helminths, respectively. Although historical data identifies areas of transmission of these neglected tropical diseases (NTDs, there is a need to update epidemiological data. For this reason, Namibia adopted a new protocol for mapping of schistosomiasis and geohelminths, formally integrating rapid diagnostic tests (RDTs for infections and morbidity. In this article, we explain the protocol in detail, and introduce the concept of 'mapping resolution', as well as present results and treatment recommendations for northern Namibia.This new protocol allowed a large sample to be surveyed (N = 17,896 children from 299 schools at relatively low cost (7 USD per person mapped and very quickly (28 working days. All children were analysed by RDTs, but only a sub-sample was also diagnosed by light microscopy. Overall prevalence of schistosomiasis in the surveyed areas was 9.0%, highly associated with poorer access to potable water (OR = 1.5, P<0.001 and defective (OR = 1.2, P<0.001 or absent sanitation infrastructure (OR = 2.0, P<0.001. Overall prevalence of geohelminths, more particularly hookworm infection, was 12.2%, highly associated with presence of faecal occult blood (OR = 1.9, P<0.001. Prevalence maps were produced and hot spots identified to better guide the national programme in drug administration, as well as targeted improvements in water, sanitation and hygiene. The RDTs employed (circulating cathodic antigen and microhaematuria for Schistosoma mansoni and S. haematobium, respectively performed well, with sensitivities above 80% and specificities above 95%.This protocol is cost-effective and sensitive to budget limitations and the potential economic and logistical strains placed on the national Ministries of Health. Here we present a high resolution map of disease prevalence levels, and treatment regimens are

  18. Rapid survey protocol that provides dynamic information on reef condition to managers of the Great Barrier Reef.

    Science.gov (United States)

    Beeden, R J; Turner, M A; Dryden, J; Merida, F; Goudkamp, K; Malone, C; Marshall, P A; Birtles, A; Maynard, J A

    2014-12-01

    Managing to support coral reef resilience as the climate changes requires strategic and responsive actions that reduce anthropogenic stress. Managers can only target and tailor these actions if they regularly receive information on system condition and impact severity. In large coral reef areas like the Great Barrier Reef Marine Park (GBRMP), acquiring condition and impact data with good spatial and temporal coverage requires using a large network of observers. Here, we describe the result of ~10 years of evolving and refining participatory monitoring programs used in the GBR that have rangers, tourism operators and members of the public as observers. Participants complete Reef Health and Impact Surveys (RHIS) using a protocol that meets coral reef managers' needs for up-to-date information on the following: benthic community composition, reef condition and impacts including coral diseases, damage, predation and the presence of rubbish. Training programs ensure that the information gathered is sufficiently precise to inform management decisions. Participants regularly report because the demands of the survey methodology have been matched to their time availability. Undertaking the RHIS protocol we describe involves three ~20 min surveys at each site. Participants enter data into an online data management system that can create reports for managers and participants within minutes of data being submitted. Since 2009, 211 participants have completed a total of more than 10,415 surveys at more than 625 different reefs. The two-way exchange of information between managers and participants increases the capacity to manage reefs adaptively, meets education and outreach objectives and can increase stewardship. The general approach used and the survey methodology are both sufficiently adaptable to be used in all reef regions.

  19. Rapid bioassessment methods for assessing vegetation toxicity at the Savannah River Site - germination tests and root elongation trials

    Energy Technology Data Exchange (ETDEWEB)

    Specht, W.L.; Klaine, S.J.; Hook, D.D. [and others

    1996-01-01

    Plants form the basis of all ecosystems including wetlands. Although they are the most abundant life form and are the primary producers for all other organisms, they have received the least attention when it comes to environmental matters. Higher plants have rarely been used in ecotoxicity testing and may not respond in the same manner as algae, which have been used more frequently. The introduction of hazardous waste materials into wetland areas has the potential to alter and damage the ecological processes in these ecosystems. Measuring the impact of these contaminants on higher plants is therefore important and needs further research. Higher plants are useful for detecting both herbicidal toxicity and heavy metal toxicity. For phytotoxicity tests to be practical they must be simple, inexpensive, yet sensitive to a variety of contaminants. A difference between seed germination and root elongation tests is that seed germination tests measure toxicity associated with soils directly, while root elongation tests consider the indirect effects of water-soluble constituents that may be present in site samples.

  20. Treatment of skeletal class III malocclusion using face mask therapy with alternate rapid maxillary expansion and constriction (Alt-RAMEC protocol

    Directory of Open Access Journals (Sweden)

    Anand Ramchandra Rathi

    2015-01-01

    Full Text Available Class III malocclusion is very common malocclusion and can be due to maxillary retrusion, mandibular prognathism, or combination. Ellis and McNamara found a combination of maxillary retrusion and mandibular protrusion to be the most common skeletal relationship (30%. The treatment should be carried out as early as possible for permitting normal growth of the skeletal bases. Reverse pull head gear combined with maxillary expansion can effectively correct skeletal Class III malocclusion due to maxillary deficiency in growing patient. An eight-year-old female patient with chief complaint of prognathic mandible and anterior crossbite was successfully treated in duration of 5 months with facemask and expansion therapy based on Alternate Rapid Maxillary Expansion and Constriction (Alt-RAMEC protocol.

  1. Protocol for validation of the 4AT, a rapid screening tool for delirium: a multicentre prospective diagnostic test accuracy study.

    Science.gov (United States)

    Shenkin, Susan D; Fox, Christopher; Godfrey, Mary; Siddiqi, Najma; Goodacre, Steve; Young, John; Anand, Atul; Gray, Alasdair; Smith, Joel; Ryan, Tracy; Hanley, Janet; MacRaild, Allan; Steven, Jill; Black, Polly L; Boyd, Julia; Weir, Christopher J; MacLullich, Alasdair Mj

    2018-02-10

    Delirium is a severe neuropsychiatric syndrome of rapid onset, commonly precipitated by acute illness. It is common in older people in the emergency department (ED) and acute hospital, but greatly under-recognised in these and other settings. Delirium and other forms of cognitive impairment, particularly dementia, commonly coexist. There is a need for a rapid delirium screening tool that can be administered by a range of professional-level healthcare staff to patients with sensory or functional impairments in a busy clinical environment, which also incorporates general cognitive assessment. We developed the 4 'A's Test (4AT) for this purpose. This study's primary objective is to validate the 4AT against a reference standard. Secondary objectives include (1) comparing the 4AT with another widely used test (the Confusion Assessment Method (CAM)); (2) determining if the 4AT is sensitive to general cognitive impairment; (3) assessing if 4AT scores predict outcomes, including (4) a health economic analysis. 900 patients aged 70 or over in EDs or acute general medical wards will be recruited in three sites (Edinburgh, Bradford and Sheffield) over 18 months. Each patient will undergo a reference standard delirium assessment and will be randomised to assessment with either the 4AT or the CAM. At 12 weeks, outcomes (length of stay, institutionalisation and mortality) and resource utilisation will be collected by a questionnaire and via the electronic patient record. Ethical approval was granted in Scotland and England. The study involves administering tests commonly used in clinical practice. The main ethical issues are the essential recruitment of people without capacity. Dissemination is planned via publication in high impact journals, presentation at conferences, social media and the website www.the4AT.com. ISRCTN53388093; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial

  2. A Rapid and Reproducible Genomic DNA Extraction Protocol for Sequence-Based Identification of Archaea, Bacteria, Cyanobacteria, Diatoms, Fungi, and Green Algae

    Directory of Open Access Journals (Sweden)

    Farkhondeh Saba

    2017-01-01

    Full Text Available Background:  Sequence-based identification of various microorganisms including Archaea, Bacteria, Cyanobacteria, Diatoms, Fungi, and green algae necessitates an efficient and reproducible genome extraction procedure though which a pure template DNA is yielded and it can be used in polymerase chain reactions (PCR. Considering the fact that DNA extraction from these microorganisms is time consuming and laborious, we developed and standardized a safe, rapid and inexpensive miniprep protocol. Methods:  According to our results, amplification of various genomic regions including SSU, LSU, ITS, β-tubulin, actin, RPB2, and EF-1 resulted in a reproducible and efficient DNA extraction from a wide range of microorganisms yielding adequate pure genomic material for reproducible PCR-amplifications. Results:   This method relies on a temporary shock of increased concentrations of detergent which can be applied concomitant with multiple freeze-thaws to yield sufficient amount of DNA for PCR amplification of multiple or single fragments(s of the genome. As an advantage, the recipe seems very flexible, thus, various optional steps can be included depending on the samples used.Conclusion:   Having the needed flexibility in each step, this protocol is applicable on a very wide range of samples. Hence, various steps can be included depending on the desired quantity and quality.

  3. A Rapid and Reproducible Genomic DNA Extraction Protocol for Sequence-Based Identification of Archaea, Bacteria, Cyanobacteria, Diatoms, Fungi, and Green Algae

    Directory of Open Access Journals (Sweden)

    Farkhondeh Saba

    2016-09-01

    Full Text Available Background:  Sequence-based identification of various microorganisms including Archaea, Bacteria, Cyanobacteria, Diatoms, Fungi, and green algae necessitates an efficient and reproducible genome extraction procedure though which a pure template DNA is yielded and it can be used in polymerase chain reactions (PCR. Considering the fact that DNA extraction from these microorganisms is time consuming and laborious, we developed and standardized a safe, rapid and inexpensive miniprep protocol. Methods:  According to our results, amplification of various genomic regions including SSU, LSU, ITS, β-tubulin, actin, RPB2, and EF-1 resulted in a reproducible and efficient DNA extraction from a wide range of microorganisms yielding adequate pure genomic material for reproducible PCR-amplifications. Results:   This method relies on a temporary shock of increased concentrations of detergent which can be applied concomitant with multiple freeze-thaws to yield sufficient amount of DNA for PCR amplification of multiple or single fragments(s of the genome. As an advantage, the recipe seems very flexible, thus, various optional steps can be included depending on the samples used.Conclusion:   Having the needed flexibility in each step, this protocol is applicable on a very wide range of samples. Hence, various steps can be included depending on the desired quantity and quality.

  4. Determination of hydrazine in drinking water: Development and multivariate optimization of a rapid and simple solid phase microextraction-gas chromatography-triple quadrupole mass spectrometry protocol.

    Science.gov (United States)

    Gionfriddo, Emanuela; Naccarato, Attilio; Sindona, Giovanni; Tagarelli, Antonio

    2014-07-04

    In this work, the capabilities of solid phase microextraction were exploited in a fully optimized SPME-GC-QqQ-MS analytical approach for hydrazine assay. A rapid and easy method was obtained by a simple derivatization reaction with propyl chloroformate and pyridine carried out directly in water samples, followed by automated SPME analysis in the same vial without further sample handling. The affinity of the different derivatized compounds obtained towards five commercially available SPME coatings was evaluated, in order to achieve the best extraction efficiency. GC analyses were carried out using a GC-QqQ-MS instrument in selected reaction monitoring (SRM) acquisition mode which has allowed the achievement of high specificity by selecting appropriate precursor-product ion couples improving the capability in analyte identification. The multivariate approach of experimental design was crucial in order to optimize derivatization reaction, SPME process and tandem mass spectrometry parameters. Accuracy of the proposed protocol, tested at 60, 200 and 800 ng L(-1), provided satisfactory values (114.2%, 83.6% and 98.6%, respectively), whereas precision (RSD%) at the same concentration levels were of 10.9%, 7.9% and 7.7% respectively. Limit of detection and quantification of 4.4 and 8.3 ng L(-1) were obtained. The reliable application of the proposed protocol to real drinking water samples confirmed its capability to be used as analytical tool for routine analyses. Copyright © 2014 Elsevier B.V. All rights reserved.

  5. Rapid magnetic resonance imaging protocol for detecting femoral head avascular necrosis: A case series-it′s utility in the general population in developing countries

    Directory of Open Access Journals (Sweden)

    M Sanjay Khaladkar

    2015-01-01

    Full Text Available Introduction: Osteonecrosis of the femoral head is an increasing cause of musculoskeletal disability, common among the younger population, between the third and fifth decade of life, affecting mainly men, thereby requiring prompt diagnosis and early intervention. Aims and Objectives: The aim was to formulate a limited magnetic resonance imaging (MRI examination protocol for detection of avascular necrosis (AVN in clinically suspected cases that can be performed rapidly and will be inexpensive. Materials and Methods: Forty-five patients suspected clinically and or on conventional radiography for AVN of the femoral head were referred for MRI hip. MRI hip was done on 1.5 T Siemens Avanto. Of 45, 36 were detected to have AVN (total 58 hips, whereas 9 did not have AVN on MRI. Initially, coronal T1-weighted image (T1WI sequence was obtained as limited MRI protocol, followed by complete MRI examination. Results: Maximum patients belonged to age group 31-40 (30.5%. 32 (88.88% patients were males and 4 (11.11% were females. Bilateral AVN was detected in 44 (61.1% and unilateral in 14 patients (38.8%. Pre collapsed stage (Stages I and II was detected in 18 hips (31.03%, collapsed stage (Stages III and IV was detected in 40 hips (68.9%. Peripheral low-intensity rim was seen on T1WI in all 58 cases of AVN. Double line sign on T2-weighted image was seen in 33/58 (56.8%. Conclusion: Our study concluded that coronal T1W sequence is an easy, rapid and cost-effective method of detecting unilateral or bilateral AVN.

  6. Application of Some Biometric Indices in the Assessment of the ...

    African Journals Online (AJOL)

    Application of Some Biometric Indices in the Assessment of the Water Quality of the Benin River, Niger Delta, Nigeria. ... Username, Password, Remember me, or Register ... Rapid Bioassessment Protocols (RBP) using some biometric indices ...

  7. Biological Assessment of Streams Associated with the Northern Training Complex at Fort knox, Kentucky, August 2000

    National Research Council Canada - National Science Library

    Payne, Berry

    2001-01-01

    .... The benthic macroinvertebrate aspect of the U.S. Environmental Protection Agency's Rapid Bioassessment Protocol was applied in August 2000 to selected streams likely to be affected by proposed improvements of training facilities on Fort Knox...

  8. Development of a rapid and simplified protocol for direct bacterial identification from positive blood cultures by using matrix assisted laser desorption ionization time-of- flight mass spectrometry.

    Science.gov (United States)

    Jakovljev, Aleksandra; Bergh, Kåre

    2015-11-06

    Bloodstream infections represent serious conditions carrying a high mortality and morbidity rate. Rapid identification of microorganisms and prompt institution of adequate antimicrobial therapy is of utmost importance for a successful outcome. Aiming at the development of a rapid, simplified and efficient protocol, we developed and compared two in-house preparatory methods for the direct identification of bacteria from positive blood culture flasks (BD BACTEC FX system) by using matrix-assisted laser desorption ionization time-of-flight mass spectrometry (MALDI TOF MS). Both methods employed saponin and distilled water for erythrocyte lysis. In method A the cellular pellet was overlaid with formic acid on the MALDI TOF target plate for protein extraction, whereas in method B the pellet was exposed to formic acid followed by acetonitrile prior to placing on the target plate. Best results were obtained by method A. Direct identification was achieved for 81.9 % and 65.8 % (50.3 % and 26.2 % with scores >2.0) of organisms by method A and method B, respectively. Overall concordance with final identification was 100 % to genus and 97.9 % to species level. By applying a lower cut-off score value, the levels of identification obtained by method A and method B increased to 89.3 % and 77.8 % of organisms (81.9 % and 65.8 % identified with scores >1.7), respectively. Using the lowered score criteria, concordance with final results was obtained for 99.3 % of genus and 96.6 % of species identifications. The reliability of results, rapid performance (approximately 25 min) and applicability of in-house method A have contributed to implementation of this robust and cost-effective method in our laboratory.

  9. The efficacy of maxillary protraction protocols with the micro-implant-assisted rapid palatal expander (MARPE) and the novel N2 mini-implant-a finite element study.

    Science.gov (United States)

    Moon, Won; Wu, Kimberley W; MacGinnis, Matthew; Sung, Jay; Chu, Howard; Youssef, George; Machado, Andre

    2015-01-01

    Maxillary protraction with the novel N2 mini-implant- and micro-implant-assisted rapid palatal expander (MARPE) can potentially provide significant skeletal effects without surgery, even in older patients where conventional facemask therapy has limited skeletal effects. However, the skeletal effects of altering the location and direction of force from mini-implant-assisted maxillary protraction have not been extensively analyzed. In this study, the application of the novel N2 mini-implant as an orthopedic anchorage device is explored in its ability to treat patients with class III malocclusions. A 3D cranial mesh model with associated sutures was developed from CT images and Mimics modeling software. Utilizing ANSYS simulation software, protraction forces were applied at different locations and directions to simulate conventional facemask therapy and seven maxillary protraction protocols utilizing the novel N2 mini-implant. Stress distribution and displacement were analyzed. Video animations and superimpositions were created. By changing the vector of force and location of N2 mini-implant, the maxilla was displaced differentially. Varying degrees of forward, downward, and rotational movements were observed in each case. For brachyfacial patients, anterior micro-implant-supported protraction at -45° or intermaxillary class III elastics at -45° are recommended. For dolicofacial patients, either anterior micro-implants at -15° or an intermaxillary spring at +30° is recommended. For mesofacial patients with favorable vertical maxillary position, palatal micro-implants at -30° are recommended; anterior micro-implants at -30° are preferred for shallow bites. For patients with a severe mid-facial deficiency, intermaxillary class III elastics at -30° are most effective in promoting anterior growth of the maxilla. By varying the location of N2 mini-implants and vector of class III mechanics, clinicians can differentially alter the magnitude of forward, downward, and

  10. Insights into bioassessment of marine pollution using body-size distinctness of planktonic ciliates based on a modified trait hierarchy.

    Science.gov (United States)

    Xu, Henglong; Jiang, Yong; Xu, Guangjian

    2016-06-15

    Based on a modified trait hierarchy of body-size units, the feasibility for bioassessment of water pollution using body-size distinctness of planktonic ciliates was studied in a semi-enclosed bay, northern China. An annual dataset was collected at five sampling stations within a gradient of heavy metal contaminants. Results showed that: (1) in terms of probability density, the body-size spectra of the ciliates represented significant differences among the five stations; (2) bootstrap average analysis demonstrated a spatial variation in body-size rank patterns in response to pollution stress due to heavy metals; and (3) the average body-size distinctness (Δz(+)) and variation in body-size distinctness (Λz(+)), based on the modified trait hierarchy, revealed a clear departure pattern from the expected body-size spectra in areas with pollutants. These results suggest that the body-size diversity measures based on the modified trait hierarchy of the ciliates may be used as a potential indicator of marine pollution. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. A rapid tattoo removal technique using a combination of pulsed Er:YAG and Q-Switched Nd:YAG in a split lesion protocol.

    Science.gov (United States)

    Sardana, Kabir; Ranjan, Rashmi; Kochhar, Atul M; Mahajan, Khushbu Goel; Garg, Vijay K

    2015-01-01

    Tattoo removal has evolved over the years and though Q-switched laser is the 'workhorse' laser, it invariably requires multiple sittings, which are dependent on numerous factors, including the skin colour, location of the tattoo, age of the tattoo, colour of pigment used, associated fibrosis and the kind of tattoo treated. Though ablative lasers, both pulsed CO2 and Er:YAG, have been used for recalcitrant tattoos, very few studies have been done comparing them with pigment-specific lasers. Our study was based on the premise that ablating the epidermis overlying the tattoo pigment with Er:YAG could help in gaining better access to the pigment which would enable the Q-switched laser to work effectively with less beam scattering. A study of rapid tattoo removal (RTR) technique using a combination of pulsed Er:YAG and Q-Switched Nd:YAG in a split lesion protocol. This prospective study was undertaken during 2010-13 at a laser Clinic in the Maulana Azad Medical College, New Delhi. A total of 10 patients were recruited, 5 of amateur tattoo and 5 of professional tattoo. After informed consent each tattoo was arbitrarily 'split' into two parts. One part was treated with QS Nd:YAG laser(1064 nm) and the other part with Er:YAG laser immediately followed by the QS Nd:YAG. The laser treatments were repeated at 6-week intervals until the tattoo pigment had cleared. On the combination side in subsequent sittings only the QS Nd:YAG was used, to minimize repetitive ablation. To ensure consistency in the intervention methods a trained dermatologist who was independent of the treatment delivery randomly rated 10% of the procedures. The mean improvement achieved by the Q-switched laser (2.93) was less than the combination laser (3.85) side (p = 0.001) and needed more sessions (3.8 vs. 1.6; p = 0.001). There was a statistically significant difference in the improvement on the combination side till the second session. On the combination side patients required a maximum of 2 sessions

  12. Effect of Rapid Maxillary Expansion on Glenoid Fossa and Condyle-Fossa Relationship in Growing Patients (MEGP): Study Protocol for a Controlled Clinical Trial

    Science.gov (United States)

    Ghoussoub, Mona Sayegh; Rifai, Khaldoun; Garcia, Robert; Sleilaty, Ghassan

    2018-01-01

    Aims and Objectives: Rapid maxillary expansion (RME) is an orthodontic nonsurgical procedure aiming at increasing the width of the maxilla by opening mainly the intermaxillary suture in patients presenting a transverse maxillary skeletal deficiency. The objectives of the current prospective controlled clinical and radiographic study are to evaluate the hypothesis that RME in growing patients will result in radiographic changes at the level of interglenoid fossa distance, condyle-fossa relationship, and nasal cavity widths compared to the group who received no treatment initially and served as untreated control. Materials and Methods: In this prospective controlled clinical and radiographic study, forty healthy growing patients selected from a school-based population following a large screening campaign, ranging in age between 8 and 13 years, presenting a maxillary constriction with bilateral crossbite, and candidates for RME are being recruited. The first group will include participants willing to undergo treatment (n = 25) and the other group will include those inclined to postpone (n = 15). Results: The primary outcome is to compare radiologically the interglenoid fossa distance and the condyle-fossa relationship; nasal cavity width will be a secondary outcome. A multivariable analysis of Covariance model will be used, with the assessment of the time by group interaction, using age as covariate. The project protocol was reviewed and approved by the Ethics Committee of the Lebanese University, National Institute in Lebanon (CUEMB process number 31/04/2015). The study is funded by the Lebanese University and Centre National de Recherche Scientifique, Lebanon (Number: 652 on 14/04/2016). Conclusion: This prospective controlled clinical trial will give information about the effect of RME on the glenoid fossa and condyle-fossa relationship and its impact on the nasal cavity width. Trial Registration: Retrospectively registered in BioMed Central (DOI10.1186/ISRCTN

  13. Development of an improved rapid BACpro® protocol and a method for direct identification from blood-culture-positive bottles using matrix-assisted laser desorption ionization time-of-flight mass spectrometry.

    Science.gov (United States)

    Yonezawa, Takatoshi; Watari, Tomohisa; Ashizawa, Kazuho; Hanada, Daisuke; Yanagiya, Takako; Watanabe, Naoki; Terada, Takashi; Tomoda, Yutaka; Fujii, Satoshi

    2018-05-01

    Matrix-assisted laser desorption ionization time-of-flight mass spectrometry (MALDI-TOF MS) has been incorporated into pathogenic bacterial identification methods and has improved their rapidity. Various methods have been reported to directly identify bacteria with MALDI-TOF MS by pretreating culture medium in blood culture bottles. Rapid BACpro® (Nittobo Medical Co., Ltd.) is a pretreatment kit for effective collection of bacteria with cationic copolymers. However, the Rapid BACpro® pretreatment kit is adapted only for MALDI Biotyper (Bruker Daltonics K.K.), and there has been a desire to expand its use to VITEK MS (VMS; bioMerieux SA). We improved the protocol and made it possible to analyze with VMS. The culture medium bacteria collection method was changed to a method with centrifugation after hemolysis using saponin; the cationic copolymer concentration was changed to 30% of the original concentration; the sequence with which reagents were added was changed; and a change was made to an ethanol/formic acid extraction method. The improved protocol enhanced the identification performance. When VMS was used, the identification rate was 100% with control samples. With clinical samples, the identification agreement rate with the cell smear method was 96.3%. The improved protocol is effective in blood culture rapid identification, being both simpler and having an improved identification performance compared with the original. Copyright © 2018 Elsevier B.V. All rights reserved.

  14. In vitro bioassessment of the immunomodulatory activity of Saccharomyces cerevisiae components using bovine macrophages and Mycobacterium avium ssp. paratuberculosis.

    Science.gov (United States)

    Li, Z; Kang, H; You, Q; Ossa, F; Mead, P; Quinton, M; Karrow, N A

    2018-04-11

    The yeast Saccharomyces cerevisiae and its components are used for the prevention and treatment of enteric disease in different species; therefore, they may also be useful for preventing Johne's disease, a chronic inflammatory bowel disease of ruminants caused by Mycobacterium avium ssp. paratuberculosis (MAP). The objective of this study was to identify potential immunomodulatory S. cerevisiae components using a bovine macrophage cell line (BOMAC). The BOMAC phagocytic activity, reactive oxygen species production, and immune-related gene (IL6, IL10, IL12p40, IL13, IL23), transforming growth factor β, ARG1, CASP1, and inducible nitric oxide synthase expression were investigated when BOMAC were cocultured with cell wall components from 4 different strains (A, B, C, and D) and 2 forms of dead yeast from strain A. The BOMAC phagocytosis of mCherry-labeled MAP was concentration-dependently attenuated when BOMAC were cocultured with yeast components for 6 h. Each yeast derivative also induced a concentration-dependent increase in BOMAC reactive oxygen species production after a 6-h exposure. In addition, BOMAC mRNA expression of the immune-related genes was investigated after 6 and 24 h of exposure to yeast components. All yeast components were found to regulate the immunomodulatory genes of BOMAC; however, the response varied among components and over time. The in vitro bioassessment studies reported here suggest that dead yeast and its cell wall components may be useful for modulating macrophage function before or during MAP infection. Copyright © 2018 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  15. Evaluation of the Implementation of a Rapid Response Treatment Protocol for Patients with Acute Onset Stroke: Can We Increase the Number of Patients Treated and Shorten the Time Needed

    Directory of Open Access Journals (Sweden)

    Rajiv Advani

    2014-06-01

    Full Text Available Aims: This study aims to evaluate the implementation of a rapid response treatment protocol for patients presenting with acute onset ischemic stroke. Improvements of routines surrounding the admission and treatment of patients with intravenous thrombolysis (IVT, such as door-to-needle (DTN times, and increasing the numbers of patients treated are discussed. Methods: We conducted a retrospective analysis of all patients (n = 320 treated with IVT for acute onset ischemic stroke at the Stavanger University Hospital, Norway, between 2003 and 2012. In 2009, a succession of changes to pre- and intra-hospital routines were made as well as an improvement in the education of primary health care physicians, nurses and paramedics involved in the treatment of acute onset stroke patients (rapid response treatment protocol. Analyses of DTN times, onset-to-needle times and the number of patients treated per year were carried out to ascertain the effect of the changes made. The primary aim was to analyze DTN times to look for any changes, and the secondary aim was to analyze changes in the number of patients treated per year. Results: In the years after the implementation of the rapid treatment protocol, we saw an improvement in the median DTN time with a decrease from 73 to 50 min in the first year (p = 0.03, a decrease of 45 min in the second year (p = 0.01 and a decrease of 31 min in the third year (p Conclusions: The implementation of the rapid treatment protocol for acute onset ischemic stroke patients led to a significant decrease in the DTN time at our center. These improvements also produced an increase in the number of patients treated per year. The extension of the therapeutic window from 3 to 4.5 h for the use of intravenous recombinant tissue plasminogen activator also played a role in the increased treatment numbers.

  16. RApid Primary care Initiation of Drug treatment for Transient Ischaemic Attack (RAPID−TIA): study protocol for a pilot randomised controlled trial

    Science.gov (United States)

    2013-01-01

    Background People who have a transient ischaemic attack (TIA) or minor stroke are at high risk of a recurrent stroke, particularly in the first week after the event. Early initiation of secondary prevention drugs is associated with an 80% reduction in risk of stroke recurrence. This raises the question as to whether these drugs should be given before being seen by a specialist – that is, in primary care or in the emergency department. The aims of the RAPID-TIA pilot trial are to determine the feasibility of a randomised controlled trial, to analyse cost effectiveness and to ask: Should general practitioners and emergency doctors (primary care physicians) initiate secondary preventative measures in addition to aspirin in people they see with suspected TIA or minor stroke at the time of referral to a specialist? Methods/Design This is a pilot randomised controlled trial with a sub-study of accuracy of primary care physician diagnosis of TIA. In the pilot trial, we aim to recruit 100 patients from 30 general practices (including out-of-hours general practice centres) and 1 emergency department whom the primary care physician diagnoses with TIA or minor stroke and randomly assign them to usual care (that is, initiation of aspirin and referral to a TIA clinic) or usual care plus additional early initiation of secondary prevention drugs (a blood-pressure lowering protocol, simvastatin 40 mg and dipyridamole 200 mg m/r bd). The primary outcome of the main study will be the number of strokes at 90 days. The diagnostic accuracy sub-study will include these 100 patients and an additional 70 patients in whom the primary care physician thinks the diagnosis of TIA is possible, rather than probable. For the pilot trial, we will report recruitment rate, follow-up rate, a preliminary estimate of the primary event rate and occurrence of any adverse events. For the diagnostic study, we will calculate sensitivity and specificity of primary care physician diagnosis using the final

  17. Matrix-assisted laser desorption/ionization-time of flight mass spectrometry: protocol standardization and database expansion for rapid identification of clinically important molds.

    Science.gov (United States)

    Paul, Saikat; Singh, Pankaj; Rudramurthy, Shivaprakash M; Chakrabarti, Arunaloke; Ghosh, Anup K

    2017-12-01

    To standardize the matrix-assisted laser desorption ionization-time of flight mass spectrometry protocols and expansion of existing Bruker Biotyper database for mold identification. Four different sample preparation methods (protocol A, B, C and D) were evaluated. On analyzing each protein extraction method, reliable identification and best log scores were achieved through protocol D. The same protocol was used to identify 153 clinical isolates. Of these 153, 123 (80.3%) were accurately identified by using existing database and remaining 30 (19.7%) were not identified due to unavailability in database. On inclusion of missing main spectrum profile in existing database, all 153 isolates were identified. Matrix-assisted laser desorption ionization-time of flight mass spectrometry can be used for routine identification of clinically important molds.

  18. Rapid detection of Salmonella in meat: Comparative and collaborative validation of a non-complex and cost effective pre-PCR protocol

    DEFF Research Database (Denmark)

    Löfström, Charlotta; Hansen, F.; Mansdal, S.

    2011-01-01

    samples using a real-time PCR method. The protocol included incubation in buffered peptone water, centrifugation of an aliquot and a boiling procedure. The validation study included comparative and collaborative trials recommended by the Nordic Organization for Validation of Alternative Methods (NordVal......). The comparative trial was performed against a culture based reference method (NMKL187, 2007) and a previously NordVal approved PCR method with a semi-automated magnetic bead-based DNA extraction step using 122 artificially contaminated samples. The limit of detection (LOD50) was found to be 3.0, 3.2 and 3.4 CFU...

  19. Back to basics: an evaluation of NaOH and alternative rapid DNA extraction protocols for DNA barcoding, genotyping, and disease diagnostics from fungal and oomycete samples.

    Science.gov (United States)

    Osmundson, Todd W; Eyre, Catherine A; Hayden, Katherine M; Dhillon, Jaskirn; Garbelotto, Matteo M

    2013-01-01

    The ubiquity, high diversity and often-cryptic manifestations of fungi and oomycetes frequently necessitate molecular tools for detecting and identifying them in the environment. In applications including DNA barcoding, pathogen detection from plant samples, and genotyping for population genetics and epidemiology, rapid and dependable DNA extraction methods scalable from one to hundreds of samples are desirable. We evaluated several rapid extraction methods (NaOH, Rapid one-step extraction (ROSE), Chelex 100, proteinase K) for their ability to obtain DNA of quantity and quality suitable for the following applications: PCR amplification of the multicopy barcoding locus ITS1/5.8S/ITS2 from various fungal cultures and sporocarps; single-copy microsatellite amplification from cultures of the phytopathogenic oomycete Phytophthora ramorum; probe-based P. ramorum detection from leaves. Several methods were effective for most of the applications, with NaOH extraction favored in terms of success rate, cost, speed and simplicity. Frozen dilutions of ROSE and NaOH extracts maintained PCR viability for over 32 months. DNA from rapid extractions performed poorly compared to CTAB/phenol-chloroform extracts for TaqMan diagnostics from tanoak leaves, suggesting that incomplete removal of PCR inhibitors is an issue for sensitive diagnostic procedures, especially from plants with recalcitrant leaf chemistry. NaOH extracts exhibited lower yield and size than CTAB/phenol-chloroform extracts; however, NaOH extraction facilitated obtaining clean sequence data from sporocarps contaminated by other fungi, perhaps due to dilution resulting from low DNA yield. We conclude that conventional extractions are often unnecessary for routine DNA sequencing or genotyping of fungi and oomycetes, and recommend simpler strategies where source materials and intended applications warrant such use. © 2012 Blackwell Publishing Ltd.

  20. Rapid, low-cost MR imaging protocol to document central nervous system and sinus abnormalities prior to pediatric hematopoietic stem cell transplantation

    Energy Technology Data Exchange (ETDEWEB)

    Leite, Eliane D.; Barbosa, Felipe G. de; Szarf, Gilberto; Lederman, Henrique M. [Universidade Federal de Sao Paulo, Department of Diagnostic Imaging, Sao Paulo (Brazil); Seber, Adriana; Ginani, Valeria C.; Carlesse, Fabianne C.; Gouvea, Roseane V.; Zecchin, Victor G.; Carvalho, Cinthya R. [Universidade Federal de Sao Paulo, Division of Pediatric Oncology, Department of Pediatrics, Sao Paulo (Brazil)

    2011-06-15

    Patients undergoing bone marrow transplant (BMT) are at risk for infectious complications, including those of the sinus. Central nervous system (CNS) abnormalities related to the chemotherapy or radiation that the patient received for the treatment of underlying malignancy or to transplant-related effects are also commonly seen. The only effective way to differentiate pre- and post-transplant causes is to have a baseline evaluation prior to the admission for transplant. The current method used to evaluate these patients is head CT. However, CT is not accurate to demonstrate CNS abnormalities and exposes the patient to radiation. MRI, despite better sensitivity for white matter abnormalities, has not been routinely used because of the higher cost and longer duration of the exam. Therefore, we designed a fast, low-cost and radiation-free MRI-based protocol to simultaneously evaluate sinus and brain abnormalities. (orig.)

  1. A Rapid Protocol of Crude RNA/DNA Extraction for RT-qPCR Detection and Quantification of 'Candidatus Phytoplasma prunorum'.

    Science.gov (United States)

    Minguzzi, Stefano; Terlizzi, Federica; Lanzoni, Chiara; Poggi Pollini, Carlo; Ratti, Claudio

    2016-01-01

    Many efforts have been made to develop a rapid and sensitive method for phytoplasma and virus detection. Taking our cue from previous works, different rapid sample preparation methods have been tested and applied to Candidatus Phytoplasma prunorum ('Ca. P. prunorum') detection by RT-qPCR. A duplex RT-qPCR has been optimized using the crude sap as a template to simultaneously amplify a fragment of 16S rRNA of the pathogen and 18S rRNA of the host plant. The specific plant 18S rRNA internal control allows comparison and relative quantification of samples. A comparison between DNA and RNA contribution to qPCR detection is provided, showing higher contribution of the latter. The method presented here has been validated on more than a hundred samples of apricot, plum and peach trees. Since 2013, this method has been successfully applied to monitor 'Ca. P. prunorum' infections in field and nursery. A triplex RT-qPCR assay has also been optimized to simultaneously detect 'Ca. P. prunorum' and Plum pox virus (PPV) in Prunus.

  2. A rapid and highly sensitive protocol for the detection of Escherichia coli O157:H7 based on immunochromatography assay combined with the enrichment technique of immunomagnetic nanoparticles

    Directory of Open Access Journals (Sweden)

    Qi H

    2011-11-01

    Full Text Available Hui Qi1, Zhen Zhong1, Han-Xin Zhou1, Chun-Yan Deng1, Hai Zhu2, Jin-Feng Li2, Xi-Li Wang2, Fu-Rong Li1,31Clinical Medical Research Center, The Second Clinical Medical College (Shenzhen People's Hospital, Jinan University, 2Shenzhen Bioeasy Biotechnologies Co, Ltd, 3Shenzhen Institute of Gerontology, Shenzhen, People's Republic of ChinaBackground: Escherichia coli O157:H7 (E. coli O157:H7 is an important pathogenic bacterium that threatens human health. A rapid, simple, highly sensitive, and specific method for the detection of E. coli O157:H7 is necessary.Methods: In the present study, immunomagnetic nanoparticles (IMPs were prepared with nanopure iron as the core, coated with E. coli O157:H7 polyclonal antibodies. These IMPs were used in combination with immunochromatographic assay (ICA and used to establish highly sensitive and rapid kits (IMPs+ICA to detect E. coli O157:H7. The kits were then used to detect E. coli O157:H7 in 150 food samples and were compared with conventional ICA to evaluate their efficacy.Results: The average diameter of IMPs was 56 nm and the amount of adsorbed antibodies was 106.0 µg/mg. The sensitivity of ICA and IMPs+ICA was 105 colony-forming units/mL and 103 CFUs/mL, respectively, for purified E. coli O157:H7 solution. The sensitivity of IMPs+ICA was increased by two orders, and its specificity was similar to ICA.Conclusion: The kits have the potential to offer important social and economic benefits in the screening, monitoring, and control of food safety.Keywords: colloidal gold, immunomagnetic nanoparticles, Escherichia coli O157:H7, immunochromatographic assay

  3. Preventing disease through opportunistic, rapid engagement by primary care teams using behaviour change counselling (PRE-EMPT): protocol for a general practice-based cluster randomised trial.

    Science.gov (United States)

    Spanou, Clio; Simpson, Sharon A; Hood, Kerry; Edwards, Adrian; Cohen, David; Rollnick, Stephen; Carter, Ben; McCambridge, Jim; Moore, Laurence; Randell, Elizabeth; Pickles, Timothy; Smith, Christine; Lane, Claire; Wood, Fiona; Thornton, Hazel; Butler, Chris C

    2010-09-21

    Smoking, excessive alcohol consumption, lack of exercise and an unhealthy diet are the key modifiable factors contributing to premature morbidity and mortality in the developed world. Brief interventions in health care consultations can be effective in changing single health behaviours. General Practice holds considerable potential for primary prevention through modifying patients' multiple risk behaviours, but feasible, acceptable and effective interventions are poorly developed, and uptake by practitioners is low. Through a process of theoretical development, modeling and exploratory trials, we have developed an intervention called Behaviour Change Counselling (BCC) derived from Motivational Interviewing (MI). This paper describes the protocol for an evaluation of a training intervention (the Talking Lifestyles Programme) which will enable practitioners to routinely use BCC during consultations for the above four risk behaviours. This cluster randomised controlled efficacy trial (RCT) will evaluate the outcomes and costs of this training intervention for General Practitioners (GPs) and nurses. Training methods will include: a practice-based seminar, online self-directed learning, and reflecting on video recorded and simulated consultations. The intervention will be evaluated in 29 practices in Wales, UK; two clinicians will take part (one GP and one nurse) from each practice. In intervention practices both clinicians will receive training. The aim is to recruit 2000 patients into the study with an expected 30% drop out. The primary outcome will be the proportion of patients making changes in one or more of the four behaviours at three months. Results will be compared for patients seeing clinicians trained in BCC with patients seeing non-BCC trained clinicians. Economic and process evaluations will also be conducted. Opportunistic engagement by health professionals potentially represents a cost effective medical intervention. This study integrates an existing

  4. Rapid bioassessment methods for assessing the toxicity of terrestrial waste sites at the Savannah River Site using the earthworm, Eisenia foetida

    International Nuclear Information System (INIS)

    Specht, W.L.

    1995-08-01

    Studies were conducted to assess the feasibility of using the earthworm, Eisenia foetida, to evaluate the toxicity of contaminated soils at the Savannah River Site. Survival was assessed in several uncontaminated soils, including sandy loams and clayey loams, as well as in soils contaminated with coal fines, ash, diesel fuel, and heavy metals. In addition, behavior responses, changes in biomass, and bioaccumulation of heavy metals were assessed as sublethal indicators of toxicity. The results indicate excellent survival of Eisenia foetida in uncontaminated sandy and clayey soils. No amendment of these uncontaminated soils or addition of food was necessary to sustain the worms for the 14-day test period. In contaminated soils, no significant mortality was observed, except in soils which have very low pH (< 3). However, sublethal responses were observed in earthworms exposed to several of the contaminated soils. These responses included worms clumping on the surface of the soil, worms clumping between the sides of the test container and the soil, increased burrowing times, reductions in biomass, and elevated concentrations of heavy metals in worm tissue

  5. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  6. Physicochemical and toxicological profiling of ash from the 2010 and 2011 eruptions of Eyjafjallajökull and Grímsvötn volcanoes, Iceland using a rapid respiratory hazard assessment protocol.

    Science.gov (United States)

    Horwell, C J; Baxter, P J; Hillman, S E; Calkins, J A; Damby, D E; Delmelle, P; Donaldson, K; Dunster, C; Fubini, B; Kelly, F J; Le Blond, J S; Livi, K J T; Murphy, F; Nattrass, C; Sweeney, S; Tetley, T D; Thordarson, T; Tomatis, M

    2013-11-01

    The six week eruption of Eyjafjallajökull volcano in 2010 produced heavy ash fall in a sparsely populated area of southern and south eastern Iceland and disrupted European commercial flights for at least 6 days. We adopted a protocol for the rapid analysis of volcanic ash particles, for the purpose of informing respiratory health risk assessments. Ash collected from deposits underwent a multi-laboratory physicochemical and toxicological investigation of their mineralogical parameters associated with bio-reactivity, and selected in vitro toxicology assays related to pulmonary inflammatory responses. Ash from the eruption of Grímsvötn, Iceland, in 2011 was also studied. The results were benchmarked against ash from Soufrière Hills volcano, Montserrat, which has been extensively studied since the onset of eruptive activity in 1995. For Eyjafjallajökull, the grain size distributions were variable: 2-13 vol% of the bulk samples were <4 µm, with the most explosive phases of the eruption generating abundant respirable particulate matter. In contrast, the Grímsvötn ash was almost uniformly coarse (<3.5 vol%<4 µm material). Surface area ranged from 0.3 to 7.7 m2 g(-1) for Eyjafjallajökull but was very low for Grímsvötn (<0.6 m2 g(-1)). There were few fibre-like particles (which were unrelated to asbestos) and the crystalline silica content was negligible in both eruptions, whereas Soufrière Hills ash was cristobalite-rich with a known potential to cause silicosis. All samples displayed a low ability to deplete lung antioxidant defences, showed little haemolysis and low acute cytotoxicity in human alveolar type-1 like epithelial cells (TT1). However, cell-free tests showed substantial hydroxyl radical generation in the presence of hydrogen peroxide for Grímsvötn samples, as expected for basaltic, Fe-rich ash. Cellular mediators MCP-1, IL-6, and IL-8 showed chronic pro-inflammatory responses in Eyjafjallajökull, Grímsvötn and Soufrière Hills samples

  7. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  8. Coral Reef Biological Criteria: Using Clean Water Act to Protect a National Treasure

    Science.gov (United States)

    A collaborative Environmental Protection Agency effort is underway to elucidate the technical aspects of coral reef biocriteria implementation. A stony coral rapid bioassessment protocol has been introduced and applied in the Florida Keys and U.S. Virgin Islands, where several in...

  9. Comparative analysis of selected hydromorphological assessment methods

    Czech Academy of Sciences Publication Activity Database

    Šípek, Václav; Matoušková, M.; Dvořák, M.

    2010-01-01

    Roč. 169, 1-4 (2010), s. 309-319 ISSN 0167-6369 Institutional support: RVO:67985874 Keywords : Hydromorphology * Ecohydromorphological river habitat assessment: EcoRivHab * Rapid Bioassessment Protocol * LAWA Field and Overview Survey * Libechovka River * Bilina River * Czech Republic Subject RIV: DA - Hydrology ; Limnology Impact factor: 1.436, year: 2010

  10. Assessment of four protocols for rapid bacterial identification from positive blood culture pellets by matrix-assisted laser desorption ionization-time of flight mass spectrometry (Vitek® MS).

    Science.gov (United States)

    Thomin, Jean; Aubin, Guillaume Ghislain; Foubert, Fabrice; Corvec, Stéphane

    2015-08-01

    In this study, we developed and compared four protocols to prepare a bacterial pellet from 944 positive blood cultures for direct MALDI-TOF mass spectrometry Vitek® MS analysis. Protocol 4, tested on 200 monomicrobial samples, allowed 83% of bacterial identification. This easy, fast, cheap and accurate method is promising in daily practice, especially to limit broad range antibiotic treatment. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  12. The value of a rapid contrast-enhanced angio-MRI protocol in the detection of head and neck paragangliomas in SDHx mutations carriers: a retrospective study on behalf of the PGL.EVA investigators*

    International Nuclear Information System (INIS)

    Gravel, Guillaume; Hernigou, Anne; Niccoli, Patricia; Rohmer, Vincent; Moulin, Guy; Borson-Chazot, Francoise; Rousset, Pascal; Pasco-Papon, Anne; Marcus, Claude; Dubrulle, Frederique; Gouya, Herve; Bidault, Francois; Dupas, Benoit; Gabrillargues, Jean; Caumont-Prim, Aurore; Gimenez-Roqueplo, Anne-Paule; Halimi, Philippe

    2016-01-01

    To assess the performance of a simplified MRI protocol consisting of a contrast-enhanced three-dimensional MR angiography (CE-MRA) in association with a post-contrast T1-weighted sequence (T1WIV) for the detection of HNPGLs in SDHx mutation carriers. This retrospective sub-study is based on the multicenter PGL.EVA cohort, which prospectively enrolled SDHx mutation carriers from 2005 to 2009; 157 index cases or relatives were included. CE-MRA and the T1WIV images were read solely with knowledge of the clinical data but blind to the diagnosis. Sensitivity, specificity and likelihood ratios for the simplified MRI protocol were compared to the full MRI protocol reading results and to the gold standard status obtained through the consensus of an expert committee. The sensitivity and specificity of the readings of the simplified MRI protocol were, respectively, 88.7 % (95 % CI = 78.1-95.3) and 93.7 % (95 % CI = 86.8-97.7) versus 80.7 % (95 % CI = 68.6-89.6) and 94.7 % (95 % CI = 88.1-98.3) for the readings of the full MRI protocol. The simplified post-contrast MRI with shorter duration (5 to 10 minutes) showed no performance difference compared to the lengthy standard full MRI and can be proposed for the detection of head and neck paragangliomas (HNPGLs) in SDHx mutation carriers. (orig.)

  13. The value of a rapid contrast-enhanced angio-MRI protocol in the detection of head and neck paragangliomas in SDHx mutations carriers: a retrospective study on behalf of the PGL.EVA investigators*

    Energy Technology Data Exchange (ETDEWEB)

    Gravel, Guillaume; Hernigou, Anne [Hopital Europeen Georges Pompidou, Assistance Publique-Hopitaux de Paris, Service de Radiologie, Paris (France); Niccoli, Patricia [Centre Hospitalier Universitaire la Timone, Assistance Publique-Hopitaux de Marseille, Service d' Endocrinologie, Diabete et Maladies Metaboliques, Marseille (France); Rohmer, Vincent [Centre Hospitalier Universitaire d' Angers, Service d' Endocrinologie, Diabetologie, Nutrition, Angers (France); LUNAM Universite, INSERM, U1063, Angers (France); Moulin, Guy [Centre Hospitalier Universitaire la Timone, Assistance Publique-Hopitaux de Marseille, Service de Radiologie, Marseille (France); Borson-Chazot, Francoise [Federation d' Endocrinologie, Hospices civils de Lyon, Groupement Hospitalier Est, Lyon (France); Universite de Lyon, Faculte de Medecine Lyon-Est, Lyon (France); Cancer Research Center of Lyon, INSERM UMR1052, UMR CNRS 5286, Lyon (France); Rousset, Pascal [Hospices civils de Lyon, Groupement Hospitalier Est, Service de Radiologie, Lyon (France); Pasco-Papon, Anne [Centre Hospitalier Universitaire d' Angers, Service de Radiologie, Angers (France); Marcus, Claude [Centre Hospitalo-Universitaire de Reims, Service de Radiologie, Reims (France); Dubrulle, Frederique [Centre Hospitalo-Universitaire de Lille, Service de Radiologie, Lille (France); Gouya, Herve [Hopital Cochin, Assistance Publique-Hopitaux de Paris, Service de Radiologie, Paris (France); Bidault, Francois [Institut Gustave Roussy, Service de Radiologie, Villejuif (France); Dupas, Benoit [Centre Hospitalo-Universitaire de Nantes, Service de Radiologie, Nantes (France); Gabrillargues, Jean [Centre Hospitalo-Universitaire de Clermont-Ferrand, Service de Neuroradiologie, Clermont Ferrand (France); Caumont-Prim, Aurore [Unite d' Epidemiologie et de Recherche Clinique, Assistance Publique-Hopitaux de Paris, Hopital Europeen Georges Pompidou, Paris (France); Centre d' investigation Epidemiologique 4, INSERM, Paris (France); Gimenez-Roqueplo, Anne-Paule [Hopital Europeen Georges Pompidou, Assistance Publique-Hopitaux de Paris, Service de Genetique, Paris (France); Paris Cardiovascular Research Center, INSERM, UMR970, Paris (France); Universite Paris Descartes, Sorbonne Paris Cite, Faculte de Medecine, Paris (France); Halimi, Philippe [Hopital Europeen Georges Pompidou, Assistance Publique-Hopitaux de Paris, Service de Radiologie, Paris (France); Universite Paris Descartes, Sorbonne Paris Cite, Faculte de Medecine, Paris (France)

    2016-06-15

    To assess the performance of a simplified MRI protocol consisting of a contrast-enhanced three-dimensional MR angiography (CE-MRA) in association with a post-contrast T1-weighted sequence (T1WIV) for the detection of HNPGLs in SDHx mutation carriers. This retrospective sub-study is based on the multicenter PGL.EVA cohort, which prospectively enrolled SDHx mutation carriers from 2005 to 2009; 157 index cases or relatives were included. CE-MRA and the T1WIV images were read solely with knowledge of the clinical data but blind to the diagnosis. Sensitivity, specificity and likelihood ratios for the simplified MRI protocol were compared to the full MRI protocol reading results and to the gold standard status obtained through the consensus of an expert committee. The sensitivity and specificity of the readings of the simplified MRI protocol were, respectively, 88.7 % (95 % CI = 78.1-95.3) and 93.7 % (95 % CI = 86.8-97.7) versus 80.7 % (95 % CI = 68.6-89.6) and 94.7 % (95 % CI = 88.1-98.3) for the readings of the full MRI protocol. The simplified post-contrast MRI with shorter duration (5 to 10 minutes) showed no performance difference compared to the lengthy standard full MRI and can be proposed for the detection of head and neck paragangliomas (HNPGLs) in SDHx mutation carriers. (orig.)

  14. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  15. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  16. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  17. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  18. Using Ant Communities For Rapid Assessment Of Terrestrial Ecosystem Health

    Energy Technology Data Exchange (ETDEWEB)

    Wike, L

    2005-06-01

    relative health of the ecosystem. The IBI, though originally for Midwestern streams, has been successfully adapted to other ecoregions and taxa (macroinvertebrates, Lombard and Goldstein, 2004) and has become an important tool for scientists and regulatory agencies alike in determining health of stream ecosystems. The IBI is a specific type of a larger group of methods and procedures referred to as Rapid Bioassessment (RBA). These protocols have the advantage of directly measuring the organisms affected by system perturbations, thus providing an integrated evaluation of system health because the organisms themselves integrate all aspects of their environment and its condition. In addition to the IBI, the RBA concept has also been applied to seep wetlands (Paller et al. 2005) and terrestrial systems (O'Connell et al. 1998, Kremen et al. 1993, Rodriguez et al. 1998, Rosenberg et al. 1986). Terrestrial RBA methods have lagged somewhat behind those for aquatic systems because terrestrial systems are less distinctly defined and seem to have a less universal distribution of an all-inclusive taxon, such as fish in the IBI, upon which to base an RBA. In the last decade, primarily in Australia, extensive development of an RBA using ant communities has shown great promise. Ants have the same advantage for terrestrial RBAs that fish do for aquatic systems in that they are an essential and ubiquitous component of virtually all terrestrial ecosystems. They occupy a broad range of niches, functional groups, and trophic levels and they possess one very important characteristic that makes them ideal for RBA because, similar to the fishes, there is a wide range of tolerance to conditions within the larger taxa. Within ant communities there are certain groups, genera, or species that may be very robust and abundant under even the harshest impacts. There are also taxa that are very sensitive to disturbance and change and their presence or absence is also indicative of the local

  19. Development of a Decision Aid for Cardiopulmonary Resuscitation Involving Intensive Care Unit Patients' and Health Professionals' Participation Using User-Centered Design and a Wiki Platform for Rapid Prototyping: A Research Protocol

    Science.gov (United States)

    Heyland, Daren Keith; Ebell, Mark H; Dupuis, Audrey; Lavoie-Bérard, Carole-Anne; Légaré, France; Archambault, Patrick Michel

    2016-01-01

    Background Cardiopulmonary resuscitation (CPR) is an intervention used in cases of cardiac arrest to revive patients whose heart has stopped. Because cardiac arrest can have potentially devastating outcomes such as severe neurological deficits even if CPR is performed, patients must be involved in determining in advance if they want CPR in the case of an unexpected arrest. Shared decision making (SDM) facilitates discussions about goals of care regarding CPR in intensive care units (ICUs). Patient decision aids (DAs) are proven to support the implementation of SDM. Many patient DAs about CPR exist, but they are not universally implemented in ICUs in part due to lack of context and cultural adaptation. Adaptation to local context is an important phase of implementing any type of knowledge tool such as patient DAs. User-centered design supported by a wiki platform to perform rapid prototyping has previously been successful in creating knowledge tools adapted to the needs of patients and health professionals (eg, asthma action plans). This project aims to explore how user-centered design and a wiki platform can support the adaptation of an existing DA for CPR to the local context. Objective The primary objective is to use an existing DA about CPR to create a wiki-based DA that is adapted to the context of a single ICU and tailorable to individual patient’s risk factors while employing user-centered design. The secondary objective is to document the use of a wiki platform for the adaptation of patient DAs. Methods This study will be conducted in a mixed surgical and medical ICU at Hôtel-Dieu de Lévis, Quebec, Canada. We plan to involve all 5 intensivists and recruit at least 20 alert and oriented patients admitted to the ICU and their family members if available. In the first phase of this study, we will observe 3 weeks of daily interactions between patients, families, intensivists, and other allied health professionals. We will specifically observe 5 dyads of

  20. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  1. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.K.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt

  2. A new method for rapid Canine retraction

    Directory of Open Access Journals (Sweden)

    "Khavari A

    2001-06-01

    Full Text Available Distraction osteogenesis method (Do in bone lengthening and rapid midpalatal expansion have shown the great ability of osteognic tissues for rapid bone formation under distraction force and special protocol with optimum rate of one millimeter per day. Periodontal membrane of teeth (PDM is the extension of periostium in the alveolar socked. Orthodontic force distracts PDM fibers in the tension side and then bone formation will begin.Objects: Rapid retraction of canine tooth into extraction space of first premolar by DO protocol in order to show the ability of the PDM in rapid bone formation. The other objective was reducing total orthodontic treatment time of extraction cases.Patients and Methods: Tweleve maxillary canines in six patients were retracted rapidly in three weeks by a custom-made tooth-born appliance. Radiographic records were taken to evaluate the effects of heavy applied force on canine and anchorage teeth.Results: Average retraction was 7.05 mm in three weeks (2.35 mm/week. Canines rotated distal- in by mean 3.5 degrees.Anchorage loss was from 0 to 0.8 mm with average of 0.3 mm.Root resorption of canines was negligible, and was not significant clinically. Periodontium was normal after rapid retraction. No hazard for pulp vitality was observed.Discussion: PDM responded well to heavy distraction force by Do protocol. Rapid canine retraction seems to be a safe method and can considerabely reduce orthodontic time.

  3. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  4. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  5. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  6. Rapid purification of recombinant histones.

    Science.gov (United States)

    Klinker, Henrike; Haas, Caroline; Harrer, Nadine; Becker, Peter B; Mueller-Planitz, Felix

    2014-01-01

    The development of methods to assemble nucleosomes from recombinant histones decades ago has transformed chromatin research. Nevertheless, nucleosome reconstitution remains time consuming to this day, not least because the four individual histones must be purified first. Here, we present a streamlined purification protocol of recombinant histones from bacteria. We termed this method "rapid histone purification" (RHP) as it circumvents isolation of inclusion bodies and thereby cuts out the most time-consuming step of traditional purification protocols. Instead of inclusion body isolation, whole cell extracts are prepared under strongly denaturing conditions that directly solubilize inclusion bodies. By ion exchange chromatography, the histones are purified from the extracts. The protocol has been successfully applied to all four canonical Drosophila and human histones. RHP histones and histones that were purified from isolated inclusion bodies had similar purities. The different purification strategies also did not impact the quality of octamers reconstituted from these histones. We expect that the RHP protocol can be readily applied to the purification of canonical histones from other species as well as the numerous histone variants.

  7. The RAPID-CTCA trial (Rapid Assessment of Potential Ischaemic Heart Disease with CTCA) - a multicentre parallel-group randomised trial to compare early computerised tomography coronary angiography versus standard care in patients presenting with suspected or confirmed acute coronary syndrome: study protocol for a randomised controlled trial.

    Science.gov (United States)

    Gray, Alasdair J; Roobottom, Carl; Smith, Jason E; Goodacre, Steve; Oatey, Katherine; O'Brien, Rachel; Storey, Robert F; Na, Lumine; Lewis, Steff C; Thokala, Praveen; Newby, David E

    2016-12-07

    Emergency department attendances with chest pain requiring assessment for acute coronary syndrome (ACS) are a major global health issue. Standard assessment includes history, examination, electrocardiogram (ECG) and serial troponin testing. Computerised tomography coronary angiography (CTCA) enables additional anatomical assessment of patients for coronary artery disease (CAD) but has only been studied in very low-risk patients. This trial aims to investigate the effect of early CTCA upon interventions, event rates and health care costs in patients with suspected/confirmed ACS who are at intermediate risk. Participants will be recruited in about 35 tertiary and district general hospitals in the UK. Patients ≥18 years old with symptoms with suspected/confirmed ACS with at least one of the following will be included: (1) ECG abnormalities, e.g. ST-segment depression >0.5 mm; (2) history of ischaemic heart disease; (3) troponin elevation above the 99 th centile of the normal reference range or increase in high-sensitivity troponin meeting European Society of Cardiology criteria for 'rule-in' of myocardial infarction (MI). The early use of ≥64-slice CTCA as part of routine assessment will be compared to standard care. The primary endpoint will be 1-year all-cause death or recurrent type 1 or type 4b MI at 1 year, measured as the time to such event. A number of secondary clinical, process and safety endpoints will be collected and analysed. Cost effectiveness will be estimated in terms of the lifetime incremental cost per quality-adjusted life year gained. We plan to recruit 2424 (2500 with ~3% drop-out) evaluable patients (1212 per arm) to have 90% power to detect a 20% versus 15% difference in 1-year death or recurrent type 1 MI or type 4b MI, two-sided p Acute Coronary Events score, previous CAD and baseline troponin level. The results will be expressed as a hazard ratio with the corresponding 95% confidence intervals and p value. The Rapid Assessment of

  8. Rapid modification of retroviruses using lipid conjugates

    International Nuclear Information System (INIS)

    Mukherjee, Nimisha G; Le Doux, Joseph M; Andrew Lyon, L

    2009-01-01

    Methods are needed to manipulate natural nanoparticles. Viruses are particularly interesting because they can act as therapeutic cellular delivery agents. Here we examine a new method for rapidly modifying retroviruses that uses lipid conjugates composed of a lipid anchor (1,2-distearoyl-sn-glycero-3-phosphoethanolamine), a polyethylene glycol chain, and biotin. The conjugates rapidly and stably modified retroviruses and enabled them to bind streptavidin. The implication of this work for modifying viruses for gene therapy and vaccination protocols is discussed.

  9. Análise comparativa entre duas bacias hidrográficas utilizando um protocolo de avaliação rápida da diversidade de habitats / Comparative analysis between two hydrographic basin using a rapid habitats diversity evaluation protocol

    Directory of Open Access Journals (Sweden)

    Rogério Antonio Krupek

    2010-04-01

    Full Text Available Este trabalho teve por objetivo utilizar um protocolo de avaliação rápida da diversidade de habitats como ferramenta para comparar duas bacias de drenagem localizadas no município de Guarapuava, estado do Paraná: a bacia hidrográfica do rio Cascavel (25º23’03”S-51º28’12”W e a bacia hidrográfica do rio das Pedras (25º13’10”S-51º28’40”W, que se encontram relativamente próximas e estão sob diferentes intensidades de influências antrópicas. Este protocolo tem como finalidade avaliar características da água e do entorno de ecossistemas aquáticos a partir da atribuição de pontuação a cada um dos parâmetros com base na observação das condições do habitat. As coletas de dados foram realizadas no período de 10 de junho a 30 de julho de 2007 em vinte pontos de amostragem estabelecidos em cada uma das bacias de drenagem estudadas. Comparativamente, a grande maioria dos parâmetros apresentou diferenças significativas entre os dois sistemas, sendo que os rios e riachos da bacia do rio das Pedras encontram-se nitidamente em melhores condições que a bacia do rio Cascavel, onde seus ecossistemas aquáticos apresentam visíveis sinais de degradação. O uso de avaliações rápidas como este protocolo é uma importante ferramenta no desenvolvimento de programas de monitoramento ecológico e na restauração de ambientes lóticos. AbstractThe main object of the present work was to use a protocol of rapid habitat diversity evaluation as tool to compare two drainage basin located in the municipality of Guarapuava, mid-southern region of Paraná state: Cascavel river basin (25º23’03”S-51º28’12”W and Pedras river basin (25º13’10”S-51º28’40”W, which meets relatively near and under different intensities of entropic influences. This protocol has the purpose of evaluating water and riparian characteristics of the aquatic ecosystems from the attribution of values to each parameter through observation of

  10. A quick DNA extraction protocol: Without liquid nitrogen in ambient ...

    African Journals Online (AJOL)

    Marker assisted selection is an effective technique for quality traits selection in breeding program which are impossible by visual observation. Marker assisted selection in early generation requires rapid DNA extraction protocol for large number of samples in a low cost approach. A rapid and inexpensive DNA extraction ...

  11. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  12. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  13. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  14. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  15. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  16. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    Prayer, Daniela; Brugger, Peter Christian; Prayer, Lucas

    2004-01-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  17. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  18. Rapid shallow breathing

    Science.gov (United States)

    Tachypnea; Breathing - rapid and shallow; Fast shallow breathing; Respiratory rate - rapid and shallow ... Shallow, rapid breathing has many possible medical causes, including: Asthma Blood clot in an artery in the ...

  19. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  20. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  1. Bioassessment of Choghakhor Wetland using Benthic Macroinvertebrates

    Directory of Open Access Journals (Sweden)

    P. Fathi

    2016-05-01

    Full Text Available In present study, besides investigating benthic communities and their demographics in Choghakhor wetland, the water quality has been evaluated and classified. Then, 10 stations were selected and sampling of benthos was done every 45 days since April 2010 to March 2011, with 3 replications at each station. Samples were obtained by Ekman grab Sampler (surface 400 cm2. The collected samples were separated and fixed by formalin (4%. The Macroinvertebrates samples were identified and counted in laboratory. Generally 25 families of benthic macroinvertebrates belonging to 5 classes and 12 orders were identified. The results were calculated as community measures, including total richness, Shannon - Wiener diversity index and Hilsenhoff Biological index at family level. The results obtained from temporal and spatial changes of data (Statgeraphics software and water qualitative classification using Shannon diversity index conformed to biological Hilsenhoff index. And finally, water quality of wetland was assessed to be polluted in average to high level. According to this study findings, it seems that, these indicators could be used as useful tools for evaluating water supplies quality.

  2. Bioassessment of the Standard Elutriate Test

    Science.gov (United States)

    1976-09-01

    that the growth of the green algal, Chlorella vulgaris , was reduced approximately 50 percent in the presence of 2.0 ppm zinc. Payne (12) reported that...Environmental Protection Agency, Washington, DC, Oct., 1973. 14. Rachlin, Y. W., and Farran, M., "Growth Response of the Green Algae Chlorella ... vulgaris to Selective Concentrations of Zinc," Water Research, Vol. 8, 1974, pp. 575-577. 1:). Standard Methods for the Examination of Water and Wastewater

  3. A PROPOSED MAPPING ARCHITECTURE BETWEEN IAX AND JINGLE PROTOCOLS

    OpenAIRE

    Hadeel Saleh Haj Aliwi; Putra Sumari

    2016-01-01

    Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call eve...

  4. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  5. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  6. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  7. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  8. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  9. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  10. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  11. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  12. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  13. Novel protocol for persister cells isolation.

    Directory of Open Access Journals (Sweden)

    Silvia J Cañas-Duarte

    Full Text Available Bacterial persistence, where a fraction of a population presents a transient resistance to bactericidal substances, has great medical importance due to its relation with the appearance of antibiotic resistances and untreatable bacterial chronic infections. The mechanisms behind this phenomenon remain largely unknown in spite of recent advances, in great part because of the difficulty in isolating the very small fraction of the population that is in this state at any given time. Current protocols for persister isolation have resulted in possible biases because of the induction of this state by the protocol itself. Here we present a novel protocol that allows rapid isolation of persister cells both from exponential and stationary phase. Moreover, it is capable of differentiating between type I and type II persister cells, which should allow the field to move beyond its current state of studying only one type. While this protocol prompts a revision of many of the current results, it should greatly facilitate further advances in the field.

  14. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  15. Optimizing the high-resolution manometry (HRM) study protocol.

    Science.gov (United States)

    Patel, A; Ding, A; Mirza, F; Gyawali, C P

    2015-02-01

    Intolerance of the esophageal manometry catheter may prolong high-resolution manometry (HRM) studies and increase patient distress. We assessed the impact of obtaining the landmark phase at the end of the study when the patient has acclimatized to the HRM catheter. 366 patients (mean age 55.4 ± 0.8 years, 62.0% female) undergoing esophageal HRM over a 1-year period were studied. The standard protocol consisted of the landmark phase, 10 5 mL water swallows 20-30 s apart, and multiple rapid swallows where 4-6 2 mL swallows were administered in rapid succession. The modified protocol consisted of the landmark phase at the end of the study after test swallows. Study duration, technical characteristics, indications, and motor findings were compared between standard and modified protocols. Of the 366 patients, 89.6% underwent the standard protocol (study duration 12.9 ± 0.3 min). In 10.4% with poor catheter tolerance undergoing the modified protocol, study duration was significantly longer (15.6 ± 1.0 min, p = 0.004) despite similar duration of study maneuvers. Only elevated upper esophageal sphincter basal pressures at the beginning of the study segregated modified protocol patients. The 95th percentile time to landmark phase in the standard protocol patients was 6.1 min; as many as 31.4% of modified protocol patients could not obtain their first study maneuver within this period (p = 0.0003). Interpretation was not impacted by shifting the landmark phase to the end of the study. Modification of the HRM study protocol with the landmark phase obtained at the end of the study optimizes study duration without compromising quality. © 2014 John Wiley & Sons Ltd.

  16. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  17. Análise morfológica do arco superior de portadores de fissura labiopalatal submetidos a diferentes protocolos de expansão rápida maxilar: avaliação das alterações maxilares Morphological analysis of the maxillary arch in patients with cleft lip and palate submitted to different protocols of rapid maxillary expansion: maxillary alterations evaluation

    Directory of Open Access Journals (Sweden)

    Maíra Massuia de Souza

    2009-10-01

    transverse dimensions of maxillary dental arches by analysis of the dental casts of 15 patients with complete unilateral cleft lip and palate who presented sagittal and transverse maxillary constriction and were submitted to two distinct protocols of rapid maxillary expansion. METHODS: Seven patients were submitted to rapid maxillary expansion (RME by the conventional activation protocol (Group 1, and the others were treated by the protocol proposed by Liou and Tsai in 2005, with alternated expansion and constriction (Group 2. Both groups were later submitted to maxillary protraction with facial mask. Dental casts were obtained at two periods: before placement of a modified Haas expander (T1 and after 24 weeks of treatment (T2. Transverse distances were measured with a digital caliper to register the distances between first upper premolars (anterior area and first upper molars (posterior area. Data were statistically analyzed by the Student's t test. RESULTS AND CONCLUSION: Both protocols were equally effective, since no differences were observed between the groups as to the transverse increasing achieved.

  18. The protein protocols handbook

    National Research Council Canada - National Science Library

    Walker, John M

    2002-01-01

    .... The new chapters cover with many rapidly developing areas, particularly the application of mass spectrometry in protein characterization, as well as the now well-established 2-D PAGE technique in proteomics...

  19. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  20. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  1. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  2. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  3. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  4. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  5. Evaluation of protocol uniformity concerning laparoscopic cholecystectomy in The Netherlands

    NARCIS (Netherlands)

    L.S.G.L. Wauben; R.H.M. Goossens (Richard); D.J. van Eijk (Daan); J.F. Lange (Johan)

    2008-01-01

    textabstractBackground: Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the "critical view of safety" concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid

  6. Rapid Prototyping Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The ARDEC Rapid Prototyping (RP) Laboratory was established in December 1992 to provide low cost RP capabilities to the ARDEC engineering community. The Stratasys,...

  7. The evaluation of MRI protocols for the quantification of adiposity in the obese

    International Nuclear Information System (INIS)

    Tagami, Hirotaka; Taki, Tomomi; Ueoro, Kouichi

    1998-01-01

    Obesity is a recognized risk factor for the development of diseases such as atherosclerosis, diabetes mellitus and hypertension. The individual risk of the obesity can not be evaluated merely by the body weight or body mass index. The fat distribution is a key to evaluate it. So far, the MRI protocols in the literature tested for the evaluation of the fat distribution were spin-echo and inversion-recovery images. We tested both protocols and couldn't get good images basically due to motion artifacts. Therefore, the field-echo (FE) protocol, a rapid scan protocol, was evaluated. The transverse fat distributions at umbilical level of 8 male obese volunteers were examined with MRI FE protocol and X-ray computed tomography (CT). The excellent images were obtained with FE protocol and correlation with CT images was also satisfactory. The FE protocols for the evaluation of the fat distribution is of use and reasonable tool for the clinical usage. (author)

  8. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  9. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  10. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  11. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  12. Rapid Tooling via Stereolithography

    OpenAIRE

    Montgomery, Eva

    2006-01-01

    Approximately three years ago, composite stereolithography (SL) resins were introduced to the marketplace, offering performance features beyond what traditional SL resins could offer. In particular, the high heat deflection temperatures and high stiffness of these highly filled resins have opened the door to several new rapid prototyping (RP) applications, including wind tunnel test modelling and, more recently, rapid tooling.

  13. Rapid improvement teams.

    Science.gov (United States)

    Alemi, F; Moore, S; Headrick, L; Neuhauser, D; Hekelman, F; Kizys, N

    1998-03-01

    Suggestions, most of which are supported by empirical studies, are provided on how total quality management (TQM) teams can be used to bring about faster organizationwide improvements. Ideas are offered on how to identify the right problem, have rapid meetings, plan rapidly, collect data rapidly, and make rapid whole-system changes. Suggestions for identifying the right problem include (1) postpone benchmarking when problems are obvious, (2) define the problem in terms of customer experience so as not to blame employees nor embed a solution in the problem statement, (3) communicate with the rest of the organization from the start, (4) state the problem from different perspectives, and (5) break large problems into smaller units. Suggestions for having rapid meetings include (1) choose a nonparticipating facilitator to expedite meetings, (2) meet with each team member before the team meeting, (3) postpone evaluation of ideas, and (4) rethink conclusions of a meeting before acting on them. Suggestions for rapid planning include reducing time spent on flowcharting by focusing on the future, not the present. Suggestions for rapid data collection include (1) sample patients for surveys, (2) rely on numerical estimates by process owners, and (3) plan for rapid data collection. Suggestions for rapid organizationwide implementation include (1) change membership on cross-functional teams, (2) get outside perspectives, (3) use unfolding storyboards, and (4) go beyond self-interest to motivate lasting change in the organization. Additional empirical investigations of time saved as a consequence of the strategies provided are needed. If organizations solve their problems rapidly, fewer unresolved problems may remain.

  14. A rapid mini-prep DNA extraction method in rice (Oryza sativa)

    African Journals Online (AJOL)

    STORAGESEVER

    2009-01-19

    Jan 19, 2009 ... homogenizer with a plastic tip is incomplete, since the leaves of these plants .... mortar and pestle with liquid nitrogen and transferred to a tube. ... rapid DNA extraction protocols for gymnosperms for application in population ...

  15. Rapid Screening of In-Vitro Regenerated Plantlets of Four Nigerian ...

    African Journals Online (AJOL)

    Prof. Ogunji

    Tissue culture technique provides a rapid means of studying plant-pathogen interaction in a controlled ... Keywords: cowpea, in-vitro regeneration, hormones, Fusarium wilt, protocols. .... solanacearum and evaluation of tomato in Nepal.

  16. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  17. Rapid micropropagation of Boesenbergia rotunda (L.) Mansf. Kulturpfl.

    African Journals Online (AJOL)

    Rapid micropropagation of Boesenbergia rotunda (L.) Mansf. Kulturpfl. (a valuable medicinal plant) from shoot bud explants. NA Yusuf, MMS Annuar, N Khalid. Abstract. A successful protocol was developed for mass propagation of Boesenbergia rotunda (L.) Mansf. Kulturpfl., an important medicinal plant. Numerous shoots ...

  18. Rapid response systems.

    Science.gov (United States)

    Lyons, Patrick G; Edelson, Dana P; Churpek, Matthew M

    2018-07-01

    Rapid response systems are commonly employed by hospitals to identify and respond to deteriorating patients outside of the intensive care unit. Controversy exists about the benefits of rapid response systems. We aimed to review the current state of the rapid response literature, including evolving aspects of afferent (risk detection) and efferent (intervention) arms, outcome measurement, process improvement, and implementation. Articles written in English and published in PubMed. Rapid response systems are heterogeneous, with important differences among afferent and efferent arms. Clinically meaningful outcomes may include unexpected mortality, in-hospital cardiac arrest, length of stay, cost, and processes of care at end of life. Both positive and negative interventional studies have been published, although the two largest randomized trials involving rapid response systems - the Medical Early Response and Intervention Trial (MERIT) and the Effect of a Pediatric Early Warning System on All-Cause Mortality in Hospitalized Pediatric Patients (EPOCH) trial - did not find a mortality benefit with these systems, albeit with important limitations. Advances in monitoring technologies, risk assessment strategies, and behavioral ergonomics may offer opportunities for improvement. Rapid responses may improve some meaningful outcomes, although these findings remain controversial. These systems may also improve care for patients at the end of life. Rapid response systems are expected to continue evolving with novel developments in monitoring technologies, risk prediction informatics, and work in human factors. Copyright © 2018 Elsevier B.V. All rights reserved.

  19. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    Science.gov (United States)

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  20. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  1. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  2. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  3. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  4. A PROPOSED MAPPING ARCHITECTURE BETWEEN IAX AND JINGLE PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Hadeel Saleh Haj Aliwi

    2016-03-01

    Full Text Available Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call even if they use different chatting applications. Providing the interoperability between different signaling protocols and multimedia applications takes the advantages of more than one protocol. Many mapping architectures have been proposed to ease exchanging the media between at least two users without facing any difficulties such as SIP-Jingle, IAX-RSW, H.323-MGCP, etc. However, the design of any of the existing mapping architectures has some weaknesses related to larger delay, time consuming, and security matters. The only way to overcome these problems is to propose an efficient mapping architecture. This paper proposed a new mapping architecture between Inter-Asterisk eXchange Protocol and Jingle Protocol. The proposed mapping architecture consists of IAX domain (IAX client, IAX server, IAX-to-Jingle gateway, and Jingle domain (Jingle client, Jingle server, Jingle-to-IAX gateway. The tasks of the translation gateways are represented by the URI conversion, media capability exchange, translator of call setup and teardown signals, and real time media transmission.

  5. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  6. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  7. Quorum system and random based asynchronous rendezvous protocol for cognitive radio ad hoc networks

    Directory of Open Access Journals (Sweden)

    Sylwia Romaszko

    2013-12-01

    Full Text Available This paper proposes a rendezvous protocol for cognitive radio ad hoc networks, RAC2E-gQS, which utilizes (1 the asynchronous and randomness properties of the RAC2E protocol, and (2 channel mapping protocol, based on a grid Quorum System (gQS, and taking into account channel heterogeneity and asymmetric channel views. We show that the combination of the RAC2E protocol with the grid-quorum based channel mapping can yield a powerful RAC2E-gQS rendezvous protocol for asynchronous operation in a distributed environment assuring a rapid rendezvous between the cognitive radio nodes having available both symmetric and asymmetric channel views. We also propose an enhancement of the protocol, which uses a torus QS for a slot allocation, dealing with the worst case scenario, a large number of channels with opposite ranking lists.

  8. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  9. Rapid world modeling

    International Nuclear Information System (INIS)

    Little, Charles; Jensen, Ken

    2002-01-01

    Sandia National Laboratories has designed and developed systems capable of large-scale, three-dimensional mapping of unstructured environments in near real time. This mapping technique is called rapid world modeling and has proven invaluable when used by prototype systems consisting of sensory detection devices mounted on mobile platforms. These systems can be deployed into previously unmapped environments and transmit real-time 3-D visual images to operators located remotely. This paper covers a brief history of the rapid world modeling system, its implementation on mobile platforms, and the current state of the technology. Applications to the nuclear power industry are discussed. (author)

  10. JINR rapid communications

    International Nuclear Information System (INIS)

    1998-01-01

    The present collection of rapid communications from JINR, Dubna, contains seven separate records on relativistic multiparticle processes in the central rapidity region at asymptotically high energies, a new experimental study of charged K→3π decays, pre-Cherenkov radiation as a phenomenon of 'light barrier', stable S=-2 H dibaryon found in Dubna, calculation of Green functions and gluon top in some unambiguous gauges, a method of a fast selection of inelastic nucleus-nucleus collisions for the CMS experiment and the manifestation of jet quenching in differential distributions of the total transverse energy in nucleus-nucleus collisions

  11. Rapid microbiology - raising awareness.

    Science.gov (United States)

    Bailie, Jonathan

    2016-01-01

    A 'high-level overview' of some of the emerging rapid microbiology technologies designed to help healthcare engineering and infection control teams working in hospitals and other healthcare facilities more rapidly identify potentially hazardous levels of waterborne microorganisms in their water systems, enabling them to take prompt remedial action, and a look at the some of the 'pros and cons' of such testing techniques, was given by Nalco technical director, Howard Barnes, the vice-chair of the Legionella Control Association (LCA), at a recent LCA open day. HEJ editor, Jonathan Bailie, reports.

  12. JINR rapid communications

    International Nuclear Information System (INIS)

    1998-01-01

    The present collection of rapid communications from JINR, Dubna, contains seven separate records on invisible Z-boson width and restrictions on next-to-minimal supersymmetric standard model, cosmic test of honeycomb drift chambers, fission of 209 Bi, 232 Th, 235 U, 238 U and 237 Np in a spallation neutron field, rapid screening of spontaneous and radiation-induced structural changes at the vestigial gene of Drosophila melanogaster by polymerase chain reaction, gamma-ray multiplicities in sub-barrier fission of 226 Th and the decay constants of the scalar and pseudoscalar mesons in the quark models with quasilocal interaction

  13. BioBlocks: Programming Protocols in Biology Made Easier.

    Science.gov (United States)

    Gupta, Vishal; Irimia, Jesús; Pau, Iván; Rodríguez-Patón, Alfonso

    2017-07-21

    The methods to execute biological experiments are evolving. Affordable fluid handling robots and on-demand biology enterprises are making automating entire experiments a reality. Automation offers the benefit of high-throughput experimentation, rapid prototyping, and improved reproducibility of results. However, learning to automate and codify experiments is a difficult task as it requires programming expertise. Here, we present a web-based visual development environment called BioBlocks for describing experimental protocols in biology. It is based on Google's Blockly and Scratch, and requires little or no experience in computer programming to automate the execution of experiments. The experiments can be specified, saved, modified, and shared between multiple users in an easy manner. BioBlocks is open-source and can be customized to execute protocols on local robotic platforms or remotely, that is, in the cloud. It aims to serve as a de facto open standard for programming protocols in Biology.

  14. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  15. An Evaluation of Protocols for UAV Science Applications

    Science.gov (United States)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  16. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  17. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  18. Navigate the Digital Rapids

    Science.gov (United States)

    Lindsay, Julie; Davis, Vicki

    2010-01-01

    How can teachers teach digital citizenship when the digital landscape is changing so rapidly? How can teachers teach proper online social interactions when the students are outside their classroom and thus outside their control? Will encouraging students to engage in global collaborative environments land teachers in hot water? These are the…

  19. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  20. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  1. Industrial wireless sensor networks applications, protocols, and standards

    CERN Document Server

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  2. Team Training and Institutional Protocols to Prevent Shoulder Dystocia Complications.

    Science.gov (United States)

    Smith, Samuel

    2016-12-01

    Shoulder dystocia is an obstetrical emergency that may result in significant neonatal complications. It requires rapid recognition and a coordinated response. Standardization of care, teamwork and communication, and clinical simulation are the key components of patient safety programs in obstetrics. Simulation-based team training and institutional protocols for the management of shoulder dystocia are emerging as integral components of many labor and delivery safety initiatives because of their impact on technical skills and team performance.

  3. The Tolerability and Efficacy of Rapid Infliximab Infusions in Patients with Inflammatory Bowel Disease.

    Science.gov (United States)

    Qazi, Taha; Shah, Bhavesh; El-Dib, Mohammed; Farraye, Francis A

    2016-02-01

    Few studies have assessed the loss of efficacy or patient and caregiver satisfaction with rapid infliximab infusions. The aim of this study is to assess the tolerability, loss of efficacy and to describe the impact on resource utilization and patient satisfaction in rapid infliximab infusions. Subjects with inflammatory bowel disease receiving rapid infliximab infusions were included in the study. Subjects received maintenance infusions from June 2011 to June 2013. Incidence of adverse reactions and the total number of rapid infliximab infusions were recorded. Efficacy was compared to published studies evaluating the long-term efficacy of infliximab infusions. Patient satisfaction was addressed through a survey following the implementation of the rapid infusion protocol. Seventy-five subjects with IBD were included in the study. Five hundred and twenty-two rapid infliximab infusions were provided to patients. There were no acute or delayed infusion reactions. Ten subjects (13 %) required either a dose escalation or interval adjustment between infliximab infusions. A majority of patients reported increased satisfaction with 1-h infliximab infusions, and 97 % of surveyed patients opted to continue rapid infusions. The rapid infliximab infusion protocol increased infusion unit efficiency by increasing capacity by 15 %. Cost savings in the elimination of nursing time translated to approximately $108,150 savings at our institution. Rapid infliximab infusions do not appear to increase the risk of loss of response compared to historical studies of long-term infliximab efficiency. A rapid infliximab infusion protocol improved efficiency in our infusion unit and increased patient and nursing satisfaction.

  4. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  5. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  6. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  7. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  8. Wireless Power Transfer Protocols in Sensor Networks: Experiments and Simulations

    Directory of Open Access Journals (Sweden)

    Sotiris Nikoletseas

    2017-04-01

    Full Text Available Rapid technological advances in the domain of Wireless Power Transfer pave the way for novel methods for power management in systems of wireless devices, and recent research works have already started considering algorithmic solutions for tackling emerging problems. In this paper, we investigate the problem of efficient and balanced Wireless Power Transfer in Wireless Sensor Networks. We employ wireless chargers that replenish the energy of network nodes. We propose two protocols that configure the activity of the chargers. One protocol performs wireless charging focused on the charging efficiency, while the other aims at proper balance of the chargers’ residual energy. We conduct detailed experiments using real devices and we validate the experimental results via larger scale simulations. We observe that, in both the experimental evaluation and the evaluation through detailed simulations, both protocols achieve their main goals. The Charging Oriented protocol achieves good charging efficiency throughout the experiment, while the Energy Balancing protocol achieves a uniform distribution of energy within the chargers.

  9. Rapid road repair vehicle

    Science.gov (United States)

    Mara, Leo M.

    1998-01-01

    Disclosed is a rapid road repair vehicle capable of moving over a surface to be repaired at near normal posted traffic speeds to scan for and find an the high rate of speed, imperfections in the pavement surface, prepare the surface imperfection for repair by air pressure and vacuum cleaning, applying a correct amount of the correct patching material to effect the repair, smooth the resulting repaired surface, and catalog the location and quality of the repairs for maintenance records of the road surface. The rapid road repair vehicle can repair surface imperfections at lower cost, improved quality, at a higher rate of speed than was was heretofor possible, with significantly reduced exposure to safety and health hazards associated with this kind of road repair activities in the past.

  10. Rapidly processable radiographic material

    International Nuclear Information System (INIS)

    Brabandere, L.A. de; Borginon, H.A.; Pattyn, H.A.; Pollet, R.J.

    1981-01-01

    A new rapidly processable radiographic silver halide material is described for use in mammography and non-destructive testing of industrial materials. The radiographic material is used for direct exposure to penetrating radiation without the use of fluorescent-intensifying screens. It consists of a transparent support with a layer of hydrophilic colloid silver halide emulsion on one or both sides. Examples of the preparation of three different silver halide emulsions are given including the use of different chemical sensitizers. These new radiographic materials have good resistance to the formation of pressure marks in rapid processing apparatus and they have improved sensitivity for direct exposure to penetrating radiation compared to conventional radiographic emulsions. (U.K.)

  11. Rapid manufacturing for microfluidics

    CSIR Research Space (South Africa)

    Land, K

    2012-10-01

    Full Text Available for microfluidics K. LAND, S. HUGO, M MBANJWA, L FOURIE CSIR Materials Science and Manufacturing P O Box 395, Pretoria 0001, SOUTH AFRICA Email: kland@csir.co.za INTRODUCTION Microfluidics refers to the manipulation of very small volumes of fluid.... Microfluidics is at the forefront of developing solutions for drug discovery, diagnostics (from glucose tests to malaria and TB testing) and environmental diagnostics (E-coli monitoring of drinking water). In order to quickly implement new designs, a rapid...

  12. Tiber Personal Rapid Transit

    Directory of Open Access Journals (Sweden)

    Diego Carlo D'agostino

    2011-02-01

    Full Text Available The project “Tiber Personal Rapid Transit” have been presented by the author at the Rome City Vision Competition1 2010, an ideas competition, which challenges architects, engineers, designers, students and creatives individuals to develop visionary urban proposals with the intention of stimulating and supporting the contemporary city, in this case Rome. The Tiber PRT proposal tries to answer the competition questions with the definition of a provocative idea: a Personal Rapid transit System on the Tiber river banks. The project is located in the central section of the Tiber river and aims at the renewal of the river banks with the insertion of a Personal Rapid Transit infrastructure. The project area include the riverbank of Tiber from Rome Transtevere RFI station to Piazza del Popolo, an area where main touristic and leisure attractions are located. The intervention area is actually no used by the city users and residents and constitute itself a strong barrier in the heart of the historic city.

  13. Rapid MR imaging

    International Nuclear Information System (INIS)

    Edelman, R.R.; Buxton, R.B.; Brady, T.J.

    1988-01-01

    Conventional magnetic resonance (MR) imaging methods typically require several minutes to produce an image, but the periods of respiration, cardiac motion and peristalsis are on the order of seconds or less. The need to reduce motion artifact, as well as the need to reduce imaging time for patient comfort and efficiency, have provided a strong impetus for the development of rapid imaging methods. For abdominal imaging, motion artifacts due to respiration can be significantly reduced by collecting the entire image during one breath hold. For other applications, such as following the kinetics of administered contrast agents, rapid imaging is essential to achieve adequate time resolution. A shorter imaging time entails a cost in image signal/noise (S/N), but improvements in recent years in magnet homogeneity, gradient and radiofrequency coil design have led to steady improvements in S/N and consequently in image quality. For many chemical applications the available S/N is greater than needed, and a trade-off of lower S/N for a shorter imaging time is acceptable. In this chapter, the authors consider the underlying principles of rapid imaging as well as clinical applications of these methods. The bulk of this review concentrates on short TR imaging, but methods that provide for a more modest decrease in imaging time as well as or those that dramatically shorten the imaging time to tens of milliseconds are also discussed

  14. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  15. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  16. JINR rapid communications

    International Nuclear Information System (INIS)

    1998-01-01

    The present collection of rapid communications from JINR, Dubna, contains seven separate records on decays of excited strange mesons in the extended NJL model, production of heavy evaporation residues in the reactions induced by an extracted 48 Ca beam on a 208 Pb target, scaling behaviour of tensor analyzing power (A yy ) in the inelastic scattering or relativistic deuterons,two-photon collisions at very low Q 2 from LEP2: forthcoming results, high magnetic field uniformity superconducting magnet for a movable polarized target, multichannel time-to-digital converter for drift detector and wavelet-analysis: application to Gaussian signals

  17. JINR rapid communications

    International Nuclear Information System (INIS)

    1995-01-01

    The present collection of rapid communications from JINR, Dubna, contains eight separate reports on the measurement of charge radii for Ti nuclei, spectroscopy of 13 Be, concentrations of hadrons and quark-gluon plasma in mixed phase, experimental results on one-spin pion asymmetry in the d↑ + A → π±(90 0 ) + X process, new results on cumulative pion and proton production in p-D collisions, investigation of charge exchange reactions, the study of the tensor analyzing power in cumulative particle production on a deuteron beam and an evidence for the excited states of the S = -2 stable light dibaryon. 32 figs., 6 tabs

  18. JINR rapid communications

    International Nuclear Information System (INIS)

    1996-01-01

    The present collection of rapid communications from JINR, Dubna, contains five separate reports on analytic QCD running coupling with finite IR behaviour and universal α bar s (0) value, quark condensate in the interacting pion- nucleon medium at finite temperature and baryon number density, γ-π 0 discrimination with a shower maximum detector using neural networks for the solenoidal tracker at RHIC, off-specular neutron reflection from magnetic media with nondiagonal reflectivity matrices and molecular cytogenetics of radiation-induced gene mutations in Drosophila melanogaster. 21 fig., 1 tab

  19. JINR rapid communications

    International Nuclear Information System (INIS)

    1999-01-01

    The present collection of rapid communications from JINR, Dubna, contains seven separate records on additional conditions on eigenvectors in solving inverse problem for two-dimensional Schroedinger equation, on an absolute calibration of deuteron beam polarization at LHE, determination of the vector component of the polarization of the JINR synchrophasotron deuteron beam, wavelet-analysis: criterion of reliable signal selection, on asymptotics in inclusive production of antinuclei and nuclear fragments, use of neutron activation analysis at the IBR-2 reactor for atmospheric monitoring and impulse method for temperature measurement of silicon detectors

  20. JINR rapid communications

    International Nuclear Information System (INIS)

    1995-01-01

    The present collection of rapid communications from JINR, Dubna, contains six separate reports on Monte Carlo simulation of silicon detectors for the ALICE experiment at LHC, a study of single tagged multihadronic γγ* events at an average Q 2 of 90 GeV 2 , epithermal neutron activation analysis of moss, lichen and pine needles in atmospheric deposition monitoring, the theory of neutrino oscillation, coupled quadrupole and monopole vibrations of large amplitude and test of the Ellis-Jaffe sum rule using parametrization of the measured lepton-proton asymmetry. 21 figs., 18 tabs

  1. Rapidly variable relatvistic absorption

    Science.gov (United States)

    Parker, M.; Pinto, C.; Fabian, A.; Lohfink, A.; Buisson, D.; Alston, W.; Jiang, J.

    2017-10-01

    I will present results from the 1.5Ms XMM-Newton observing campaign on the most X-ray variable AGN, IRAS 13224-3809. We find a series of nine absorption lines with a velocity of 0.24c from an ultra-fast outflow. For the first time, we are able to see extremely rapid variability of the UFO features, and can link this to the X-ray variability from the inner accretion disk. We find a clear flux dependence of the outflow features, suggesting that the wind is ionized by increasing X-ray emission.

  2. Rapid identification of DNA-binding proteins by mass spectrometry

    DEFF Research Database (Denmark)

    Nordhoff, E.; Korgsdam, A.-M.; Jørgensen, H.F.

    1999-01-01

    We report a protocol for the rapid identification of DNA-binding proteins. Immobilized DNA probes harboring a specific sequence motif are incubated with cell or nuclear extract. Proteins are analyzed directly off the solid support by matrix-assisted laser desorption/ionization time-of-flight mass...... was validated by the identification of known prokaryotic and eukaryotic DNA-binding proteins, and its use provided evidence that poly(ADP-ribose) polymerase exhibits DNA sequence-specific binding to DNA....

  3. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  4. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  5. Design and Simulation of a High Performance Emergency Data Delivery Protocol

    DEFF Research Database (Denmark)

    Swartz, Kevin; Wang, Di

    2007-01-01

    The purpose of this project was to design a high performance data delivery protocol, capable of delivering data as quickly as possible to a base station or target node. This protocol was designed particularly for wireless network topologies, but could also be applied towards a wired system....... An emergency is defined as any event with high priority that needs to be handled immediately. It is assumed that this emergency event is important enough that energy efficiency is not a factor in our protocol. The desired effect is for fast as possible delivery to the base station for rapid event handling....

  6. Byzantine-fault tolerant self-stabilizing protocol for distributed clock synchronization systems

    Science.gov (United States)

    Malekpour, Mahyar R. (Inventor)

    2010-01-01

    A rapid Byzantine self-stabilizing clock synchronization protocol that self-stabilizes from any state, tolerates bursts of transient failures, and deterministically converges within a linear convergence time with respect to the self-stabilization period. Upon self-stabilization, all good clocks proceed synchronously. The Byzantine self-stabilizing clock synchronization protocol does not rely on any assumptions about the initial state of the clocks. Furthermore, there is neither a central clock nor an externally generated pulse system. The protocol converges deterministically, is scalable, and self-stabilizes in a short amount of time. The convergence time is linear with respect to the self-stabilization period.

  7. Rapid Geophysical Surveyor

    International Nuclear Information System (INIS)

    Roybal, L.G.; Carpenter, G.S.; Josten, N.E.

    1993-01-01

    The Rapid Geophysical Surveyor (RGS) is a system designed to rapidly and economically collect closely-spaced geophysical data used for characterization of US Department of Energy waste sites. Geophysical surveys of waste sites are an important first step in the remediation and closure of these sites; especially older sites where historical records are inaccurate and survey benchmarks have changed because of refinements in coordinate controls and datum changes. Closely-spaced data are required to adequately differentiate pits, trenches, and soil vault rows whose edges may be only a few feet from each other. A prototype vehicle designed to collect magnetic field data was built at the Idaho National Engineering Laboratory (INEL) during the summer of 1992. The RGS was funded by the Buried Waste Integrated Demonstration program. This vehicle was demonstrated at the Subsurface Disposal Area (SDA) within the Radioactive Waste Management Complex at the INEL in September 1992. Magnetic data were collected over two areas in the SDA, with a total survey area of about 1.7 acres. Data were collected at a nominal density of 2 1/2 in. along survey lines spaced 1-ft apart. Over 350,000 data points were collected over a 6 day period corresponding to about 185 worker-days using conventional ground survey techniques

  8. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  9. Rapid bioassay for oil-contaminated soil

    Energy Technology Data Exchange (ETDEWEB)

    Ashworth, J. [ALS Environmental, Edmonton, AB (Canada); Oosterbroek, L. [HydroQual, Calgary, AB (Canada)

    2010-07-01

    This PowerPoint presentation described a study conducted to develop a rapid bioassay for soils contaminated with oil. The bioassay method was designed for a weight of evidence (WoE) approach and eco-contact guideline derivation protocol. Microtox bioassays were conducted on cyclodextrin extracts of soil quantified by solvent extraction and gas chromatography. The method was demonstrated using straight {beta}-cyclodextrin soil extracts and activated {beta}-cyclodextrin soil extracts. An analysis of the methods showed that the activation step weakens or breaks the cyclodextrin and polycyclic hydrocarbon (PHC) inclusion complex. The released PHC became toxic to the microtox organism. Results from the bioassays were then correlated with earthworm reproduction bioassay results. tabs., figs.

  10. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  11. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  12. The Virtual Insect Brain protocol: creating and comparing standardized neuroanatomy

    Directory of Open Access Journals (Sweden)

    Schindelin Johannes E

    2006-12-01

    Full Text Available Abstract Background In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. These diverse investigations on the function of the insect brain use gene expression patterns that can be visualized and provide the means for manipulating groups of neurons as a common ground. To take advantage of these patterns one needs to know their typical anatomy. Results This paper describes the Virtual Insect Brain (VIB protocol, a script suite for the quantitative assessment, comparison, and presentation of neuroanatomical data. It is based on the 3D-reconstruction and visualization software Amira, version 3.x (Mercury Inc. 1. Besides its backbone, a standardization procedure which aligns individual 3D images (series of virtual sections obtained by confocal microscopy to a common coordinate system and computes average intensities for each voxel (volume pixel the VIB protocol provides an elaborate data management system for data administration. The VIB protocol facilitates direct comparison of gene expression patterns and describes their interindividual variability. It provides volumetry of brain regions and helps to characterize the phenotypes of brain structure mutants. Using the VIB protocol does not require any programming skills since all operations are carried out at an intuitively usable graphical user interface. Although the VIB protocol has been developed for the standardization of Drosophila neuroanatomy, the program structure can be used for the standardization of other 3D structures as well. Conclusion Standardizing brains and gene expression patterns is a new approach to biological shape and its variability. The VIB protocol provides a first set of tools supporting this endeavor in Drosophila. The script suite is freely available at http://www.neurofly.de2

  13. The Virtual Insect Brain protocol: creating and comparing standardized neuroanatomy

    Science.gov (United States)

    Jenett, Arnim; Schindelin, Johannes E; Heisenberg, Martin

    2006-01-01

    Background In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. These diverse investigations on the function of the insect brain use gene expression patterns that can be visualized and provide the means for manipulating groups of neurons as a common ground. To take advantage of these patterns one needs to know their typical anatomy. Results This paper describes the Virtual Insect Brain (VIB) protocol, a script suite for the quantitative assessment, comparison, and presentation of neuroanatomical data. It is based on the 3D-reconstruction and visualization software Amira, version 3.x (Mercury Inc.) [1]. Besides its backbone, a standardization procedure which aligns individual 3D images (series of virtual sections obtained by confocal microscopy) to a common coordinate system and computes average intensities for each voxel (volume pixel) the VIB protocol provides an elaborate data management system for data administration. The VIB protocol facilitates direct comparison of gene expression patterns and describes their interindividual variability. It provides volumetry of brain regions and helps to characterize the phenotypes of brain structure mutants. Using the VIB protocol does not require any programming skills since all operations are carried out at an intuitively usable graphical user interface. Although the VIB protocol has been developed for the standardization of Drosophila neuroanatomy, the program structure can be used for the standardization of other 3D structures as well. Conclusion Standardizing brains and gene expression patterns is a new approach to biological shape and its variability. The VIB protocol provides a first set of tools supporting this endeavor in Drosophila. The script suite is freely available at [2] PMID:17196102

  14. Rapid automated nuclear chemistry

    International Nuclear Information System (INIS)

    Meyer, R.A.

    1979-01-01

    Rapid Automated Nuclear Chemistry (RANC) can be thought of as the Z-separation of Neutron-rich Isotopes by Automated Methods. The range of RANC studies of fission and its products is large. In a sense, the studies can be categorized into various energy ranges from the highest where the fission process and particle emission are considered, to low energies where nuclear dynamics are being explored. This paper presents a table which gives examples of current research using RANC on fission and fission products. The remainder of this text is divided into three parts. The first contains a discussion of the chemical methods available for the fission product elements, the second describes the major techniques, and in the last section, examples of recent results are discussed as illustrations of the use of RANC

  15. JINR rapid communications

    International Nuclear Information System (INIS)

    1999-01-01

    The present collection of rapid communications from JINR, DUBNA, contains eight separate records on symmetry in modern physics (dedicated to the 100th anniversary of the birth of academician V.A.Fock), the double φ-meson production investigation on the Serpukhov accelerator, two-leptonic η-meson decays and SUSY without R parity, charge form factors and alpha-cluster internal structure of 12 C, increasing of muon-track reconstruction efficiency in ME1/1 Dubna prototype for the CMS/LHC, study of photon-structure function F 2 γ in the reaction e + e - → e + e - + hadrons at LEP2, jets reconstruction possibility in pAu and AuAu interactions at STAR RHIC and high-vacuum nondispersable gas absorber

  16. Rapid thermal pulse annealing

    International Nuclear Information System (INIS)

    Miller, M.G.; Koehn, B.W.; Chaplin, R.L.

    1976-01-01

    Characteristics of recovery processes have been investigated for cases of heating a sample to successively higher temperatures by means of isochronal annealing or by using a rapid pulse annealing. A recovery spectra shows the same features independent of which annealing procedure is used. In order to determine which technique provides the best resolution, a study was made of how two independent first-order processes are separated for different heating rates and time increments of the annealing pulses. It is shown that the pulse anneal method offers definite advantages over isochronal annealing when annealing for short time increments. Experimental data by means of the pulse anneal techniques are given for the various substages of stage I of aluminium. (author)

  17. JINR rapid communications

    International Nuclear Information System (INIS)

    1996-01-01

    The present collection of rapid communications from JINR, Dubna, contains seven separate reports on the identification of events with a secondary vertex in the experiment EXCHARM, the zero degree calorimeter for CERN WA-98 experiment, a new approach to increase the resource of installation elements for super-high energy physics, a method of the in-flight production of exotic systems in the charge-exchange reactions, the neutron activation analysis for monitoring northern terrestrial ecosystems, a search for 28 O and study of the neutron-rich nuclei near the neutron closure N=20, a search for new neutron-rich nuclei with a 70A MeV 48 Ca beam. 33 figs., 4 tabs

  18. JINR Rapid Communications. Collection

    International Nuclear Information System (INIS)

    1994-01-01

    The present collection of rapid communications from JINR, Dubna, contains nine separate reports on quasi-classical description of one-nucleon transfer reactions with heavy ions, elastic and inelastic scattering in the high energy approximation, experimental study of fission and evaporation cross sections for 6 He + 209 Bi reaction, d ↑ + 12 C → p + X at Θ p = 0 o in the region of high internal momenta in the deuteron, the Nuclotron internal targets, actively screened superconducting magnets, using of polarized target in backward elastic dp scattering, application of transputers in the data acquisition system of the INESS-ALPHA spectrometer, narrow dibaryon resonances with isotopic spin I=2. 93 refs., 27 figs., 4 tabs

  19. JINR Rapid Communications. Collection

    International Nuclear Information System (INIS)

    1994-01-01

    The present collection of rapid communications from JINR, Dubna, contains eight separate reports on Lorentz transformations with superluminal velocities, photo chromic effect in HTSC films, the investigation of hypernuclei in the Nuclotron accelerator, a new hadron jets finding algorithm in the four-dimensional velocity space, investigations of neutral particle production by relativistic nuclei on the LHE 90-channel γ-spectrometer (results and perspectives), coherent meson production in the dp → 3 HeX reaction, the relativistic projectile nuclei fragmentation and A-dependence of nucleon Fermi-momenta, energy spectra of γ-quanta from d-propane interactions at momentum P d = 1.25 GeV/c per nucleon. 86 refs., 26 figs., 4 tabs

  20. JINR rapid communications

    International Nuclear Information System (INIS)

    1999-01-01

    The present collection of rapid communications from JINR, Dubna, contains seven separate records on measurements of the total cross section difference Δσ L (np) at 1.59, 1.79, and 2.20 GeV, to the estimation of angular distributions of double charged spectator fragments in nucleus-nucleus interactions at superhigh energies, simulation dE/dx analysis results for silicon inner tracking system of ALICE set-up at LHC accelerator, high-multiplicity processes, triggering of high-multiplicity events using calorimetry, ORBIT-3.0 - a computer code for simulation and correction of the closed orbit and first turn in synchrotrons and determination of memory performance

  1. JINR rapid communications

    International Nuclear Information System (INIS)

    1999-01-01

    The present collection of rapid communications from JINR, Dubna, contains seven separate records on yields of the rare-earth neutron-deficient isotopes in the reactions of Mo isotopes with 40 Ca ions, observations of slow components of solitonic-type wave structure excited by e-beam in massive copper sample, development and investigation of low-mass multilayer drift chambers (MDC-2) for inner part of the HADES spectrometer, temperature measurement of the uranium sample irradiated with secondary neutrons, edge effects in multiwire proportional chambers, the influence of the dielectric frame, an object-oriented framework for the hadronic Monte-Carlo event generators and uranium-238 as a source for electronuclear power production. 32 figs., 3 tabs

  2. JINR rapid communications

    International Nuclear Information System (INIS)

    1997-01-01

    The present collection of rapid communications from JINR, Dubna, contains nine separate reports on collective energy dissipation and fluctuations in elastoplastic systems, diagnostics system of the circulating beam of the NUCLOTRON based on microchannel plates, time-of-flight detector for WA98 CERN experiment, fractal structure formation on the surfaces of solids subjected to high intensity electron and ion treatment, production of nuclei in 32,34,36 S-induced reactions in the energy range 6-75 MeV/A, rare-earth elements in soil and pine needle from northern terrestrial ecosystems, 'thermal' multifragmentation in p + Au collisions at relativistic energies, search for effects of the OZI rule violation in φ and ω mesons production in polarized deuteron beam interaction with polarized proton target (project DPHE3) and fast detector for triggering on charged particle multiplicity for relativistic nucleus-nucleus collisions

  3. JINR rapid communications

    International Nuclear Information System (INIS)

    1997-01-01

    The present collection of rapid communications from JINR, Dubna, contains seven separate reports on observation of transversal handedness in the diffractive production of pion triples, a possible experiment on the research of dibaryon states, Cherenkov beam counter system of the CERES/NA45 spectrometer for investigation with 160 GeV/n. lead ions, a profile-based gaseous detector with capacitive pad readout as the prototype of the shower maximum detector for the end-cap electromagnetic calorimeter for the STAR experiment, what DELPHI can get with an upgraded position for the very small angle tagger, estimation of the radiation environment and the shielding aspect for the point 2 area of the LHC and the orthopositronium decay puzzle

  4. Rapid chemical separations

    CERN Document Server

    Trautmann, N

    1976-01-01

    A survey is given on the progress of fast chemical separation procedures during the last few years. Fast, discontinuous separation techniques are illustrated by a procedure for niobium. The use of such techniques for the chemical characterization of the heaviest known elements is described. Other rapid separation methods from aqueous solutions are summarized. The application of the high speed liquid chromatography to the separation of chemically similar elements is outlined. The use of the gas jet recoil transport method for nuclear reaction products and its combination with a continuous solvent extraction technique and with a thermochromatographic separation is presented. Different separation methods in the gas phase are briefly discussed and the attachment of a thermochromatographic technique to an on-line mass separator is shown. (45 refs).

  5. JINR rapid communications

    International Nuclear Information System (INIS)

    1997-01-01

    The present collection of rapid communications from JINR, Dubna, contains seven separate reports on investigation of the tensor analyzing power A yy in the reaction A(d polarized, p)X at large transverse momenta of proton, double-differential ionization cross section calculations for fast collisions of ions and atoms, a study of the two-photon interactions tagged at an average 2 > of 90 GeV 2 , cluster and single-particle distributions in nucleus-nucleus interactions, the Coulomb interaction of charged pions in CC-and CTa-collisions at 4.2 A GeV/c, influence of nitrogen and oxygen gas admixtures on the response of the DELPHI HCAL and MUS detectors and an automation of physics research on base of open standards

  6. JINR rapid communications

    International Nuclear Information System (INIS)

    1997-01-01

    The present collection of rapid communications from JINR, Dubna, contains nine separate reports on effects arising from charged particles overcoming of the light velocity barrier, deformable templates for circle recognition, scintillation detectors for precise time measurements, atomic form factors and incoherent scattering functions of atoms and ions with the number of electrons N ≤ 10, experimental set-up ANOMALON for measurement of relativistic nuclear fragmentation cross sections, superconducting dipole magnet for ALICE dimuon arm spectrometer, analysis of transverse mass dependence of Bose-Einstein correlation radii using the DELPHI data, low-energy theorem in softly broken supersymmetry and study of the characteristics of particles in reactions π - , p, d, He, C + C with the total disintegration on carbon nucleus

  7. JINR rapid communications

    International Nuclear Information System (INIS)

    1998-01-01

    The present collection of rapid communications from JINR, Dubna, contains six separate records on test of a threshold aerogel Cherenkov counter on cosmic particles, first results of study of transversal dimension of region of cumulative particles production in d + C and d + Cu reactions for energy 2 GeV/nucleon, the evidence of σ[0 + (0 ++ 0)] meson at a mass of M π + π - = 750 ± 5 MeV/c 2 observed in π + π - combinations from the reaction np → npπ + π - at an incident momentum of P n (5.20 ± 0.16 GeV/c, inclusive spectra of protons and π - mesons emitted in 4 HeC and 12 CC interactions with total disintegration of nuclei, heavy quark-antiquark pair production by double pomeron exchange in pp and AA collisions on the CMS and global features of nucleus-nucleus collisions in ultrarelativistic domain

  8. Rapid Refresh (RAP) [13 km

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Rapid Refresh (RAP) numerical weather model took the place of the Rapid Update Cycle (RUC) on May 1, 2012. Run by the National Centers for Environmental...

  9. Rapid Refresh (RAP) [20 km

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Rapid Refresh (RAP) numerical weather model took the place of the Rapid Update Cycle (RUC) on May 1, 2012. Run by the National Centers for Environmental...

  10. Rapid population growth.

    Science.gov (United States)

    1972-01-01

    At the current rate of population growth, world population by 2000 is expected to reach 7 billion or more, with developing countries accounting for some 5.4 billion, and economically advanced nations accounting for 1.6 billion. 'Population explosion' is the result of falling mortality rates and continuing high birth rates. Many European countries, and Japan, have already completed what is termed as demographic transition, that is, birth rates have fallen to below 20 births per 1000 population, death rates to 10/1000 population, and annual growth rates are 1% or less; annual growth rates for less developed countries ranged from 2 to 3.5%. Less developed countries can be divided into 3 groups: 1) countries with both high birth and death rates; 2) countries with high birth rates and low death rates; and 3) countries with intermediate and declining birth rates and low death rates. Rapid population growth has serious economic consequences. It encourages inequities in income distribution; it limits rate of growth of gross national product by holding down level of savings and capital investments; it exerts pressure on agricultural production and land; and it creates unemployment problems. In addition, the quality of education for increasing number of chidren is adversely affected, as high proportions of children reduce the amount that can be spent for the education of each child out of the educational budget; the cost and adequacy of health and welfare services are affected in a similar way. Other serious consequences of rapid population growth are maternal death and illness, and physical and mental retardation of children of very poor families. It is very urgent that over a billion births be prevented in the next 30 years to reduce annual population growth rate from the current 2% to 1% per year.

  11. Rapid geophysical surveyor

    International Nuclear Information System (INIS)

    Roybal, L.G.; Carpenter, G.S.; Josten, N.E.

    1993-01-01

    The Rapid Geophysical Surveyor (RGS) is a system designed to rapidly and economically collect closely-spaced geophysical data used for characterization of Department of Energy (DOE) waste sites. Geophysical surveys of waste sites are an important first step in the remediation and closure of these sites; especially older sties where historical records are inaccurate and survey benchmarks have changed due to refinements in coordinate controls and datum changes. Closely-spaced data are required to adequately differentiate pits, trenches, and soil vault rows whose edges may be only a few feet from each other. A prototype vehicle designed to collect magnetic field data was built at the Idaho national Engineering Laboratory (INEL) during the summer of 1992. The RGS was one of several projects funded by the Buried Waste Integrated Demonstration (BWID) program. This vehicle was demonstrated at the Subsurface Disposal Area (SDA) within the Radioactive Waste Management Complex (RWMC) on the INEL in September of 1992. Magnetic data were collected over two areas in the SDA, with a total survey area of about 1.7 acres. Data were collected at a nominal density of 2 1/2 inches along survey lines spaced 1 foot apart. Over 350,000 data points were collected over a 6 day period corresponding to about 185 man-days using conventional ground survey techniques. This report documents the design and demonstration of the RGS concept including the presentation of magnetic data collected at the SDA. The surveys were able to show pit and trench boundaries and determine details of their spatial orientation never before achieved

  12. RapidIO as a multi-purpose interconnect

    Science.gov (United States)

    Baymani, Simaolhoda; Alexopoulos, Konstantinos; Valat, Sébastien

    2017-10-01

    RapidIO (http://rapidio.org/) technology is a packet-switched high-performance fabric, which has been under active development since 1997. Originally meant to be a front side bus, it developed into a system level interconnect which is today used in all 4G/LTE base stations world wide. RapidIO is often used in embedded systems that require high reliability, low latency and scalability in a heterogeneous environment - features that are highly interesting for several use cases, such as data analytics and data acquisition (DAQ) networks. We will present the results of evaluating RapidIO in a data analytics environment, from setup to benchmark. Specifically, we will share the experience of running ROOT and Hadoop on top of RapidIO. To demonstrate the multi-purpose characteristics of RapidIO, we will also present the results of investigating RapidIO as a technology for high-speed DAQ networks using a generic multi-protocol event-building emulation tool. In addition we will present lessons learned from implementing native ports of CERN applications to RapidIO.

  13. Oral breathing: new early treatment protocol

    Directory of Open Access Journals (Sweden)

    Gloria Denotti

    2014-01-01

    Full Text Available Oral breathing is a respiratory dysfunction that affects approximately 10-15% of child population. It is responsable of local effects and systemic effects, both immediate and long-term. They affect the growth of the subject and his physical health in many ways: pediatric, psycho-behavioral and cognitive. The etiology is multifactorial. It’s important the establishment of a vicious circle involving more areas and it is essential to stop it as soon as possible. In order to correct this anomaly, the pediatric dentist must be able to make a correct diagnosis to treat early the disfunction and to avoid the onset of cascade mechanisms. Who plays a central role is the pediatrician who first and frequently come into contact with little patients. He can identify the anomalies, and therefore collaborate with other specialists, including the dentist. The key aspect that guides us in the diagnosis, and allows us to identify the oral respirator, is the “adenoid facies”. The purpose of the study is to highlight the importance and benefits of an early and multidisciplinary intervention (pediatric, orthopedic-orthodontic-functional. A sample of 20 patients was selected with the following inclusion criteria: mouth breathing, transverse discrepancy > 4 mm, early mixed dentition, central and lateral permenent incisors, overjet increased, lip and nasal incompetence, snoring and/or sleep apnea episodes. The protocol of intervention includes the use of the following devices and procedures: a maxillary rapid expander (to correct the transverse discrepancy, to increase the amplitude of the upper respiratory airway and to reduce nasal resistances tract in association with myo-functional devices (nasal stimulator and oral obturator. They allow the reconstruction of a physiological balance between the perioral musculature and tongue, the acquisition of nasal and lips competence and the reduction of overjet. This protocol speeds up and stabilizes the results. The

  14. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  15. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  16. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  17. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  18. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  19. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  20. High Entropy Random Selection Protocols

    NARCIS (Netherlands)

    H. Buhrman (Harry); M. Christandl (Matthias); M. Koucky (Michal); Z. Lotker (Zvi); B. Patt-Shamir; M. Charikar; K. Jansen; O. Reingold; J. Rolim

    2007-01-01

    textabstractIn this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome.

  1. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  2. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  3. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  4. Enhancing creative cognition with a rapid right-parietal neurofeedback procedure.

    Science.gov (United States)

    Agnoli, Sergio; Zanon, Marco; Mastria, Serena; Avenanti, Alessio; Corazza, Giovanni Emanuele

    2018-02-14

    The present article describes an innovative neurofeedback training (NFT) procedure aimed at increasing creative cognition through the enhancement of specific brain activities previously associated with divergent thinking. We designed and tested two NFT protocols based on training alpha and beta EEG oscillations selectively measured over the right parietal region. A total of 80 participants were involved, 40 in the alpha NFT protocol and 40 in the beta NFT protocol. The NFT loop was closed on a video stream that would advance only when oscillation power exceeded a normalized threshold. The total duration of the protocol was two hours in a single day, hence its classification as rapid. Changes in ideational fluency and originality, measured with a divergent thinking task, were compared between participants receiving real video feedback and participants receiving sham feedback. We controlled for individual differences in creative achievement level. Results showed that the protocols were effective at enhancing alpha and beta activities in the targeted area. Differences between the two protocols emerged in their effectiveness at promoting divergent thinking. While no significant changes in originality resulted from the rapid alpha NFT, increases in both originality and fluency emerged as a consequence of the rapid beta NFT. These results were particularly evident in participants starting with a low creative achievement level. Possible interpretations and future directions are proposed and discussed. Copyright © 2018 Elsevier Ltd. All rights reserved.

  5. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  6. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.

    Science.gov (United States)

    Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng

    2018-04-01

     With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated.  Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks.  The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS.  We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features

  7. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKDS

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A novel Multiple Access Control(MAC) protocol-User-dependent Perfect-scheduling Multiple Access(UPMA) protocol,which supports joint transmission of voice and data packets,is proposed.By this protocol,the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals(MTs) can be perfectly scheduled by means of polling.Meanwhile.a unique frame stucture is designed to guarantee Quality of Service(QoS) in voice traffic supporting.An effective colision resolution algorthm is also proposed to guarantee rapid channel access for activated MTs.Finally,performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  8. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  9. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  10. Rapid Evaporation of microbubbles

    Science.gov (United States)

    Gautam, Jitendra; Esmaeeli, Asghar

    2008-11-01

    When a liquid is heated to a temperature far above its boiling point, it evaporates abruptly. Boiling of liquid at high temperatures can be explosive and destructive, and poses a potential hazard for a host of industrial processes. Explosive boiling may occur if a cold and volatile liquid is brought into contact with a hot and non-volatile liquid, or if a liquid is superheated or depressurized rapidly. Such possibilities are realized, for example, in the depressurization of low boiling point liquefied natural gas (LNG) in the pipelines or storage tanks as a result of a leak. While boiling of highly heated liquids can be destructive at macroscale, the (nearly) instantaneous pace of the process and the release of large amount of kinetic energy make the phenomena extremely attractive at microscale where it is possible to utilize the released energy to derive micromechanical systems. For instance, there is currently a growing interest in micro-explosion of liquid for generation of micro bubbles for actuation purposes. The aim of the current study is to gain a fundamental understanding of the subject using direct numerical simulations. In particular, we seek to investigate the boundary between stable and unstable nucleus growth in terms of the degree of liquid superheat and to compare the dynamics of unstable and stable growth.

  11. Rapid flow imaging method

    International Nuclear Information System (INIS)

    Pelc, N.J.; Spritzer, C.E.; Lee, J.N.

    1988-01-01

    A rapid, phase-contrast, MR imaging method of imaging flow has been implemented. The method, called VIGRE (velocity imaging with gradient recalled echoes), consists of two interleaved, narrow flip angle, gradient-recalled acquisitions. One is flow compensated while the second has a specified flow encoding (both peak velocity and direction) that causes signals to contain additional phase in proportion to velocity in the specified direction. Complex image data from the first acquisition are used as a phase reference for the second, yielding immunity from phase accumulation due to causes other than motion. Images with pixel values equal to MΔΘ where M is the magnitude of the flow compensated image and ΔΘ is the phase difference at the pixel, are produced. The magnitude weighting provides additional vessel contrast, suppresses background noise, maintains the flow direction information, and still allows quantitative data to be retrieved. The method has been validated with phantoms and is undergoing initial clinical evaluation. Early results are extremely encouraging

  12. JINR rapid communications

    International Nuclear Information System (INIS)

    1995-01-01

    The present collection of rapid communications from JINR, Dubna, contains twelve separate reports on an estimation of the possibility of fusion reactions in water molecules, an analysis of pion spectra of the charge-exchange reaction Mg(t, 3 He), the results of simulation of e + e - pair production and detection in the ALICE experiment, the data on the edge effects in multiwire proportional chambers, standard and nonstandard applications of wavelet analysis, the design and study of light readout system for scintillator shower maximum detector for the endcap electromagnetic calorimeter for the STAR experiment at RHIC, a study of multiparticle azimuthal correlations in high energy interactions, coherent multifragmentation of relativistic nuclei, superposition of neutrino eigenstates and neutrino oscillation, simulation results and suggestions for possible design of gaseous shower maximum detector for the endcap electromagnetic calorimeter for the STAR experiment at RHIC, determination of the sizes of the pion emission region in np-interactions at P n =(5.2±0.16)GeV/c using the interference correlation method for identical particles, inelasticity of nucleus-nucleus collisions in the CMS experiment. 65 figs., 19 tabs

  13. Rapid Polymer Sequencer

    Science.gov (United States)

    Stolc, Viktor (Inventor); Brock, Matthew W (Inventor)

    2013-01-01

    Method and system for rapid and accurate determination of each of a sequence of unknown polymer components, such as nucleic acid components. A self-assembling monolayer of a selected substance is optionally provided on an interior surface of a pipette tip, and the interior surface is immersed in a selected liquid. A selected electrical field is impressed in a longitudinal direction, or in a transverse direction, in the tip region, a polymer sequence is passed through the tip region, and a change in an electrical current signal is measured as each polymer component passes through the tip region. Each of the measured changes in electrical current signals is compared with a database of reference electrical change signals, with each reference signal corresponding to an identified polymer component, to identify the unknown polymer component with a reference polymer component. The nanopore preferably has a pore inner diameter of no more than about 40 nm and is prepared by heating and pulling a very small section of a glass tubing.

  14. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  15. [Castleman's disease: Rapid desensitization for hypersensitivity reaction to rituximab].

    Science.gov (United States)

    Boin, C; Lambert, S; Thomann, P; Aujoulat, O; Kieffer, P

    2016-06-01

    Rapid desensitization allows secure administration of a drug and is indicated when there is no therapeutic alternative. We report a 49-year-old patient who presented with a hypersensitivity reaction following an infusion of rituximab (375mg/m(2)) in the context of a Castleman's syndrome. After a clinical flare (splenomegaly, adenopathies) despite treatment with tocilizumab, anakinra and valganciclovir, the reintroduction of rituximab was decided, according to the rapid desensitization protocol. Four full dose desensitizations were successfully performed allowing immediate clinical improvement (apyrexia, loss of sweating and lymphadenopathy, splenomegaly partial regression) and biological (negativation of HHV8 viral load, and disappearance of neutropenia, anemia and thrombocytopenia). Rapid desensitization is a promising method for the pursuit of rituximab therapy after a hypersensitivity reaction and should be considered in patients with no acceptable therapeutic alternative. Copyright © 2015 Société Nationale Française de Médecine Interne (SNFMI). Published by Elsevier SAS. All rights reserved.

  16. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  17. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  18. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  19. An approach for evaluating the repeatability of rapid wetland assessment methods: The effects of training and experience

    Science.gov (United States)

    We sampled 92 wetlands from four different basins in the United States to quantify observer repeatability in rapid wetland condition assessment using the Delaware Rapid Assessment Protocol (DERAP). In the Inland Bays basin of Delaware, 58 wetland sites were sampled by multiple ob...

  20. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  1. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  2. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  3. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  4. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  5. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  6. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  7. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  8. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  9. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  10. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  11. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  12. Massive transfusion protocols: current best practice

    Directory of Open Access Journals (Sweden)

    Hsu YM

    2016-03-01

    Full Text Available Yen-Michael S Hsu,1 Thorsten Haas,2 Melissa M Cushing1 1Department of Pathology and Laboratory Medicine, Weill Cornell Medical College, New York, NY, USA; 2Department of Anesthesia, University Children's Hospital Zurich, Zurich, Switzerland Abstract: Massive transfusion protocols (MTPs are established to provide rapid blood replacement in a setting of severe hemorrhage. Early optimal blood transfusion is essential to sustain organ perfusion and oxygenation. There are many variables to consider when establishing an MTP, and studies have prospectively evaluated different scenarios and patient populations to establish the best practices to attain improved patient outcomes. The establishment and utilization of an optimal MTP is challenging given the ever-changing patient status during resuscitation efforts. Much of the MTP literature comes from the trauma population, due to the fact that massive hemorrhage is the leading cause of preventable trauma-related death. As we come to further understand the positive and negative clinical impacts of transfusion-related factors, massive transfusion practice can be further refined. This article will first discuss specific MTPs targeting different patient populations and current relevant international guidelines. Then, we will examine a wide selection of therapeutic products to support MTPs, including newly available products and the most suitable of the traditional products. Lastly, we will discuss the best design for an MTP, including ratio-based MTPs and MTPs based on the use of point-of-care coagulation diagnostic tools. Keywords: hemorrhage, MTP, antifibrinolytics, coagulopathy, trauma, ratio, logistics, guidelines, hemostatic

  13. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  14. A Survey on Temperature-Aware Routing Protocols in Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sangman Moh

    2013-08-01

    Full Text Available The rapid growth of the elderly population in the world and the rising cost of healthcare impose big issues for healthcare and medical monitoring. A Wireless Body Sensor Network (WBSN is comprised of small sensor nodes attached inside, on or around a human body, the main purpose of which is to monitor the functions and surroundings of the human body. However, the heat generated by the node’s circuitry and antenna could cause damage to the human tissue. Therefore, in designing a routing protocol for WBSNs, it is important to reduce the heat by incorporating temperature into the routing metric. The main contribution of this paper is to survey existing temperature-aware routing protocols that have been proposed for WBSNs. In this paper, we present a brief overview of WBSNs, review the existing routing protocols comparatively and discuss challenging open issues in the design of routing protocols.

  15. A Good IDS Response Protocol of MANET Containment Strategies

    Science.gov (United States)

    Cheng, Bo-Chao; Chen, Huan; Tseng, Ryh-Yuh

    Much recent research concentrates on designing an Intrusion Detection System (IDS) to detect the misbehaviors of the malicious node in MANET with ad-hoc and mobility natures. However, without rapid and appropriate IDS response mechanisms performing follow-up management services, even the best IDS cannot achieve the desired primary goal of the incident response. A competent containment strategy is needed to limit the extent of an attack in the Incident Response Life Cycle. Inspired by the T-cell mechanisms in the human immune system, we propose an efficient MANET IDS response protocol (T-SecAODV) that can rapidly and accurately disseminate alerts of the malicious node attacks to other nodes so as to modify their AODV routing tables to isolate the malicious nodes. Simulations are conducted by the network simulator (Qualnet), and the experiment results indicate that T-SecAODV is able to spread alerts steadily while greatly reduce faulty rumors under simultaneous multiple malicious node attacks.

  16. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  17. Rapid control prototyping - new technologies and tools; Rapid Control Prototyping - neue Moeglichkeiten und Werkzeuge

    Energy Technology Data Exchange (ETDEWEB)

    Otterbach, R.; Eckmann, M.; Mertens, F. [dSPACE GmbH, Paderborn (Germany)

    2004-06-01

    The paper presents the status quo in rapid control prototyping (RCP) and discusses further developments of this technology. The complete functional chain, from sensors to data preprocessing and the real-time processor, right through to control of the actuators, is created as an integrated hardware and software solution. The greatest flexibility and configurability are achieved with a modular platform concept that includes signal conditioning and power stages. The architecture of modern microcontrollers and electronic control units (ECUs) result in new requirements in the field of bypassing. These are fulfilled by appropriate solutions based on on-chip debug interfaces and standardized data protocols on serial busses. RCP support for developing networked, time-triggered vehicle systems, and the particular requirements for the tool environment, are described using FlexRay as an example. (orig.)

  18. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  19. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  20. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  1. Protocol: An updated integrated methodology for analysis of metabolites and enzyme activities of ethylene biosynthesis

    Directory of Open Access Journals (Sweden)

    Geeraerd Annemie H

    2011-06-01

    Full Text Available Abstract Background The foundations for ethylene research were laid many years ago by researchers such as Lizada, Yang and Hoffman. Nowadays, most of the methods developed by them are still being used. Technological developments since then have led to small but significant improvements, contributing to a more efficient workflow. Despite this, many of these improvements have never been properly documented. Results This article provides an updated, integrated set of protocols suitable for the assembly of a complete picture of ethylene biosynthesis, including the measurement of ethylene itself. The original protocols for the metabolites 1-aminocyclopropane-1-carboxylic acid and 1-(malonylaminocyclopropane-1-carboxylic acid have been updated and downscaled, while protocols to determine in vitro activities of the key enzymes 1-aminocyclopropane-1-carboxylate synthase and 1-aminocyclopropane-1-carboxylate oxidase have been optimised for efficiency, repeatability and accuracy. All the protocols described were optimised for apple fruit, but have been proven to be suitable for the analysis of tomato fruit as well. Conclusions This work collates an integrated set of detailed protocols for the measurement of components of the ethylene biosynthetic pathway, starting from well-established methods. These protocols have been optimised for smaller sample volumes, increased efficiency, repeatability and accuracy. The detailed protocol allows other scientists to rapidly implement these methods in their own laboratories in a consistent and efficient way.

  2. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  3. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  4. Rapid prototyping: een veelbelovende methode

    NARCIS (Netherlands)

    Haverman, T.M.; Karagozoglu, K.H.; Prins, H.; Schulten, E.A.J.M.; Forouzanfar, T.

    2013-01-01

    Rapid prototyping is a method which makes it possible to produce a three-dimensional model based on two-dimensional imaging. Various rapid prototyping methods are available for modelling, such as stereolithography, selective laser sintering, direct laser metal sintering, two-photon polymerization,

  5. Protein blotting protocol for beginners.

    Science.gov (United States)

    Petrasovits, Lars A

    2014-01-01

    The transfer and immobilization of biological macromolecules onto solid nitrocellulose or nylon (polyvinylidene difluoride (PVDF)) membranes subsequently followed by specific detection is referred to as blotting. DNA blots are called Southerns after the inventor of the technique, Edwin Southern. By analogy, RNA blots are referred to as northerns and protein blots as westerns (Burnette, Anal Biochem 112:195-203, 1981). With few exceptions, western blotting involves five steps, namely, sample collection, preparation, separation, immobilization, and detection. In this chapter, protocols for the entire process from sample collection to detection are described.

  6. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  7. Rapid Prototyping of Power Management Protocols for Sensor Networks: A Case Study

    National Research Council Canada - National Science Library

    Arumugam, Mahesh; Wang, Limin; Kulkarni, Sandeep

    2006-01-01

    .... Specifically, existing programming platforms for sensor networks (e.g., nesC/TinyOS) use an event-driven programming model and, hence, require the designers to be responsible for stack management, buffer management, flow control, etc...

  8. development and field test of a protocol for the rapid assessment

    African Journals Online (AJOL)

    energy malnutrition through .... prolonged intake of vitamin supplementation in adults. Table I ... VitaminC. Table Ill. Frequency of consumption of selected foods during the ..... function at the critical periods of organogenesis and embryonic.

  9. A statistical frame based TDMA protocol for human body communication.

    Science.gov (United States)

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-07-09

    Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidly to the burst traffic triggered by sensing events. Those burst traffic conditions include vital physical signal (electrocardiogram, electroencephalogram etc.) monitoring, human motion detection (fall detection, activity monitoring, gesture recognition, motion sensing etc.) and so on. To cope with aforementioned challenges, a statistical frame based TDMA (S-TDMA) protocol with multi-constrained (energy, delay, transmission efficiency and emergency management) service is proposed in this paper. The scenarios where burst traffic is often triggered rapidly with low power consumption and low delay is handled in our proposed S-TDMA. A beacon frame with the contained synchronous and poll information is designed to reduce the possibility of collisions of request frames. A statistical frame which broadcasts the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. Dynamic time slot allocation mechanism is presented to manage the burst traffic and reduce the active period in each beacon period. An emergency mechanism is proposed for vital signals to be transmitted. The theory analysis is proceed and the result is evaluated in the hardware platform. To verify its feasibility, S-TDMA was fully implemented on our independently-developed HBC platform where four sensor nodes and a coordinator are fastened on a human body. Experiment results show that S-TDMA costs 89.397 mJ every 20 s when the payload size is 122 bytes, 9.51% lower than Lightweight MAC

  10. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  11. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  12. Rapid deletion production in fungi via Agrobacterium mediated transformation of OSCAR deletion contructs.

    Science.gov (United States)

    Precise deletion of gene(s) of interest, while leaving the rest of the genome unchanged, provides the ideal product to determine that particular gene’s function in the living organism. In this protocol we describe the OSCAR method of precise and rapid deletion plasmid construction. OSCAR relies on t...

  13. A novel method for perceptual assessment of small room acoustics using rapid sensory analysis

    DEFF Research Database (Denmark)

    Kaplanis, Neofytos; Bech, Søren; Lokki, Tapio

    2016-01-01

    presented with auralized sound over a loudspeaker array and followed a rapid sensory analysis protocol. The elicited attributes and ratings are analyzed and possible links to the acoustical properties of these spaces are discussed. [This study is a part of Marie Curie Network on Dereverberation...

  14. MALDI-TOF mass spectrometry for rapid diagnosis of postoperative endophthalmitis.

    Science.gov (United States)

    Mailhac, Adriane; Durand, Harmonie; Boisset, Sandrine; Maubon, Danièle; Berger, Francois; Maurin, Max; Chiquet, Christophe; Bidart, Marie

    2017-01-30

    This study describes an innovative strategy for rapid detection and identification of bacteria causing endophthalmitis, combining the use of an automated blood culture system with MALDI-TOF mass spectrometry methodology. Using this protocol, we could identify 96% of 45 bacterial strains isolated from vitreous samples collected in acute post-operative endophthalmitis patients. Copyright © 2016 Elsevier B.V. All rights reserved.

  15. How Rapid is Rapid Prototyping? Analysis of ESPADON Programme Results

    Directory of Open Access Journals (Sweden)

    Ian D. Alston

    2003-05-01

    Full Text Available New methodologies, engineering processes, and support environments are beginning to emerge for embedded signal processing systems. The main objectives are to enable defence industry to field state-of-the-art products in less time and with lower costs, including retrofits and upgrades, based predominately on commercial off the shelf (COTS components and the model-year concept. One of the cornerstones of the new methodologies is the concept of rapid prototyping. This is the ability to rapidly and seamlessly move from functional design to the architectural design to the implementation, through automatic code generation tools, onto real-time COTS test beds. In this paper, we try to quantify the term “rapid” and provide results, the metrics, from two independent benchmarks, a radar and sonar beamforming application subset. The metrics show that the rapid prototyping process may be sixteen times faster than a conventional process.

  16. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  17. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  18. Towards a classification of Tanzanian rivers: a bioassessment and ...

    African Journals Online (AJOL)

    River classification is important for reporting ecological status and for the general ecological management of river systems by partitioning natural variability. A priori river classification by abiotic variables and validation of classifications obtained using aquatic macroinvertebrates from reference sites for selected Tanzanian ...

  19. Quantum feedback for rapid state preparation in the presence of control imperfections

    International Nuclear Information System (INIS)

    Combes, Joshua; Wiseman, Howard M

    2011-01-01

    Quantum feedback control protocols can improve the operation of quantum devices. Here we examine the performance of a purification protocol when there are imperfections in the controls. The ideal feedback protocol produces an x-eigenstate from a mixed state in the minimum time, and is known as rapid state preparation. The imperfections we examine include time delays in the feedback loop, finite strength feedback, calibration errors and inefficient detection. We analyse these imperfections using the Wiseman-Milburn feedback master equation and related formalism. We find that the protocol is most sensitive to time delays in the feedback loop. For systems with slow dynamics, however, our analysis suggests that inefficient detection would be the bigger problem. We also show how system imperfections, such as dephasing and damping, can be included in a model via the feedback master equation.

  20. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  1. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  2. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  3. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  4. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  5. Rapid Continuous Multimaterial Extrusion Bioprinting

    NARCIS (Netherlands)

    Liu, Wanjun; Zhang, Yu Shrike; Heinrich, Marcel A.; De Ferrari, F; Jang, HL; Bakht, SM; Alvarez, MM; Yang, J; Li, YC; Trujillo-de Stantiago, G; Miri, AK; Zhu, K; Khoshakhlagh, P; Prakash, G; Cheng, H; Guan, X; Zhong, Z; Ju, J; Zhu, GH; Jin, X; Ryon Shin, Su; Dokmeci, M.R.; Khademhosseini, Ali

    The development of a multimaterial extrusion bioprinting platform is reported. This platform is capable of depositing multiple coded bioinks in a continuous manner with fast and smooth switching among different reservoirs for rapid fabrication of complex constructs, through digitally controlled

  6. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  7. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  8. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  9. Telomerase Repeated Amplification Protocol (TRAP).

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W

    2015-11-20

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al. , 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC - counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al. , 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  10. A new rapid method for isolating nucleoli.

    Science.gov (United States)

    Li, Zhou Fang; Lam, Yun Wah

    2015-01-01

    The nucleolus was one of the first subcellular organelles to be isolated from the cell. The advent of modern proteomic techniques has resulted in the identification of thousands of proteins in this organelle, and live cell imaging technology has allowed the study of the dynamics of these proteins. However, the limitations of current nucleolar isolation methods hinder the further exploration of this structure. In particular, these methods require the use of a large number of cells and tedious procedures. In this chapter we describe a new and improved nucleolar isolation method for cultured adherent cells. In this method cells are snap-frozen before direct sonication and centrifugation onto a sucrose cushion. The nucleoli can be obtained within a time as short as 20 min, and the high yield allows the use of less starting material. As a result, this method can capture rapid biochemical changes in nucleoli by freezing the cells at a precise time, hence faithfully reflecting the protein composition of nucleoli at the specified time point. This protocol will be useful for proteomic studies of dynamic events in the nucleolus and for better understanding of the biology of mammalian cells.

  11. Rapid multiple immunoenzyme assay of mycotoxins.

    Science.gov (United States)

    Urusov, Alexandr E; Zherdev, Anatoly V; Petrakova, Alina V; Sadykhov, Elchin G; Koroleva, Olga V; Dzantiev, Boris B

    2015-01-27

    Mycotoxins are low molecular weight fungal metabolites that pose a threat as toxic contaminants of food products, thereby necessitating their effective monitoring and control. Microplate ELISA can be used for this purpose, but this method is characteristically time consuming, with a duration extending to several hours. This report proposes a variant of the ELISA method for the detection and quantification of three mycotoxins, ochratoxin A, aflatoxin B1 and zearalenone, in the kinetic regime. The main requirement for the proposed kinetic protocol was to provide a rapid method that combined sensitivity and accuracy. The use of biotin with an extended spacer together with a streptavidin-polyperoxidase conjugate provided high signal levels, despite these interactions occurring under non-equilibrium conditions. Duration of the individual mycotoxin assays was 20 min, whereas the analysis of all three mycotoxins in parallel reached a maximum duration of 25 min. Recovery of at least 95% mycotoxins in water-organic extracts was shown. The developed assays were successfully validated using poultry processing products and corn samples spiked with known quantities of mycotoxins. The detection limits for aflatoxin B1, ochratoxin A and zearalenone in these substances were 0.24, 1.2 and 3 ng/g, respectively.

  12. Rapid Multiple Immunoenzyme Assay of Mycotoxins

    Directory of Open Access Journals (Sweden)

    Alexandr E. Urusov

    2015-01-01

    Full Text Available Mycotoxins are low molecular weight fungal metabolites that pose a threat as toxic contaminants of food products, thereby necessitating their effective monitoring and control. Microplate ELISA can be used for this purpose, but this method is characteristically time consuming, with a duration extending to several hours. This report proposes a variant of the ELISA method for the detection and quantification of three mycotoxins, ochratoxin A, aflatoxin B1 and zearalenone, in the kinetic regime. The main requirement for the proposed kinetic protocol was to provide a rapid method that combined sensitivity and accuracy. The use of biotin with an extended spacer together with a streptavidin–polyperoxidase conjugate provided high signal levels, despite these interactions occurring under non-equilibrium conditions. Duration of the individual mycotoxin assays was 20 min, whereas the analysis of all three mycotoxins in parallel reached a maximum duration of 25 min. Recovery of at least 95% mycotoxins in water-organic extracts was shown. The developed assays were successfully validated using poultry processing products and corn samples spiked with known quantities of mycotoxins. The detection limits for aflatoxin B1, ochratoxin A and zearalenone in these substances were 0.24, 1.2 and 3 ng/g, respectively.

  13. Colour reconnections and rapidity gaps

    International Nuclear Information System (INIS)

    Loennblad, Leif

    1996-01-01

    I argue that the success of recently proposed models describing events with large rapidity gaps in DIS at HERA in terms of non-perturbative colour exchange is heavily reliant on suppression of perturbative gluon emission in the proton direction. There is little or no physical motivation for such suppression and I show that a model without this suppression cannot describe the rapidity gap events at HERA. (author)

  14. A Guide to Writing a Qualitative Systematic Review Protocol to Enhance Evidence-Based Practice in Nursing and Health Care.

    Science.gov (United States)

    Butler, Ashleigh; Hall, Helen; Copnell, Beverley

    2016-06-01

    The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the

  15. A new rapid kindling variant for induction of cortical epileptogenesis in freely moving rats

    Directory of Open Access Journals (Sweden)

    Juan Carlos Morales

    2014-07-01

    Full Text Available Kindling, one of the most used models of experimental epilepsy is based on daily electrical stimulation in several brain structures. Unlike the classic or slow kindling protocols (SK, the rapid kindling types (RK described until now require continuous stimulation at suprathreshold intensities applied directly to the same brain structure used for subsequent electrophysiological and inmunohistochemical studies, usually the hippocampus. However, the cellular changes observed in these rapid protocols, such as astrogliosis and neuronal loss, could be due to experimental manipulation more than to epileptogenesis-related alterations. Here, we developed a new RK protocol in order to generate an improved model of temporal lobe epilepsy (TLE which allows gradual progression of the epilepsy as well as obtaining an epileptic hippocampus, thus avoiding direct surgical manipulation and electric stimulation over this structure. This new protocol consists of basolateral amygdala (BLA stimulation with 10 trains of biphasic pulses (10s;50Hz per day with 20 minutes-intervals, during 3 consecutive days, using a subconvulsive and subthreshold intensity, which guarantees tissue integrity. The progression of epileptic activity was evaluated in freely moving rats through EEG recordings from cortex and amygdala, accompanied with synchronized video recordings. Moreover, we assessed the effectiveness of RK protocol and the establishment of epilepsy by evaluating cellular alterations of hippocampal slices from kindled rats. RK protocol induced convulsive states similar to SK protocols but in 3 days, with persistently lowered threshold to seizure induction and epileptogenic-dependent cellular changes in amygdala projection areas. We concluded that this novel RK protocol introduces a new variant of the chronic epileptogenesis models in freely moving rats, which is faster, highly reproducible and causes minimum cell damage with respect to that observed in other experimental

  16. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  17. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  18. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  19. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  20. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  1. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  2. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  3. Dilepton distributions at backward rapidities

    International Nuclear Information System (INIS)

    Betemps, M. A.; Ducati, M. B. Gay; Oliveira, E. G. de

    2006-01-01

    The dilepton production at backward rapidities in pAu and pp collisions at RHIC and LHC energies is investigated in the dipole approach. The results are shown through the nuclear modification ratio R pA considering transverse momentum and rapidity spectra. The dilepton modification ratio presents interesting behavior at the backward rapidities when compared with the already known forward ones, since it is related with the large x kinematical region that is being probed. The rapidity dependence of the nuclear modification ratio in the dilepton production is strongly dependent on the Bjorken x behavior of the nuclear structure function ratio R F 2 =F 2 A /F 2 p . The R pA transverse momentum dependence at backward rapidities is modified due to the large x nuclear effects: at RHIC energies, for instance, the ratio R pA is reduced as p T increases, presenting an opposite behavior when compared with the forward one. It implies that the dilepton production at backward rapidities should carry information of the nuclear effects at large Bjorken x, as well as that it is useful to investigate the p T dependence of the observables in this kinematical regime

  4. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  5. Software for simulating IMRT protocol

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de, E-mail: tcff@ufmg.b, E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Nuclear

    2009-07-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  6. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de

    2009-01-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  7. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  8. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  9. Generating regionalized neuronal cells from pluripotency, a step-by-step protocol

    Directory of Open Access Journals (Sweden)

    Agnete eKirkeby

    2013-01-01

    Full Text Available Human pluripotent stem cells possess the potential to generate cells for regenerative therapies in patients with neurodegenerative diseases, and constitute an excellent cell source for studying human neural development and disease modeling. Protocols for neural differentiation of human pluripotent stem cells have undergone significant progress during recent years, allowing for rapid and synchronized neural conversion. Differentiation procedures can further be combined with accurate and efficient positional patterning to yield regionalized neural progenitors and subtype-specific neurons corresponding to different parts of the developing human brain. Here, we present a step-by-step protocol for neuralization and regionalization of human pluripotent cells for transplantation studies or in vitro analysis.

  10. Screening Protocol for Early Identification of Brazilian Children at Risk for Dyslexia

    Directory of Open Access Journals (Sweden)

    Giseli D. Germano

    2017-10-01

    Full Text Available Early identification of students at risk of dyslexia has been an educational challenge in the past years. This research had two main goals. First, we aimed to develop a screening protocol for early identification of Brazilian children at risk for dyslexia; second, we aimed to identify the predictive variables of this protocol using Principal Component Analysis. The major step involved in developing this protocol was the selection of variables, which were chosen based on the literature review and linguistic criteria. The screening protocol was composed of seven cognitive-linguistic skills: Letter naming; Phonological Awareness (which comprises the following subtests: Rhyme production, Rhyme identification, Syllabic segmentation, Production of words from a given phoneme, Phonemic Synthesis, and Phonemic analysis; Phonological Working memory, Rapid naming Speed; Silent reading; Reading of words and non-words; and Auditory Comprehension of sentences from pictures. A total of 149 children, aged from 6 years to 6 and 11, of both genders who were enrolled in the 1st grade of elementary public schools were submitted to the screening protocol. Principal Component Analysis revealed four factors, accounting for 64.45% of the variance of the Protocol variables: first factor (“pre-reading”, second factor (“decoding”, third factor (“Reading”, and fourth factor “Auditory processing.” The factors found corroborate those reported in the National and International literature and have been described as early signs of dyslexia and reading problems.

  11. Rapid

    Directory of Open Access Journals (Sweden)

    Nahla M. Wassim

    2013-01-01

    Full Text Available Members of Aedes caspius mosquitoes are incriminated to be a potential reservoir of “Rift Valley Fever Virus” (RVF during interepizootic periods in Egypt. Ae. caspius contains two distinct forms which are morphologically indistinguishable but differ in physiology and behavior; Ae. caspius form (a requires a blood meal for each egg batch(anautogeny, is unable to mate in confined spaces(eurygamous. The second form (b lays egg batch without blood meal (autogenous and can mate in confined spaces (stenogamous. In this work, we collected the autogenous and anautogenous forms of Ae. caspius from two different breeding habitats in the Qalyubia Governorate. Analysis of the Drosophila ace-Orthologous acetylecholinesterase gene revealed that a single polymorphic region characterized each species. Based on this region, specific primers were used to amplify the entire section of intron II, sections of Exon 2 and Exon 3 of ace-2 gene for differentiating the complex species of mosquitoes. The amplicons of anautogenous form sized 441 pb and increase 116 bp than autogenous form of Ae. caspius. High rates of point mutations were addressed; deletion/insertion events are 120 bases. The transversion mutations were 44 bases and were relatively close to the transtion mutations 43 base. The genetic distance was 0.01 between the two forms.

  12. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  13. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  14. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  15. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  16. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  17. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  18. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  19. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  20. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  1. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  2. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  3. Hard diffraction and rapidity gaps

    International Nuclear Information System (INIS)

    Brandt, A.

    1995-09-01

    The field of hard diffraction, which studies events with a rapidity gap and a hard scattering, has expanded dramatically recently. A review of new results from CDF, D OE, H1 and ZEUS will be given. These results include diffractive jet production, deep-inelastic scattering in large rapidity gap events, rapidity gaps between high transverse energy jets, and a search for diffractive W-boson production. The combination of these results gives new insight into the exchanged object, believed to be the pomeron. The results axe consistent with factorization and with a hard pomeron that contains both quarks and gluons. There is also evidence for the exchange of a strongly interacting color singlet in high momentum transfer (36 2 ) events

  4. Effect of a feed/fast protocol on pH in the proximal equine stomach.

    Science.gov (United States)

    Husted, L; Sanchez, L C; Baptiste, K E; Olsen, S N

    2009-09-01

    Risk factors for the development of gastric squamous ulcers include various management procedures, such as intermittent feed deprivation that can occur during weight management regimens or stall and dry lot confinement. To investigate the effect of intermittent feed deprivation relative to continuous feed intake on proximal intragastric pH, specifically in the region of the squamous mucosa of the lesser curvature. In 6 horses, pH electrodes were placed just inside of the oesophageal sphincter in the stomach for each of two 72 h protocols (A and B) in a randomised, cross-over design. Protocol A consisted of 12 h fed, 12 h fasted, 24 h fed and 24 h fasted, in sequence. Protocol B consisted of 72 h fed. During the fed periods of each protocol, horses had ad libitum access to coastal Bermuda hay and were fed sweet feed (1 kg, b.i.d.). Horses had ad libitum access to water at all times. Proximal intragastric pH was significantly lower during protocol A, than during protocol B. However, hourly mean pH was significantly different only during the day and evening hours between protocols. During protocol B, mean proximal pH decreased significantly from 03.00 to 09.00 compared to 19.00 to 23.00 h. A moderate positive correlation of hay intake vs. proximal gastric pH could be established. Intermittent feed deprivation decreased proximal gastric pH in horses relative to those horses for which feed was not restricted. However, the effect was only significant when fasting occurred during the day and evening hours, as a nocturnal decrease in pH occurred simultaneously in the fed horses. Episodes of daytime feed deprivation should be avoided if possible, as proximal gastric acid exposure rapidly increases during such events.

  5. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  6. On the rapid melt quenching

    International Nuclear Information System (INIS)

    Usatyuk, I.I.; Novokhatskij, I.A.; Kaverin, Yu.F.

    1994-01-01

    Specific features of instrumentation of traditionally employed method of melt spinning (rapid quenching), its disadvantages being discussed, were analyzed. The necessity of the method upgrading as applied to the problems of studying fine structure of molten metals and glasses was substantiated. The principle flowsheet of experimental facility for extremely rapid quenching of the melts of metals is described, specificity of its original functional units being considered. The sequence and character of all the principal stages of the method developed were discussed. 18 refs.; 3 figs

  7. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  8. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  9. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  10. Test Protocols for Advanced Inverter Interoperability Functions - Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not now required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already apparent as

  11. Test Protocols for Advanced Inverter Interoperability Functions – Main Document

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not currently required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already

  12. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  13. Rancang Bangun Perangkat Lunak Billing dan Implementasi Voice Over Internet Protocol

    Directory of Open Access Journals (Sweden)

    Honni Honni

    2013-12-01

    Full Text Available The rapidly evolving communication system enables applications for telephone communication to be carried over the data network known as VoIP (voice over internet protocol. SIP (session initiation protocol as the signaling protocol is text-based VoIP which can be implemented easily in comparison with other signalingprotocols. The purpose of this paper is designing and implementing VoIP billing up to the company to provide additional facilities for enterprise customers. The methods start with data collection, analysis, design, development, and implementation. The result achieved is a system of VoIP with SIP and Asterisk software which has functions of PBX to provide additional facilities such as VoIP which is a plus for the company and customers. After implemented, the VoIP system and billing features are found work well.

  14. Economics of "essential use exemptions" for metered-dose inhalers under the Montreal Protocol.

    Science.gov (United States)

    DeCanio, Stephen J; Norman, Catherine S

    2007-10-01

    The Montreal Protocol on Substances that Deplete the Ozone Layer has led to rapid reductions in the use of ozone-depleting substances worldwide. However, the Protocol provides for "essential use exemptions" (EUEs) if there are no "technically and economically feasible" alternatives. An application that might qualify as an "essential use" is CFC-powered medical metered-dose inhalers (MDIs) for the treatment of asthma and chronic obstructive pulmonary disease (COPD), and the US and other nations have applied for exemptions in this case. One concern is that exemptions are necessary to ensure access to medications for low-income uninsureds. We examine the consequences of granting or withholding such exemptions, and conclude that government policies and private-sector programs are available that make it economically feasible to phase out chlorofluorocarbons (CFCs) in this application, thereby furthering the global public health objectives of the Montreal Protocol without compromising the treatment of patients who currently receive medication by means of MDIs.

  15. Advanced CUBIC protocols for whole-brain and whole-body clearing and imaging.

    Science.gov (United States)

    Susaki, Etsuo A; Tainaka, Kazuki; Perrin, Dimitri; Yukinaga, Hiroko; Kuno, Akihiro; Ueda, Hiroki R

    2015-11-01

    Here we describe a protocol for advanced CUBIC (Clear, Unobstructed Brain/Body Imaging Cocktails and Computational analysis). The CUBIC protocol enables simple and efficient organ clearing, rapid imaging by light-sheet microscopy and quantitative imaging analysis of multiple samples. The organ or body is cleared by immersion for 1-14 d, with the exact time required dependent on the sample type and the experimental purposes. A single imaging set can be completed in 30-60 min. Image processing and analysis can take whole-brain neural activities at single-cell resolution using Arc-dVenus transgenic (Tg) mice. CUBIC informatics calculated the Venus signal subtraction, comparing different brains at a whole-organ scale. These protocols provide a platform for organism-level systems biology by comprehensively detecting cells in a whole organ or body.

  16. Feasibility of Automatic Extraction of Electronic Health Data to Evaluate a Status Epilepticus Clinical Protocol.

    Science.gov (United States)

    Hafeez, Baria; Paolicchi, Juliann; Pon, Steven; Howell, Joy D; Grinspan, Zachary M

    2016-05-01

    Status epilepticus is a common neurologic emergency in children. Pediatric medical centers often develop protocols to standardize care. Widespread adoption of electronic health records by hospitals affords the opportunity for clinicians to rapidly, and electronically evaluate protocol adherence. We reviewed the clinical data of a small sample of 7 children with status epilepticus, in order to (1) qualitatively determine the feasibility of automated data extraction and (2) demonstrate a timeline-style visualization of each patient's first 24 hours of care. Qualitatively, our observations indicate that most clinical data are well labeled in structured fields within the electronic health record, though some important information, particularly electroencephalography (EEG) data, may require manual abstraction. We conclude that a visualization that clarifies a patient's clinical course can be automatically created using the patient's electronic clinical data, supplemented with some manually abstracted data. Future work could use this timeline to evaluate adherence to status epilepticus clinical protocols. © The Author(s) 2015.

  17. Furnace for rapid thermal processing

    NARCIS (Netherlands)

    Roozeboom, F.; Duine, P.A.; Sluis, P. van der

    2001-01-01

    A Method (1) for Rapid Thermal Processing of a wafer (7), wherein the wafer (7) is heated by lamps (9), and the heat radiation is reflected by an optical switching device (15,17) which is in the reflecting state during the heating stage. During the cooling stage of the wafer (7), the heat is

  18. Rapid thermal processing of semiconductors

    CERN Document Server

    Borisenko, Victor E

    1997-01-01

    Rapid thermal processing has contributed to the development of single wafer cluster processing tools and other innovations in integrated circuit manufacturing environments Borisenko and Hesketh review theoretical and experimental progress in the field, discussing a wide range of materials, processes, and conditions They thoroughly cover the work of international investigators in the field

  19. Rapid general microdetermination of fluorine

    NARCIS (Netherlands)

    Leuven, H.C.E. van; Rotscheid, G.J.; Buis, W.J.

    1979-01-01

    A rapid micromethod for the determination of fluorine in a wide variety of materials has been developed. The method is based on the liberation of the fluorine (as HF) from the sample by means of pyrohydrolysis with steam at 1120?? C, The amount of fluoride in the condensate is subsequently measured

  20. Rapid Prototyping Enters Mainstream Manufacturing.

    Science.gov (United States)

    Winek, Gary

    1996-01-01

    Explains rapid prototyping, a process that uses computer-assisted design files to create a three-dimensional object automatically, speeding the industrial design process. Five commercially available systems and two emerging types--the 3-D printing process and repetitive masking and depositing--are described. (SK)

  1. Portable Diagnostics and Rapid Germination

    Energy Technology Data Exchange (ETDEWEB)

    Dunn, Zachary Spencer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-12-01

    In the Bioenergy and Defense Department of Sandia National Laboratories, characterization of the BaDx (Bacillus anthracis diagnostic cartridge) was performed and rapid germination chemistry was investigated. BaDx was tested with complex sample matrixes inoculated with Bacillus anthracis, and the trials proved that BaDx will detect Bacillus anthracis in a variety of the medium, such as dirt, serum, blood, milk, and horse fluids. The dimensions of the device were altered to accommodate an E. coli or Listeria lateral flow immunoassay, and using a laser printer, BaDx devices were manufactured to identify E. coli and Listeria. Initial testing with E. coli versions of BaDx indicate that the device will be viable as a portable diagnostic cartridge. The device would be more effective with faster bacteria germination; hence studies were performed the use of rapid germination chemistry. Trials with calcium dipicolinic acid displayed increased cell germination, as shown by control studies using a microplate reader. Upon lyophilization the rapid germination chemistry failed to change growth patterns, indicating that the calcium dipicolinic acid was not solubilized under the conditions tested. Although incompatible with the portable diagnostic device, the experiments proved that the rapid germination chemistry was effective in increasing cell germination.

  2. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  3. Rapid-scan EPR imaging.

    Science.gov (United States)

    Eaton, Sandra S; Shi, Yilin; Woodcock, Lukas; Buchanan, Laura A; McPeak, Joseph; Quine, Richard W; Rinard, George A; Epel, Boris; Halpern, Howard J; Eaton, Gareth R

    2017-07-01

    In rapid-scan EPR the magnetic field or frequency is repeatedly scanned through the spectrum at rates that are much faster than in conventional continuous wave EPR. The signal is directly-detected with a mixer at the source frequency. Rapid-scan EPR is particularly advantageous when the scan rate through resonance is fast relative to electron spin relaxation rates. In such scans, there may be oscillations on the trailing edge of the spectrum. These oscillations can be removed by mathematical deconvolution to recover the slow-scan absorption spectrum. In cases of inhomogeneous broadening, the oscillations may interfere destructively to the extent that they are not visible. The deconvolution can be used even when it is not required, so spectra can be obtained in which some portions of the spectrum are in the rapid-scan regime and some are not. The technology developed for rapid-scan EPR can be applied generally so long as spectra are obtained in the linear response region. The detection of the full spectrum in each scan, the ability to use higher microwave power without saturation, and the noise filtering inherent in coherent averaging results in substantial improvement in signal-to-noise relative to conventional continuous wave spectroscopy, which is particularly advantageous for low-frequency EPR imaging. This overview describes the principles of rapid-scan EPR and the hardware used to generate the spectra. Examples are provided of its application to imaging of nitroxide radicals, diradicals, and spin-trapped radicals at a Larmor frequency of ca. 250MHz. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. A simple and highly efficient Agrobacterium-mediated transformation protocol for Setaria viridis

    Directory of Open Access Journals (Sweden)

    Polyana Kelly Martins

    2015-06-01

    Full Text Available The production and use of sugarcane in Brazil is very important for bioenergy production and is recognized as one of the most efficient in the world. In our laboratory, Setaria viridis is being tested as a model plant for sugarcane. S. viridis has biological attributes (rapid life cycle, small genome, diploid, short stature and simple growth requirements that make it suitable for use as a model system. We report a highly efficient protocol for Agrobacterium-mediated genetic transformation of S. viridis. The optimization of several steps in tissue culture allowed the rapid regeneration of plants and increased the rate of transformation up to 29%. This protocol could become a powerful tool for functional genomics in sugarcane.

  5. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  6. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  7. FLIP: Federation support for Long range low power Internet of things Protocols

    OpenAIRE

    Delbruel, Stéphane; Small, Nicolas; Hughes, Danny

    2017-01-01

    There is growing interest in the Internet of Things (IoT) and especially Low-Power Wide Area Networks (LPWAN), which are rapidly being rolled-out globally. Within the LPWAN market, LoRaWAN is considered a leading solution which has achieved significant success. Despite the rapid uptake of LoRaWAN, scalability concerns arising from interference and contention are also growing. While the current LoRaWAN protocol includes basic techniques to deal with these problems, recent research has shown th...

  8. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  9. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  10. Protocolized hyperventilation enhances electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Soria, Virginia; Salvat-Pujol, Neus; Ribes, Carmina; Sánchez-Allueva, Ana; Menchón, José Manuel; Urretavizcaya, Mikel

    2017-08-01

    Hyperventilation is recommended in electroconvulsive therapy (ECT) to enhance seizures and to increase patients' safety. However, more evidence is needed regarding its effects and the optimum method of application. This prospective study involving 21 subjects compared two procedures, protocolized hyperventilation (PHV) and hyperventilation as usual (HVau), applied to the same patient in two consecutive sessions. Transcutaneous partial pressure of carbon dioxide (TcPCO 2 ) was measured throughout all sessions. Ventilation parameters, hemodynamic measures, seizure characteristics, and side effects were also explored. PHV resulted in lower TcPCO 2 after hyperventilation (p=.008) and over the whole session (p=.035). The lowest TcPCO 2 was achieved after voluntary hyperventilation. Changes in TcPCO 2 from baseline showed differences between HVau and PHV at each session time-point (all p<.05). Between- and within-subjects factors were statistically significant in a general linear model. Seizure duration was greater in PHV sessions (p=.028), without differences in other seizure quality parameters or adverse effects. Correlations were found between hypocapnia induction and seizure quality indexes. Secondary outcomes could be underpowered. PHV produces hypocapnia before the stimulus, modifies patients' TcPCO 2 values throughout the ECT session and lengthens seizure duration. Voluntary hyperventilation is the most important part of the PHV procedure with respect to achieving hypocapnia. A specific ventilation approach, CO 2 quantification and monitoring may be advisable in ECT. PHV is easy to apply in daily clinical practice and does not imply added costs. Ventilation management has promising effects in terms of optimizing ECT technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  12. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  13. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  14. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  15. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  16. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  17. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  18. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  19. Rapid analysis and exploration of fluorescence microscopy images.

    Science.gov (United States)

    Pavie, Benjamin; Rajaram, Satwik; Ouyang, Austin; Altschuler, Jason M; Steininger, Robert J; Wu, Lani F; Altschuler, Steven J

    2014-03-19

    Despite rapid advances in high-throughput microscopy, quantitative image-based assays still pose significant challenges. While a variety of specialized image analysis tools are available, most traditional image-analysis-based workflows have steep learning curves (for fine tuning of analysis parameters) and result in long turnaround times between imaging and analysis. In particular, cell segmentation, the process of identifying individual cells in an image, is a major bottleneck in this regard. Here we present an alternate, cell-segmentation-free workflow based on PhenoRipper, an open-source software platform designed for the rapid analysis and exploration of microscopy images. The pipeline presented here is optimized for immunofluorescence microscopy images of cell cultures and requires minimal user intervention. Within half an hour, PhenoRipper can analyze data from a typical 96-well experiment and generate image profiles. Users can then visually explore their data, perform quality control on their experiment, ensure response to perturbations and check reproducibility of replicates. This facilitates a rapid feedback cycle between analysis and experiment, which is crucial during assay optimization. This protocol is useful not just as a first pass analysis for quality control, but also may be used as an end-to-end solution, especially for screening. The workflow described here scales to large data sets such as those generated by high-throughput screens, and has been shown to group experimental conditions by phenotype accurately over a wide range of biological systems. The PhenoBrowser interface provides an intuitive framework to explore the phenotypic space and relate image properties to biological annotations. Taken together, the protocol described here will lower the barriers to adopting quantitative analysis of image based screens.

  20. Analysis of Intracellular Metabolites from Microorganisms: Quenching and Extraction Protocols.

    Science.gov (United States)

    Pinu, Farhana R; Villas-Boas, Silas G; Aggio, Raphael

    2017-10-23

    Sample preparation is one of the most important steps in metabolome analysis. The challenges of determining microbial metabolome have been well discussed within the research community and many improvements have already been achieved in last decade. The analysis of intracellular metabolites is particularly challenging. Environmental perturbations may considerably affect microbial metabolism, which results in intracellular metabolites being rapidly degraded or metabolized by enzymatic reactions. Therefore, quenching or the complete stop of cell metabolism is a pre-requisite for accurate intracellular metabolite analysis. After quenching, metabolites need to be extracted from the intracellular compartment. The choice of the most suitable metabolite extraction method/s is another crucial step. The literature indicates that specific classes of metabolites are better extracted by different extraction protocols. In this review, we discuss the technical aspects and advancements of quenching and extraction of intracellular metabolite analysis from microbial cells.

  1. Transcranial Alternating Current Stimulation (tACS Mechanisms and Protocols

    Directory of Open Access Journals (Sweden)

    Amir V. Tavakoli

    2017-09-01

    Full Text Available Perception, cognition and consciousness can be modulated as a function of oscillating neural activity, while ongoing neuronal dynamics are influenced by synaptic activity and membrane potential. Consequently, transcranial alternating current stimulation (tACS may be used for neurological intervention. The advantageous features of tACS include the biphasic and sinusoidal tACS currents, the ability to entrain large neuronal populations, and subtle control over somatic effects. Through neuromodulation of phasic, neural activity, tACS is a powerful tool to investigate the neural correlates of cognition. The rapid development in this area requires clarity about best practices. Here we briefly introduce tACS and review the most compelling findings in the literature to provide a starting point for using tACS. We suggest that tACS protocols be based on functional brain mechanisms and appropriate control experiments, including active sham and condition blinding.

  2. A protocol for expression of foreign genes in chloroplasts.

    Science.gov (United States)

    Verma, Dheeraj; Samson, Nalapalli P; Koya, Vijay; Daniell, Henry

    2008-01-01

    Several major costs associated with the production of biopharmaceuticals or vaccines in fermentation-based systems could be minimized by using plant chloroplasts as bioreactors, which facilitates rapid scale-up. Oral delivery of chloroplast-derived therapeutic proteins through plant cells eliminates expensive purification steps, low temperature storage, transportation and sterile injections for their delivery. Chloroplast transformation technology (CTT) has also been successfully used to engineer valuable agronomic traits and for the production of industrial enzymes and biomaterials. Here, we provide a detailed protocol for the construction of chloroplast expression and integration vectors, selection and regeneration of transformants, evaluation of transgene integration and inheritance, confirmation of transgene expression and extraction, and quantitation and purification of foreign proteins. Integration of appropriate transgenes into chloroplast genomes and the resulting high levels of functional protein expression can be achieved in approximately 6 months in lettuce and tobacco. CTT is eco-friendly because transgenes are maternally inherited in most crop plants.

  3. Analysis of Intracellular Metabolites from Microorganisms: Quenching and Extraction Protocols

    Directory of Open Access Journals (Sweden)

    Farhana R. Pinu

    2017-10-01

    Full Text Available Sample preparation is one of the most important steps in metabolome analysis. The challenges of determining microbial metabolome have been well discussed within the research community and many improvements have already been achieved in last decade. The analysis of intracellular metabolites is particularly challenging. Environmental perturbations may considerably affect microbial metabolism, which results in intracellular metabolites being rapidly degraded or metabolized by enzymatic reactions. Therefore, quenching or the complete stop of cell metabolism is a pre-requisite for accurate intracellular metabolite analysis. After quenching, metabolites need to be extracted from the intracellular compartment. The choice of the most suitable metabolite extraction method/s is another crucial step. The literature indicates that specific classes of metabolites are better extracted by different extraction protocols. In this review, we discuss the technical aspects and advancements of quenching and extraction of intracellular metabolite analysis from microbial cells.

  4. The protocols for the 10/66 dementia research group population-based research programme

    OpenAIRE

    Salas Aquiles; Rodriguez Juan; McKeigue Paul; Jacob KS; Krishnamoorthy ES; Huang Yueqin; Guerra Mariella; Gavrilova Svetlana I; Dewey Michael; Arizaga Raul; Albanese Emiliano; Acosta Daisy; Ferri Cleusa P; Prince Martin; Sosa Ana

    2007-01-01

    Abstract Background Latin America, China and India are experiencing unprecedentedly rapid demographic ageing with an increasing number of people with dementia. The 10/66 Dementia Research Group's title refers to the 66% of people with dementia that live in developing countries and the less than one tenth of population-based research carried out in those settings. This paper describes the protocols for the 10/66 population-based and intervention studies that aim to redress this imbalance. Meth...

  5. Network Layer Protocol Activation for Packet Data Access in UMTS WCDMA Laboratory Network

    OpenAIRE

    Lakkisto, Erkka

    2011-01-01

    The purpose of this Bachelor’s Thesis was to set up the UMTS WCDMA network in the laboratory environment of Helsinki Metropolia University of Applied Sciences and to study the network layer protocol activation for packet data access. The development of 3G technology has been very rapid and it can be considered as one of the main technologies in telecommunication. Implementing the laboratory network in Metropolia enables teaching and researching of the modern network technology. Labora...

  6. Fast-track protocols in devascularization for cirrhotic portal hypertension

    Directory of Open Access Journals (Sweden)

    Yang Fei

    2015-06-01

    Full Text Available Summary Introduction/objective: fast-tract surgery (FTS has been rapidly embraced by surgeons as a mechanism for improving patient care and driving down complications and costs. The aim of this study was to determine if any improvement in outcomes occurred after FTS protocol for selective double portazygous disconnection with preserving vagus (SDPDPV compared with non-FTS postoperative care. Methods: patients eligible for SDPDPV in the period January 2012-April 2014 were randomly selected for the FTS group or non-FTS group. A designed protocol was used in the FTS group with emphasis on an interdisciplinary approach. The non-FTS group was treated using previously established standard procedures. The number of postoperative complications, time of functional recovery and duration of hospital stay were recorded. Results: patients in the FTS group (n=59 and non-FTS group (n=57 did not differ in terms of preoperative data and operative details (p>0.05. The FTS procedure led to significantly better control and faster restoration of gastrointestinal functions, food tolerance, rehabilitation and hospital discharge (p<0.05. Postoperative complications, including nausea/vomiting, severe ascites, wound infection, urinary tract infection and pulmonary infection were all significantly lower in the FTS group (p<0.05. According to the postoperative morbidity classification used by Clavien, overall complications and grade I complications were both significantly lower in the FTS group compared with the non-FTS group (p<0.05. Conclusion: adopting the FTS protocol helped to recover gastrointestinal functions, to reduce frequency of postoperative complications and to reduce hospital stay. The FTS strategy is safe and effective in improving postoperative outcomes.

  7. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  8. Pelvic Muscle Rehabilitation: A Standardized Protocol for Pelvic Floor Dysfunction

    Directory of Open Access Journals (Sweden)

    Rodrigo Pedraza

    2014-01-01

    Full Text Available Introduction. Pelvic floor dysfunction syndromes present with voiding, sexual, and anorectal disturbances, which may be associated with one another, resulting in complex presentation. Thus, an integrated diagnosis and management approach may be required. Pelvic muscle rehabilitation (PMR is a noninvasive modality involving cognitive reeducation, modification, and retraining of the pelvic floor and associated musculature. We describe our standardized PMR protocol for the management of pelvic floor dysfunction syndromes. Pelvic Muscle Rehabilitation Program. The diagnostic assessment includes electromyography and manometry analyzed in 4 phases: (1 initial baseline phase; (2 rapid contraction phase; (3 tonic contraction and endurance phase; and (4 late baseline phase. This evaluation is performed at the onset of every session. PMR management consists of 6 possible therapeutic modalities, employed depending on the diagnostic evaluation: (1 down-training; (2 accessory muscle isolation; (3 discrimination training; (4 muscle strengthening; (5 endurance training; and (6 electrical stimulation. Eight to ten sessions are performed at one-week intervals with integration of home exercises and lifestyle modifications. Conclusions. The PMR protocol offers a standardized approach to diagnose and manage pelvic floor dysfunction syndromes with potential advantages over traditional biofeedback, involving additional interventions and a continuous pelvic floor assessment with management modifications over the clinical course.

  9. Rapid and sustained cost management

    International Nuclear Information System (INIS)

    Hanson, D.

    2009-01-01

    Accenture helps clients develop comprehensive, process-driven strategies for rapid and sustained cost management that leverage deep insights and analytics. This approach enables companies to gain operating cost advantages by rationalizing, simplifying and automating current operating capabilities. It drives structural cost advantages by optimizing business mix, capital structure, organizational structure and geographic presence. This paper discussed how successful companies achieve high performance during times of economic turmoil. It also discussed the value of the winner's strategy in terms of rapid and sustained cost management (RSCM). It discussed how Accenture operates and its leveraged capabilities, improved efficiency, margins and cash flow while maintaining customer service levels. Building structural advantage and the Accenture difference were also discussed. It was concluded that RSCM is one vital way that Accenture can help companies achieve success. 4 figs

  10. Rapidly Progressive Quadriplegia and Encephalopathy.

    Science.gov (United States)

    Wynn, DonRaphael; McCorquodale, Donald; Peters, Angela; Juster-Switlyk, Kelsey; Smith, Gordon; Ansari, Safdar

    2016-11-01

    A woman aged 77 years was transferred to our neurocritical care unit for evaluation and treatment of rapidly progressive motor weakness and encephalopathy. Examination revealed an ability to follow simple commands only and abnormal movements, including myoclonus, tongue and orofacial dyskinesias, and opsoclonus. Imaging study findings were initially unremarkable, but when repeated, they demonstrated enhancement of the cauda equina nerve roots, trigeminal nerve, and pachymeninges. Cerebrospinal fluid examination revealed mildly elevated white blood cell count and protein levels. Serial electrodiagnostic testing demonstrated a rapidly progressive diffuse sensory motor axonopathy, and electroencephalogram findings progressed from generalized slowing to bilateral periodic lateralized epileptiform discharges. Critical details of her recent history prompted a diagnostic biopsy. Over time, the patient became completely unresponsive with no further abnormal movements and ultimately died. The differential diagnosis, pathological findings, and diagnosis are discussed with a brief review of a well-known yet rare diagnosis.

  11. Rapid mask prototyping for microfluidics.

    Science.gov (United States)

    Maisonneuve, B G C; Honegger, T; Cordeiro, J; Lecarme, O; Thiry, T; Fuard, D; Berton, K; Picard, E; Zelsmann, M; Peyrade, D

    2016-03-01

    With the rise of microfluidics for the past decade, there has come an ever more pressing need for a low-cost and rapid prototyping technology, especially for research and education purposes. In this article, we report a rapid prototyping process of chromed masks for various microfluidic applications. The process takes place out of a clean room, uses a commercially available video-projector, and can be completed in less than half an hour. We quantify the ranges of fields of view and of resolutions accessible through this video-projection system and report the fabrication of critical microfluidic components (junctions, straight channels, and curved channels). To exemplify the process, three common devices are produced using this method: a droplet generation device, a gradient generation device, and a neuro-engineering oriented device. The neuro-engineering oriented device is a compartmentalized microfluidic chip, and therefore, required the production and the precise alignment of two different masks.

  12. Taking an idea to a research protocol

    African Journals Online (AJOL)

    2013-11-13

    Nov 13, 2013 ... Review Article: Taking an idea to a research protocol ... step is to identify the knowledge gap within the intended field of research by examining the background ... be found by writing a critical narrative review of the literature.

  13. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  14. Oxygen tolerance test : A standardised protocol

    Directory of Open Access Journals (Sweden)

    D K Ghosh

    2015-01-01

    Conclusion: By following a standardised protocol for Oxygen Tolerance Test, an objective assessment and recordkeeping is possible. This shall entail a more effective screening during the initial diving medical examination.

  15. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  16. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  17. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  18. Adaptive security protocol selection for mobile computing

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.

    2010-01-01

    The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for

  19. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  20. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  1. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  2. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  3. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  4. How to write a research protocol

    African Journals Online (AJOL)

    A research protocol is best viewed as a key to open the gates between the researcher and ... studies will be quantitative designs and these form the focus of this paper. ..... applied to the underlying clinical problem addressed by the study.

  5. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  6. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  7. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  8. Rapidity correlations test stochastic hydrodynamics

    International Nuclear Information System (INIS)

    Zin, C; Gavin, S; Moschelli, G

    2017-01-01

    We show that measurements of the rapidity dependence of transverse momentum correlations can be used to determine the characteristic time τ π that dictates the rate of isotropization of the stress energy tensor, as well as the shear viscosity ν = η/sT . We formulate methods for computing these correlations using second order dissipative hydrodynamics with noise. Current data are consistent with τ π /ν ∼ 10 but targeted measurements can improve this precision. (paper)

  9. Rapid duodenal and jejunal intubation

    International Nuclear Information System (INIS)

    Nolan, D.J.

    1979-01-01

    A size 12 French radiopaque catheter, 135 cm long, suitable for rapid duodenal and jejunal intubation, is described. Its size and flexibility enable it to be passed with ease through the nose, stomach and duodenum. A guide wire is used to act as a stiffener as the catheter is passed through the stomach. The catheter is suitable for infusing barium directly into the small intestine and for performing hypotonic duodenography. The technique for duodenal and jejunal intubation is discussed. (author)

  10. Rapid synthesis of beta zeolites

    Science.gov (United States)

    Fan, Wei; Chang, Chun -Chih; Dornath, Paul; Wang, Zhuopeng

    2015-08-18

    The invention provides methods for rapidly synthesizing heteroatom containing zeolites including Sn-Beta, Si-Beta, Ti-Beta, Zr-Beta and Fe-Beta. The methods for synthesizing heteroatom zeolites include using well-crystalline zeolite crystals as seeds and using a fluoride-free, caustic medium in a seeded dry-gel conversion method. The Beta zeolite catalysts made by the methods of the invention catalyze both isomerization and dehydration reactions.

  11. Rapid reconnection of flux lines

    International Nuclear Information System (INIS)

    Samain, A.

    1982-01-01

    The rapid reconnection of flux lines in an incompressible fluid through a singular layer of the current density is discussed. It is shown that the liberated magnetic energy must partially appear in the form of plasma kinetic energy. A laminar structure of the flow is possible, but Alfven velocity must be achieved in eddies of growing size at the ends of the layer. The gross structure of the flow and the magnetic configuration may be obtained from variational principles. (author)

  12. Development of a Competent and Trouble Free DNA Isolation Protocol for Downstream Genetic Analyses in Glycine Species

    Directory of Open Access Journals (Sweden)

    Muhammad Amjad Nawaz

    2016-08-01

    Full Text Available Extraction of deoxyribose nucleic acid (DNA from plants is preliminary step in molecular biology. Fast and cost effective genomic DNA isolation from Glycine species for downstream application is a major bottleneck. Here we report a high throughput and trouble free method for genomic DNA extraction from leaf and seeds of Glycine species with high quality and quantity. Protocol reports the optimization by employing different concentrations of CTAB and PVP in extraction buffer. Efficiency of optimized protocol was compared with frequently used DNA extraction methods. Wide adoptability and utility of this protocol was confirmed by DNA extraction from leaves as well as seeds of G. max, G. soja, G. tomentella and G. latifolia. Extracted DNA was successfully subjected to PCR amplification of five microsatellite markers and four putative glycosyltransferase genes. DNA extraction protocol is reproducible, trouble free, rapid and can be adopted for plant molecular biology applications.

  13. Single wafer rapid thermal multiprocessing

    International Nuclear Information System (INIS)

    Saraswat, K.C.; Moslehi, M.M.; Grossman, D.D.; Wood, S.; Wright, P.; Booth, L.

    1989-01-01

    Future success in microelectronics will demand rapid innovation, rapid product introduction and ability to react to a change in technological and business climate quickly. These technological advances in integrated electronics will require development of flexible manufacturing technology for VLSI systems. However, the current approach of establishing factories for mass manufacturing of chips at a cost of more than 200 million dollars is detrimental to flexible manufacturing. The authors propose concepts of a micro factory which may be characterized by more economical small scale production, higher flexibility to accommodate many products on several processes, and faster turnaround and learning. In-situ multiprocessing equipment where several process steps can be done in sequence may be a key ingredient in this approach. For this environment to be flexible, the equipment must have ability to change processing environment, requiring extensive in-situ measurements and real time control. This paper describes the development of a novel single wafer rapid thermal multiprocessing (RTM) reactor for next generation flexible VLSI manufacturing. This reactor will combine lamp heating, remote microwave plasma and photo processing in a single cold-wall chamber, with applications for multilayer in-situ growth and deposition of dielectrics, semiconductors and metals

  14. Rapid Sampling from Sealed Containers

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.; Martinez, R.K.; Baca, E.T.

    1999-01-01

    The authors have developed several different types of tools for sampling from sealed containers. These tools allow the user to rapidly drill into a closed container, extract a sample of its contents (gas, liquid, or free-flowing powder), and permanently reseal the point of entry. This is accomplished without exposing the user or the environment to the container contents, even while drilling. The entire process is completed in less than 15 seconds for a 55 gallon drum. Almost any kind of container can be sampled (regardless of the materials) with wall thicknesses up to 1.3 cm and internal pressures up to 8 atm. Samples can be taken from the top, sides, or bottom of a container. The sampling tools are inexpensive, small, and easy to use. They work with any battery-powered hand drill. This allows considerable safety, speed, flexibility, and maneuverability. The tools also permit the user to rapidly attach plumbing, a pressure relief valve, alarms, or other instrumentation to a container. Possible applications include drum venting, liquid transfer, container flushing, waste characterization, monitoring, sampling for archival or quality control purposes, emergency sampling by rapid response teams, counter-terrorism, non-proliferation and treaty verification, and use by law enforcement personnel during drug or environmental raids

  15. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  16. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  17. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  18. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology ...

  19. Emulation of Industrial Control Field Device Protocols

    Science.gov (United States)

    2013-03-01

    today. The protocol operates at the application layer of the open systems interconnection ( OSI ) model, meaning it operates independently of the...the OSI model. Their job is to receive serial data from an MTU in the Modbus RTU or ASCII protocol, encapsulate and transmit the data to another modem...facing connection and out-of-band logging capabilities over the other LAN -facing connection. Despite the fact that the hardware configuration of the

  20. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  1. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  2. Broadening and Simplifying the First SETI Protocol

    Science.gov (United States)

    Michaud, M. A. G.

    The Declaration of Principles Concerning Activities Following the Detection of Extraterrestrial Intelligence, known informally as the First SETI Protocol, is the primary existing international guidance on this subject. During the fifteen years since the document was issued, several people have suggested revisions or additional protocols. This article proposes a broadened and simplified text that would apply to the detection of alien technology in our solar system as well as to electromagnetic signals from more remote sources.

  3. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  4. Dynamic Aggregation Protocol for Wireless Sensor Networks

    OpenAIRE

    Mounir Said , Adel; William Ibrahim , Ashraf; Soua , Ahmed; Afifi , Hossam

    2013-01-01

    International audience; Sensor networks suffer from limited capabilities such as bandwidth, low processing power, and memory size. There is therefore a need for protocols that deliver sensor data in an energy-efficient way to the sink. One of those techniques, it gathers sensors' data in a small size packet suitable for transmission. In this paper, we propose a new Effective Data Aggregation Protocol (DAP) to reduce the energy consumption in Wireless Sensor Networks (WSNs), which prolongs the...

  5. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  6. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  7. Comparing rapid methods for detecting Listeria in seafood and environmental samples using the most probably number (MPN) technique.

    Science.gov (United States)

    Cruz, Cristina D; Win, Jessicah K; Chantarachoti, Jiraporn; Mutukumira, Anthony N; Fletcher, Graham C

    2012-02-15

    The standard Bacteriological Analytical Manual (BAM) protocol for detecting Listeria in food and on environmental surfaces takes about 96 h. Some studies indicate that rapid methods, which produce results within 48 h, may be as sensitive and accurate as the culture protocol. As they only give presence/absence results, it can be difficult to compare the accuracy of results generated. We used the Most Probable Number (MPN) technique to evaluate the performance and detection limits of six rapid kits for detecting Listeria in seafood and on an environmental surface compared with the standard protocol. Three seafood products and an environmental surface were inoculated with similar known cell concentrations of Listeria and analyzed according to the manufacturers' instructions. The MPN was estimated using the MPN-BAM spreadsheet. For the seafood products no differences were observed among the rapid kits and efficiency was similar to the BAM method. On the environmental surface the BAM protocol had a higher recovery rate (sensitivity) than any of the rapid kits tested. Clearview™, Reveal®, TECRA® and VIDAS® LDUO detected the cells but only at high concentrations (>10(2) CFU/10 cm(2)). Two kits (VIP™ and Petrifilm™) failed to detect 10(4) CFU/10 cm(2). The MPN method was a useful tool for comparing the results generated by these presence/absence test kits. There remains a need to develop a rapid and sensitive method for detecting Listeria in environmental samples that performs as well as the BAM protocol, since none of the rapid tests used in this study achieved a satisfactory result. Copyright © 2011 Elsevier B.V. All rights reserved.

  8. Efficacy and safety of an insulin infusion protocol in a surgical ICU.

    Science.gov (United States)

    Taylor, Beth E; Schallom, Marilyn E; Sona, Carrie S; Buchman, Timothy G; Boyle, Walter A; Mazuski, John E; Schuerer, Douglas E; Thomas, James M; Kaiser, Christy; Huey, Way Y; Ward, Myrna R; Zack, Jeanne E; Coopersmith, Craig M

    2006-01-01

    Hyperglycemia is associated with complications in the surgical intensive care unit. The purpose of this study was to determine the efficacy and safety of nurse-driven insulin infusion protocols in lowering blood glucose (BG) in critical illness. All patients in a 24-bed surgical intensive care unit who required i.v. insulin infusions during 3 noncontiguous 6-month periods from 2002 to 2004 were evaluated. In the preintervention phase, 71 patients received a physician-initiated insulin infusion without a developed protocol. They were compared with 95 patients who received a nurse-driven insulin infusion protocol with a target BG of 120 to 150 mg/dL and to 119 patients who received a more stringent protocol with a target BG of 80 to 110 mg/dL. There was a stepwise decrease in average daily BG levels, from 190 to 163 to 132 mg/dL (p < 0.001). The less stringent protocol decreased the time to achieve a BG level < 150 mg/dL from 14.1 to 7.4 hours compared with physician-driven management (p < 0.05) resulting in similar time on an insulin infusion (53 versus 48 hours). The more intensive protocol brought BG levels < 150 mg/dL in 7.2 hours and < 111 mg/dL in 13.6 hours, but increased the length of time a patient was on an insulin infusion to 77 hours. The incidence of severe hypoglycemia (BG < 40 mg/dL) was statistically similar between the groups, ranging between 1.1% and 3.4%. Implementation of a nurse-driven protocol led to more rapid and more effective BG control in critically ill surgical patients compared with physician management. Tighter BG control can be obtained without a significant increase in hypoglycemia, although this is associated with increased time on an insulin infusion.

  9. An improved protocol for efficient transformation and regeneration of diverse indica rice cultivars

    Directory of Open Access Journals (Sweden)

    Sahoo Khirod K

    2011-12-01

    Full Text Available Abstract Background Rice genome sequencing projects have generated remarkable amount of information about genes and genome architecture having tremendous potential to be utilized in both basic and applied research. Success in transgenics is paving the way for preparing a road map of functional genomics which is expected to correlate action of a gene to a trait in cellular and organismal context. However, the lack of a simple and efficient method for transformation and regeneration is a major constraint for such studies in this important cereal crop. Results In the present study, we have developed an easy, rapid and highly efficient transformation and regeneration protocol using mature seeds as explants and found its successful applicability to a choice of elite indica rice genotypes. We have optimized various steps of transformation and standardized different components of the regeneration medium including growth hormones and the gelling agent. The modified regeneration medium triggers production of large number of shoots from smaller number of calli and promotes their faster growth, hence significantly advantageous over the existing protocols where the regeneration step requires maximum time. Using this protocol, significantly higher transformation efficiency (up to 46% and regeneration frequency (up to 92% for the untransformed calli and 59% for the transformed calli were achieved for the four tested cultivars. We have used this protocol to produce hundreds of independent transgenic lines of different indica rice genotypes. Upon maturity, these transgenic lines were fertile thereby indicating that faster regeneration during tissue culture did not affect their reproductive potential. Conclusions This speedy, yet less labor-intensive, protocol overcomes major limitations associated with genetic manipulation in rice. Moreover, our protocol uses mature seeds as the explant, which can easily be obtained in quantity throughout the year and kept

  10. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  11. A rapid protection switching method in carrier ethernet ring networks

    Science.gov (United States)

    Yuan, Liang; Ji, Meng

    2008-11-01

    Abstract: Ethernet is the most important Local Area Network (LAN) technology since more than 90% data traffic in access layer is carried on Ethernet. From 10M to 10G, the improving Ethernet technology can be not only used in LAN, but also a good choice for MAN even WAN. MAN are always constructed in ring topology because the ring network could provide resilient path protection by using less resource (fibre or cable) than other network topologies. In layer 2 data networks, spanning tree protocol (STP) is always used to protect transmit link and preventing the formation of logic loop in networks. However, STP cannot guarantee the efficiency of service convergence when link fault happened. In fact, convergent time of networks with STP is about several minutes. Though Rapid Spanning Tree Protocol (RSTP) and Multi-Spanning Tree Protocol (MSTP) improve the STP technology, they still need a couple of seconds to achieve convergence, and can not provide sub-50ms protection switching. This paper presents a novel rapid ring protection method (RRPM) for carrier Ethernet. Unlike other link-fault detection method, it adopts distributed algorithm to detect link fault rapidly (sub-50ms). When networks restore from link fault, it can revert to the original working state. RRPM can provide single ring protection and interconnected ring protection without the formation of super loop. In normal operation, the master node blocks the secondary port for all non-RRPM Ethernet frames belonging to the given RRPM Ring, thereby avoiding a loop in the ring. When link fault happens, the node on which the failure happens moves from the "ring normal" state to the "ring fault" state. It also sends "link down" frame immediately to other nodes and blocks broken port and flushes its forwarding database. Those who receive "link down" frame will flush forwarding database and master node should unblock its secondary port. When the failure restores, the whole ring will revert to the normal state. That is

  12. MDEP Protocol VICWG-01. MDEP Protocol: Witnessed, Joint, and Multinational Vendor Inspection Protocol

    International Nuclear Information System (INIS)

    2014-01-01

    The Multinational Design Evaluation Programme (MDEP) was launched in 2006 by the US Nuclear Regulatory Commission (NRC) and the French Nuclear Safety Authority (ASN) with the aim of developing innovative approaches to leverage the resources and knowledge of national regulatory authorities reviewing new reactor designs. MDEP full members are regulators from Canada, People's Republic of China, Finland, France, India, Japan, Republic of Korea, Russian Federation, South Africa, Sweden, the United Kingdom and the United States of America. The United Arab Emirates and Turkey are associate members. The OECD Nuclear Energy Agency (NEA) acts as the Technical Secretariat for the MDEP. The International Atomic Energy Agency (IAEA) participates in many of the MDEP activities, including harmonisation efforts. The Vendor Inspection Cooperation Working Group (VICWG) is one of the issue-specific working groups that the MDEP members are undertaking with one long term goal of the VICWG being to maximize the use of the results obtained from other regulator's efforts in inspecting vendors. To accomplish this goal, it is vital that the regulators learn about each other's procedures, processes, and regulations. To facilitate the learning process the VICWG is coordinating vendor inspections among the involved regulatory authorities with the purpose of enhancing the understanding of each other's vendor inspection procedures. This programme is administered by the NEA. Involvement in specific inspections provides a number of opportunities for member state regulators to witness other regulators' inspection methods, gain useful information on the quality systems and manufacturing arrangements of specific vendors and where appropriate, actively participate in the inspection. The purpose of this protocol is to provide guidance to regulators that wish to carry out vendor inspections or participate in or witness other regulators' vendor inspections. It also provides

  13. Rapid Screening for Cognitive Impairment in Parkinson’s Disease: A Pilot Study

    Directory of Open Access Journals (Sweden)

    YanHong Dong

    2015-01-01

    Full Text Available Aim. This study sought to establish the discriminant validity of a rapid cognitive screen, that is, the National Institute of Neurological Disease and Stroke-Canadian Stroke Network (NINDS-CSN 5-minute protocol, and compare its discriminant validity to the Montreal Cognitive Assessment (MoCA and Mini Mental State Examination (MMSE in detecting cognitive impairment (CI in PD patients. Methods. One hundred and one PD patients were recruited from a movement disorders clinic in Singapore and they received the NINDS-CSN 5-minute protocol, MoCA, and MMSE. No cognitive impairment (NCI was defined as Clinical Dementia Rating (CDR = 0 and CI was defined as CDR ≥ 0.5. Results. Area under the receiver operating characteristic curve of NINDS-CSN 5-minute protocol was statistically equivalent to MoCA and larger than MMSE (0.86 versus 0.90, P=0.07; 0.86 versus 0.76, P=0.03. The sensitivity of NINDS-CSN 5-minute protocol (<9 was statistically equivalent to MoCA (<22 (0.77 versus 0.85, P=0.13 and superior to MMSE (<24 (0.77 versus 0.52, P<0.01 in detecting CI, while the specificity of NINDS-CSN 5-minute protocol (<9 was statistically equivalent to MoCA (<22 and MMSE (<24 (0.78 versus 0.88, P=0.34. Conclusion. The NINDS-CSN 5-minute protocol is time expeditious while remaining statistically equivalent to MoCA and superior to MMSE and therefore is suitable for rapid cognitive screening of CI in PD patients.

  14. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  15. Rapid methods for the extraction and archiving of molecular grade fungal genomic DNA.

    Science.gov (United States)

    Borman, Andrew M; Palmer, Michael; Johnson, Elizabeth M

    2013-01-01

    The rapid and inexpensive extraction of fungal genomic DNA that is of sufficient quality for molecular approaches is central to the molecular identification, epidemiological analysis, taxonomy, and strain typing of pathogenic fungi. Although many commercially available and in-house extraction procedures do eliminate the majority of contaminants that commonly inhibit molecular approaches, the inherent difficulties in breaking fungal cell walls lead to protocols that are labor intensive and that routinely take several hours to complete. Here we describe several methods that we have developed in our laboratory that allow the extremely rapid and inexpensive preparation of fungal genomic DNA.

  16. Towards identifying nurse educator competencies required for simulation-based learning: A systemised rapid review and synthesis

    DEFF Research Database (Denmark)

    Bøje, Rikke Buus; Topping, Annie; Rekola, Leena

    2015-01-01

    Objectives: This paper presents the results of a systemised rapid reviewand synthesis of the literature undertaken to identify competencies required by nurse educators to facilitate simulation-based learning (SBL). Design: An international collaboration undertook a protocol-based search, retrieva...... further development as a model for educators delivering SBL as part of nursing curricula....

  17. NANOSIZED MAGNESIUM OXIDE AS CATALYST FOR THE RAPID AND GREEN SYNTHESIS OF SUBSTITUTED 2-AMINO-2-CHROMENES

    Science.gov (United States)

    A nanosized magnesium oxide catalyzed three-component condensation reaction of aldehyde, malononitrile and ¿-naphthol proceeded rapidly in water/PEG to afford corresponding 2-amino-2-chromenes in high yields at room temperature. The greener protocol was found to be fairly general...

  18. Rapid Adaptation in Digital Transformation

    DEFF Research Database (Denmark)

    Hansen, Anne Mette; Kræmmergaard, Pernille; Mathiassen, Lars

    2011-01-01

    landscape. In this article, we share insights gained from two public sector organizations in which IS and business leaders used the Participatory Process Model (PPM) designed by the authors to share their assumptions about IS leadership, challenge existing IT strategies and collaboration patterns and adapt...... the organization’s digitization approach. We demonstrate in detail how the leaders within these two organizations were engaged and offer recommendations for how other organizations can use the PPM to rapidly adapt their approaches to digital transformation through more effective IS leadership roles....

  19. Rapid thermal processing by stamping

    Science.gov (United States)

    Stradins, Pauls; Wang, Qi

    2013-03-05

    A rapid thermal processing device and methods are provided for thermal processing of samples such as semiconductor wafers. The device has components including a stamp (35) having a stamping surface and a heater or cooler (40) to bring it to a selected processing temperature, a sample holder (20) for holding a sample (10) in position for intimate contact with the stamping surface; and positioning components (25) for moving the stamping surface and the stamp (35) in and away from intimate, substantially non-pressured contact. Methods for using and making such devices are also provided. These devices and methods allow inexpensive, efficient, easily controllable thermal processing.

  20. Rapidly Adaptable Instrumentation Tester (RAIT)

    International Nuclear Information System (INIS)

    Vargo, Timothy D.

    1999-01-01

    Emerging technologies in the field of ''Test ampersand Measurement'' have recently enabled the development of the Rapidly Adaptable Instrumentation Tester (RAIT). Based on software developed with LabVIEW, the RAIT design enables quick reconfiguration to test and calibrate a wide variety of telemetry systems. The consequences of inadequate testing could be devastating if a telemetry system were to fail during an expensive flight mission. Supporting both open-bench testing as well as automated test sequences, the RAIT has significantly lowered total time required to test and calibrate a system. This has resulted in an overall lower per unit testing cost than has been achievable in the past

  1. Early warning systems and rapid response to the deteriorating patient in hospital: A realist evaluation.

    Science.gov (United States)

    McGaughey, Jennifer; O'Halloran, Peter; Porter, Sam; Trinder, John; Blackwood, Bronagh

    2017-12-01

    To test the Rapid Response Systems programme theory against actual practice components of the Rapid Response Systems implemented to identify those contexts and mechanisms which have an impact on the successful achievement of desired outcomes in practice. Rapid Response Systems allow deteriorating patients to be recognized using Early Warning Systems, referred early via escalation protocols and managed at the bedside by competent staff. Realist evaluation. The research design was an embedded multiple case study approach of four wards in two hospitals in Northern Ireland which followed the principles of Realist Evaluation. We used various mixed methods including individual and focus group interviews, observation of nursing practice between June-November 2010 and document analysis of Early Warning Systems audit data between May-October 2010 and hospital acute care training records over 4.5 years from 2003-2008. Data were analysed using NiVivo8 and SPPS. A cross-case analysis highlighted similar patterns of factors which enabled or constrained successful recognition, referral and response to deteriorating patients in practice. Key enabling factors were the use of clinical judgement by experienced nurses and the empowerment of nurses as a result of organizational change associated with implementation of Early Warning System protocols. Key constraining factors were low staffing and inappropriate skill mix levels, rigid implementation of protocols and culturally embedded suboptimal communication processes. Successful implementation of Rapid Response Systems was dependent on adopting organizational and cultural changes that facilitated staff empowerment, flexible implementation of protocols and ongoing experiential learning. © 2017 John Wiley & Sons Ltd.

  2. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  3. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  4. Wyoming Basin Rapid Ecoregional Assessment

    Science.gov (United States)

    Carr, Natasha B.; Melcher, Cynthia P.

    2015-08-28

    The Wyoming Basin Rapid Ecoregional Assessment was conducted in partnership with the Bureau of Land Management (BLM). The overall goals of the BLM Rapid Ecoregional Assessments (REAs) are to identify important ecosystems and wildlife habitats at broad spatial scales; identify where these resources are at risk from Change Agents, including development, wildfire, invasive species, disease and climate change; quantify cumulative effects of anthropogenic stressors; and assess current levels of risk to ecological resources across a range of spatial scales and jurisdictional boundaries by assessing all lands within an ecoregion. There are several components of the REAs. Management Questions, developed by the BLM and stakeholders for the ecoregion, identify the regionally significant information needed for addressing land-management responsibilities. Conservation Elements represent regionally significant species and ecological communities that are of management concern. Change Agents that currently affect or are likely to affect the condition of species and communities in the future are identified and assessed. REAs also identify areas that have high conservation potential that are referred to as “large intact areas.” At the ecoregion level, the ecological value of large intact areas is based on the assumption that because these areas have not been greatly altered by human activities (such as development), they are more likely to contain a variety of plant and animal communities and to be resilient and resistant to changes resulting from natural disturbances such as fire, insect outbreaks, and disease.

  5. Direct, rapid RNA sequence analysis

    International Nuclear Information System (INIS)

    Peattie, D.A.

    1987-01-01

    The original methods of RNA sequence analysis were based on enzymatic production and chromatographic separation of overlapping oligonucleotide fragments from within an RNA molecule followed by identification of the mononucleotides comprising the oligomer. Over the past decade the field of nucleic acid sequencing has changed dramatically, however, and RNA molecules now can be sequenced in a variety of more streamlined fashions. Most of the more recent advances in RNA sequencing have involved one-dimensional electrophoretic separation of 32 P-end-labeled oligoribonucleotides on polyacrylamide gels. In this chapter the author discusses two of these methods for determining the nucleotide sequences of RNA molecules rapidly: the chemical method and the enzymatic method. Both methods are direct and degradative, i.e., they rely on fragmatic and chemical approaches should be utilized. The single-strand-specific ribonucleases (A, T 1 , T 2 , and S 1 ) provide an efficient means to locate double-helical regions rapidly, and the chemical reactions provide a means to determine the RNA sequence within these regions. In addition, the chemical reactions allow one to assign interactions to specific atoms and to distinguish secondary interactions from tertiary ones. If the RNA molecule is small enough to be sequenced directly by the enzymatic or chemical method, the probing reactions can be done easily at the same time as sequencing reactions

  6. Rapid learning: a breakthrough agenda.

    Science.gov (United States)

    Etheredge, Lynn M

    2014-07-01

    A "rapid-learning health system" was proposed in a 2007 thematic issue of Health Affairs. The system was envisioned as one that uses evidence-based medicine to quickly determine the best possible treatments for patients. It does so by drawing on electronic health records and the power of big data to access large volumes of information from a variety of sources at high speed. The foundation for a rapid-learning health system was laid during 2007-13 by workshops, policy papers, large public investments in databases and research programs, and developing learning systems. Challenges now include implementing a new clinical research system with several hundred million patients, modernizing clinical trials and registries, devising and funding research on national priorities, and analyzing genetic and other factors that influence diseases and responses to treatment. Next steps also should aim to improve comparative effectiveness research; build on investments in health information technology to standardize handling of genetic information and support information exchange through apps and software modules; and develop new tools, data, and information for clinical decision support. Further advances will require commitment, leadership, and public-private and global collaboration. Project HOPE—The People-to-People Health Foundation, Inc.

  7. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  8. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  9. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  10. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  11. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  12. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  13. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  14. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  15. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  16. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  17. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  18. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  19. Rapid mounting of adult Drosophila structures in Hoyer's medium.

    Science.gov (United States)

    Stern, David L; Sucena, Elio

    2012-01-01

    The Drosophila cuticle carries a rich array of morphological details. Thus, cuticle examination has had a central role in the history of genetics. This protocol describes a procedure for mounting adult cuticles in Hoyer's medium, a useful mountant for both larval and adult cuticles. The medium digests soft tissues rapidly, leaving the cuticle cleared for observation. In addition, samples can be transferred directly from water to Hoyer's medium. However, specimens mounted in Hoyer's medium degrade over time. For example, the fine denticles on the larval dorsum are best observed soon after mounting; they begin to fade after 1 week, and can disappear completely after several months. More robust features, such as the ventral denticle belts, will persist for a longer period of time. Because adults cannot profitably be mounted whole in Hoyer's medium, some dissection is necessary.

  20. Simplified Method for Rapid Purification of Soluble Histones

    Directory of Open Access Journals (Sweden)

    Nives Ivić

    2016-06-01

    Full Text Available Functional and structural studies of histone-chaperone complexes, nucleosome modifications, their interactions with remodelers and regulatory proteins rely on obtaining recombinant histones from bacteria. In the present study, we show that co-expression of Xenopus laevis histone pairs leads to production of soluble H2AH2B heterodimer and (H3H42 heterotetramer. The soluble histone complexes are purified by simple chromatographic techniques. Obtained H2AH2B dimer and H3H4 tetramer are proficient in histone chaperone binding and histone octamer and nucleosome formation. Our optimized protocol enables rapid purification of multiple soluble histone variants with a remarkable high yield and simplifies histone octamer preparation. We expect that this simple approach will contribute to the histone chaperone and chromatin research. This work is licensed under a Creative Commons Attribution 4.0 International License.

  1. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  2. Rapid gated Thallium-201 perfusion SPECT - clinically feasible?

    International Nuclear Information System (INIS)

    Wadhwa, S.S.; Mansberg, R.; Fernandes, V.B.; Wilkinson, D.; Abatti, D.

    1998-01-01

    Full text: Standard dose energy window optimised Thallium-201 (Tl-201) SPECT has about half the counts of a standard dose from Technetium-99m Sestamibi (Tc99m-Mibi) gated perfusion SPECT. This study investigates the clinical feasibility of rapid energy window optimised Tl-201 gated perfusion SPECT (gated-TI) and compares quantitative left ventricular ejection fraction (LVEF) and visually assessed image quality for wall motion and thickening to analogous values obtained from Tc99m-Mibi gated perfusion SPECT (gated - mibi). Methods: We studied 60 patients with a rest gated Tl-201 SPECT (100 MBq, 77KeV peak, 34% window, 20 sec/projection) followed by a post stress gated Sestamibi SPECT (1GBq, 140KeV, 20% window, 20 sec/projection) separate dual isotope protocol. LVEF quantitation was performed using commercially available software (SPECTEF, General Electric). Visual grading of image quality for wall thickening and motion was performed using a three-point scale (excellent, good and poor). Results: LVEF for gated Tl-201 SPECT was 59.6 ± 12.0% (Mean ± SD). LVEF for gated Sestamibi SPECT was 60.4 ±11.4% (Mean ± SD). These were not significantly different (P=0.27, T-Test). There was good correlation (r=0.9) between gated-TI and gated-mibi LVEF values. The quality of gated-Tl images was ranked as excellent, good and poor in 12, 50 and 38% of the patients respectively. Image quality was better in gated-mibi SPECT, with ratings of 12, 62 and 26% respectively. Conclusion: Rapid gated Thallium-201 acquisition with energy window optimisation can be effectively performed on majority of patients and offers the opportunity to assess not only myocardial perfusion and function, as with Technetium based agents, but also viability using a single day one isotope protocol

  3. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  4. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  5. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  6. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  7. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  8. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  9. Will OPEC lose from the Kyoto Protocol?

    International Nuclear Information System (INIS)

    Barnett, Jon; Dessai, Suraje; Webber, Michael

    2004-01-01

    A range of energy-economy models forecast losses to members of the Organisation of Petroleum Exporting Countries (OPEC) should the Kyoto Protocol come into force. These forecasts are a powerful influence in the United Nations Framework Convention on Climate Change negotiations. They are used by OPEC to advance the agenda on the impacts of response measures, covertly arguing for compensation for lost oil revenues arising from implementation of the Protocol. This paper discusses this issue, and explores the key assumptions of these models and their uncertainties. Assumptions about carbon leakage, future availability of oil reserves, substitution, innovation, and capital turnover are considered. The paper suggests that losses will not affect OPEC countries equally, and that these losses are not likely to be as substantial as the models forecast. A range of policy measures are proposed to lessen any impact the Protocol may have on OPEC

  10. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  11. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  12. Rapid chemical analysis of allanite

    International Nuclear Information System (INIS)

    Nishiyama, Goro; Hayashi, Hiroshi

    1981-01-01

    Rapid chemical analysis of allanite was studied by atomic absorption spectrophotometry. Powdered sample was fused with mixture of sodium carbonate anhydrous and borax (4 : 1 weight) in platinum crucible and sample solution was prepared. SiO 2 , Fe 2 O 3 , Al 2 O 3 , MnO and rare earth metals were determined by atomic absorption spectrophotometry, CaO, MgO and Ce 2 O 3 by titration, ThO 2 by colorimetry, and La 2 O 3 by flame photometry respectively. For sample solution treated with hydrofluoric acid and sulfuric acid. Na 2 O and K 2 O were determined by atomic absorption spectrophotometry, TiO 2 and P 2 O 5 by colorimetry. Chemical analyses for four samples were carried out and gave consistent results. (author)

  13. Rapid world modelling for robotics

    International Nuclear Information System (INIS)

    Littile, C.Q.; Wilson, C.W.

    1996-01-01

    The ability to use an interactive world model, whether it is for robotics simulation or most other virtual graphical environments, relies on the users ability to create an accurate world model. Typically this is a tedious process, requiring many hours to create 3-D CAD models of the surfaces within a workspace. The goal of this ongoing project is to develop usable methods to rapidly build world models of real world workspaces. This brings structure to an unstructured environment and allows graphical based robotics control to be accomplished in a reasonable time frame when traditional CAD modelling is not enough. To accomplish this, 3D range sensors are deployed to capture surface data within the workspace. This data is then transformed into surface maps, or models. A 3D world model of the workspace is built quickly and accurately, without ever having to put people in the environment

  14. On rapid rotation in stellarators

    International Nuclear Information System (INIS)

    Helander, Per

    2008-01-01

    The conditions under which rapid plasma rotation may occur in a three-dimensional magnetic field, such as that of a stellarator, are investigated. Rotation velocities comparable to the ion thermal speed are found to be attainable only in magnetic fields which are approximately isometric. In an isometric magnetic field the dependence of the magnetic field strength B on the arc length l along the field is the same for all field lines on each flux surface ψ. Only in fields where the departure from exact isometry, B=B(ψ,l), is of the order of the ion gyroradius divided by the macroscopic length scale are rotation speeds comparable to the ion thermal speed possible. Moreover, it is shown that the rotation must be in the direction of the vector ∇ψx∇B. (author)

  15. Microstructure of rapidly solidified materials

    Science.gov (United States)

    Jones, H.

    1984-07-01

    The basic features of rapidly solidified microstructures are described and differences arising from alternative processing strategies are discussed. The possibility of achieving substantial undercooling prior to solidification in processes such as quench atomization and chill block melt spinning can give rise to striking microstructural transitions even when external heat extraction is nominally Newtonian. The increased opportunity in laser and electron beam surface melting for epitaxial growth on the parent solid at an accelerating rate, however, does not exclude the formation of nonequilibrium phases since the required undercooling can be locally attained at the solidification front which is itself advancing at a sufficiently high velocity. The effects of fluid flow indicated particularly in melt spinning and surface melting are additional to the transformational and heat flow considerations that form the present basis for interpretation of such microstructural effects.

  16. Rapid iconic erasure without masking.

    Science.gov (United States)

    Tijus, Charles Albert; Reeves, Adam

    2004-01-01

    We report on the erasure of the iconic memory of an array of 12 black letters flashed on a continuously- present white field. Erasure is accomplished by replacing the 16 ms letter array (frame 1) with a blank white frame for 16 ms (frame 2). The letter array returns in frame 3, with from one to six letters missing. Report of the missing letters is accurate without the blank white frame but is impoverished with it, as if interposing the blank erases the icon. Erasure occurs without any obvious luminance masking, 'mud splashes', pattern masking (backward, forward, or metacontrast), lateral masking, or masking by object substitution. Erasure is greatly decreased if the blank is presented one frame earlier or later. We speculate that erasure is due to a rapid reset of the icon produced by an informational mis-match.

  17. Rapid onset aggressive vertebral haemangioma.

    Science.gov (United States)

    Cheung, Nicholas K; Doorenbosch, Xenia; Christie, John G

    2011-03-01

    Vertebral haemangiomas are generally benign asymptomatic vascular tumours seen commonly in the adult population. Presentations in paediatric populations are extremely rare, which can result in rapid onset of neurological symptoms. We present a highly unusual case of an aggressive paediatric vertebral haemangioma causing significant cord compression. A 13-year-old boy presented with only 2 weeks duration of progressive gait disturbance, truncal ataxia and loss of bladder control. Magnetic resonance imaging (MRI) of the spine revealed a large vascular epidural mass extending between T6 and T8 vertebral bodies. Associated displacement and compression of the spinal cord was present. A highly vascular bony lesion was found during surgery. Histopathology identified this tumour to be a vertebral haemangioma. We present an extremely unusual acute presentation of a paediatric vertebral haemangioma. This study highlights the need for early diagnosis, MRI for investigation and urgent surgical management. © Springer-Verlag 2011

  18. Customer-experienced rapid prototyping

    Science.gov (United States)

    Zhang, Lijuan; Zhang, Fu; Li, Anbo

    2008-12-01

    In order to describe accurately and comprehend quickly the perfect GIS requirements, this article will integrate the ideas of QFD (Quality Function Deployment) and UML (Unified Modeling Language), and analyze the deficiency of prototype development model, and will propose the idea of the Customer-Experienced Rapid Prototyping (CE-RP) and describe in detail the process and framework of the CE-RP, from the angle of the characteristics of Modern-GIS. The CE-RP is mainly composed of Customer Tool-Sets (CTS), Developer Tool-Sets (DTS) and Barrier-Free Semantic Interpreter (BF-SI) and performed by two roles of customer and developer. The main purpose of the CE-RP is to produce the unified and authorized requirements data models between customer and software developer.

  19. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  20. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.