WorldWideScience

Sample records for ratio analysis protocol

  1. Ambient organic carbon to elemental carbon ratios: Influence of the thermal–optical temperature protocol and implications

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Yuan, E-mail: ycheng@mail.tsinghua.edu.cn [State Key Joint Laboratory of Environment Simulation and Pollution Control, School of Environment, Tsinghua University, Beijing (China); He, Ke-bin, E-mail: hekb@tsinghua.edu.cn [State Key Joint Laboratory of Environment Simulation and Pollution Control, School of Environment, Tsinghua University, Beijing (China); State Environmental Protection Key Laboratory of Sources and Control of Air Pollution Complex, Beijing (China); Duan, Feng-kui; Du, Zhen-yu [State Key Joint Laboratory of Environment Simulation and Pollution Control, School of Environment, Tsinghua University, Beijing (China); Zheng, Mei [College of Environmental Sciences and Engineering, Peking University, Beijing (China); Ma, Yong-liang [State Key Joint Laboratory of Environment Simulation and Pollution Control, School of Environment, Tsinghua University, Beijing (China)

    2014-01-01

    Ambient organic carbon (OC) to elemental carbon (EC) ratios are strongly associated with not only the radiative forcing due to aerosols but also the extent of secondary organic aerosol (SOA) formation. An inter-comparison study was conducted based on fine particulate matter samples collected during summer in Beijing to investigate the influence of the thermal–optical temperature protocol on the OC to EC ratio. Five temperature protocols were used such that the NIOSH (National Institute for Occupational Safety and Health) and EUSAAR (European Supersites for Atmospheric Aerosol Research) protocols were run by the Sunset carbon analyzer while the IMPROVE (the Interagency Monitoring of Protected Visual Environments network)-A protocol and two alternative protocols designed based on NIOSH and EUSAAR were run by the DRI analyzer. The optical attenuation measured by the Sunset carbon analyzer was more easily biased by the shadowing effect, whereas total carbon agreed well between the Sunset and DRI analyzers. The EC{sub IMPROVE-A} (EC measured by the IMPROVE-A protocol; similar hereinafter) to EC{sub NIOSH} ratio and the EC{sub IMPROVE-A} to EC{sub EUSAAR} ratio averaged 1.36 ± 0.21 and 0.91 ± 0.10, respectively, both of which exhibited little dependence on the biomass burning contribution. Though the temperature protocol had substantial influence on the OC to EC ratio, the contributions of secondary organic carbon (SOC) to OC, which were predicted by the EC-tracer method, did not differ significantly among the five protocols. Moreover, the SOC contributions obtained in this study were comparable with previous results based on field observation (typically between 45 and 65%), but were substantially higher than the estimation provided by an air quality model (only 18%). The comparison of SOC and WSOC suggests that when using the transmittance charring correction, all of the three common protocols (i.e., IMPROVE-A, NIOSH and EUSAAR) could be reliable for the estimation

  2. Ambient organic carbon to elemental carbon ratios: Influence of the thermal–optical temperature protocol and implications

    International Nuclear Information System (INIS)

    Cheng, Yuan; He, Ke-bin; Duan, Feng-kui; Du, Zhen-yu; Zheng, Mei; Ma, Yong-liang

    2014-01-01

    Ambient organic carbon (OC) to elemental carbon (EC) ratios are strongly associated with not only the radiative forcing due to aerosols but also the extent of secondary organic aerosol (SOA) formation. An inter-comparison study was conducted based on fine particulate matter samples collected during summer in Beijing to investigate the influence of the thermal–optical temperature protocol on the OC to EC ratio. Five temperature protocols were used such that the NIOSH (National Institute for Occupational Safety and Health) and EUSAAR (European Supersites for Atmospheric Aerosol Research) protocols were run by the Sunset carbon analyzer while the IMPROVE (the Interagency Monitoring of Protected Visual Environments network)-A protocol and two alternative protocols designed based on NIOSH and EUSAAR were run by the DRI analyzer. The optical attenuation measured by the Sunset carbon analyzer was more easily biased by the shadowing effect, whereas total carbon agreed well between the Sunset and DRI analyzers. The EC IMPROVE-A (EC measured by the IMPROVE-A protocol; similar hereinafter) to EC NIOSH ratio and the EC IMPROVE-A to EC EUSAAR ratio averaged 1.36 ± 0.21 and 0.91 ± 0.10, respectively, both of which exhibited little dependence on the biomass burning contribution. Though the temperature protocol had substantial influence on the OC to EC ratio, the contributions of secondary organic carbon (SOC) to OC, which were predicted by the EC-tracer method, did not differ significantly among the five protocols. Moreover, the SOC contributions obtained in this study were comparable with previous results based on field observation (typically between 45 and 65%), but were substantially higher than the estimation provided by an air quality model (only 18%). The comparison of SOC and WSOC suggests that when using the transmittance charring correction, all of the three common protocols (i.e., IMPROVE-A, NIOSH and EUSAAR) could be reliable for the estimation of SOC by the EC

  3. Human Schedule Performance, Protocol Analysis, and the "Silent Dog" Methodology

    Science.gov (United States)

    Cabello, Francisco; Luciano, Carmen; Gomez, Inmaculada; Barnes-Holmes, Dermot

    2004-01-01

    The purpose of the current experiment was to investigate the role of private verbal behavior on the operant performances of human adults, using a protocol analysis procedure with additional methodological controls (the "silent dog" method). Twelve subjects were exposed to fixed ratio 8 and differential reinforcement of low rate 3-s schedules. For…

  4. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  5. A simple protocol for NMR analysis of the enantiomeric purity of chiral hydroxylamines.

    Science.gov (United States)

    Tickell, David A; Mahon, Mary F; Bull, Steven D; James, Tony D

    2013-02-15

    A practically simple three-component chiral derivatization protocol for determining the enantiopurity of chiral hydroxylamines by (1)H NMR spectroscopic analysis is described, involving their treatment with 2-formylphenylboronic acid and enantiopure BINOL to afford a mixture of diastereomeric nitrono-boronate esters whose ratio is an accurate reflection of the enantiopurity of the parent hydroxylamine.

  6. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  7. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  8. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  9. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  10. Thermal/optical methods for elemental carbon quantification in soils and urban dusts: equivalence of different analysis protocols.

    Directory of Open Access Journals (Sweden)

    Yongming Han

    Full Text Available Quantifying elemental carbon (EC content in geological samples is challenging due to interferences of crustal, salt, and organic material. Thermal/optical analysis, combined with acid pretreatment, represents a feasible approach. However, the consistency of various thermal/optical analysis protocols for this type of samples has never been examined. In this study, urban street dust and soil samples from Baoji, China were pretreated with acids and analyzed with four thermal/optical protocols to investigate how analytical conditions and optical correction affect EC measurement. The EC values measured with reflectance correction (ECR were found always higher and less sensitive to temperature program than the EC values measured with transmittance correction (ECT. A high-temperature method with extended heating times (STN120 showed the highest ECT/ECR ratio (0.86 while a low-temperature protocol (IMPROVE-550, with heating time adjusted for sample loading, showed the lowest (0.53. STN ECT was higher than IMPROVE ECT, in contrast to results from aerosol samples. A higher peak inert-mode temperature and extended heating times can elevate ECT/ECR ratios for pretreated geological samples by promoting pyrolyzed organic carbon (PyOC removal over EC under trace levels of oxygen. Considering that PyOC within filter increases ECR while decreases ECT from the actual EC levels, simultaneous ECR and ECT measurements would constrain the range of EC loading and provide information on method performance. Further testing with standard reference materials of common environmental matrices supports the findings. Char and soot fractions of EC can be further separated using the IMPROVE protocol. The char/soot ratio was lower in street dusts (2.2 on average than in soils (5.2 on average, most likely reflecting motor vehicle emissions. The soot concentrations agreed with EC from CTO-375, a pure thermal method.

  11. Thermal/optical methods for elemental carbon quantification in soils and urban dusts: equivalence of different analysis protocols.

    Science.gov (United States)

    Han, Yongming; Chen, Antony; Cao, Junji; Fung, Kochy; Ho, Fai; Yan, Beizhan; Zhan, Changlin; Liu, Suixin; Wei, Chong; An, Zhisheng

    2013-01-01

    Quantifying elemental carbon (EC) content in geological samples is challenging due to interferences of crustal, salt, and organic material. Thermal/optical analysis, combined with acid pretreatment, represents a feasible approach. However, the consistency of various thermal/optical analysis protocols for this type of samples has never been examined. In this study, urban street dust and soil samples from Baoji, China were pretreated with acids and analyzed with four thermal/optical protocols to investigate how analytical conditions and optical correction affect EC measurement. The EC values measured with reflectance correction (ECR) were found always higher and less sensitive to temperature program than the EC values measured with transmittance correction (ECT). A high-temperature method with extended heating times (STN120) showed the highest ECT/ECR ratio (0.86) while a low-temperature protocol (IMPROVE-550), with heating time adjusted for sample loading, showed the lowest (0.53). STN ECT was higher than IMPROVE ECT, in contrast to results from aerosol samples. A higher peak inert-mode temperature and extended heating times can elevate ECT/ECR ratios for pretreated geological samples by promoting pyrolyzed organic carbon (PyOC) removal over EC under trace levels of oxygen. Considering that PyOC within filter increases ECR while decreases ECT from the actual EC levels, simultaneous ECR and ECT measurements would constrain the range of EC loading and provide information on method performance. Further testing with standard reference materials of common environmental matrices supports the findings. Char and soot fractions of EC can be further separated using the IMPROVE protocol. The char/soot ratio was lower in street dusts (2.2 on average) than in soils (5.2 on average), most likely reflecting motor vehicle emissions. The soot concentrations agreed with EC from CTO-375, a pure thermal method.

  12. A Calculus for Control Flow Analysis of Security Protocols

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Nielson, Hanne Riis; Nielson, Flemming

    2004-01-01

    The design of a process calculus for anaysing security protocols is governed by three factors: how to express the security protocol in a precise and faithful manner, how to accommodate the variety of attack scenarios, and how to utilise the strengths (and limit the weaknesses) of the underlying...... analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style and we have previously shown its ability to analyse a variety of security protocols. This paper develops a calculus, LysaNS that allows for much greater control and clarity in the description...

  13. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  14. Financial Ratio Analysis Comes to Nonprofits.

    Science.gov (United States)

    Chabotar, Kent John

    1989-01-01

    To evaluate their financial health, a growing number of colleges, universities, and other nonprofit organizations are using financial ratio analysis, a technique used in business. The strengths and weaknesses of ratio analysis are assessed and suggestions are made on how nonprofits can use it most effectively. (Author/MLW)

  15. Very high precision and accuracy analysis of triple isotopic ratios of water. A critical instrumentation comparison study.

    Science.gov (United States)

    Gkinis, Vasileios; Holme, Christian; Morris, Valerie; Thayer, Abigail Grace; Vaughn, Bruce; Kjaer, Helle Astrid; Vallelonga, Paul; Simonsen, Marius; Jensen, Camilla Marie; Svensson, Anders; Maffrezzoli, Niccolo; Vinther, Bo; Dallmayr, Remi

    2017-04-01

    We present a performance comparison study between two state of the art Cavity Ring Down Spectrometers (Picarro L2310-i, L2140-i). The comparison took place during the Continuous Flow Analysis (CFA) campaign for the measurement of the Renland ice core, over a period of three months. Instant and complete vaporisation of the ice core melt stream, as well as of in-house water reference materials is achieved by accurate control of microflows of liquid into a homemade calibration system by following simple principles of the Hagen-Poiseuille law. Both instruments share the same vaporisation unit in a configuration that minimises sample preparation discrepancies between the two analyses. We describe our SMOW-SLAP calibration and measurement protocols for such a CFA application and present quality control metrics acquired during the full period of the campaign on a daily basis. The results indicate an unprecedented performance for all 3 isotopic ratios (δ2H, δ17O, δ18O ) in terms of precision, accuracy and resolution. We also comment on the precision and accuracy of the second order excess parameters of HD16O and H217O over H218O (Dxs, Δ17O ). To our knowledge these are the first reported CFA measurements at this level of precision and accuracy for all three isotopic ratios. Differences on the performance of the two instruments are carefully assessed during the measurement and reported here. Our quality control protocols extend to the area of low water mixing ratios, a regime in which often atmospheric vapour measurements take place and Cavity Ring Down Analysers show a poorer performance due to the lower signal to noise ratios. We address such issues and propose calibration protocols from which water vapour isotopic analyses can benefit from.

  16. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  17. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Van Leeuwen, Brian P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Eldridge, John M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approach that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.

  18. Mean-Field Analysis for the Evaluation of Gossip Protocols

    NARCIS (Netherlands)

    Bakshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  19. Mean-field analysis for the evaluation of gossip protocols

    NARCIS (Netherlands)

    Bakhshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    2008-01-01

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  20. Using Ratio Analysis to Evaluate Financial Performance.

    Science.gov (United States)

    Minter, John; And Others

    1982-01-01

    The ways in which ratio analysis can help in long-range planning, budgeting, and asset management to strengthen financial performance and help avoid financial difficulties are explained. Types of ratios considered include balance sheet ratios, net operating ratios, and contribution and demand ratios. (MSE)

  1. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  2. RCRA groundwater data analysis protocol for the Hanford Site, Washington

    International Nuclear Information System (INIS)

    Chou, C.J.; Jackson, R.L.

    1992-04-01

    The Resource Conservation and Recovery Act of 1976 (RCRA) groundwater monitoring program currently involves site-specific monitoring of 20 facilities on the Hanford Site in southeastern Washington. The RCRA groundwater monitoring program has collected abundant data on groundwater quality. These data are used to assess the impact of a facility on groundwater quality or whether remediation efforts under RCRA corrective action programs are effective. Both evaluations rely on statistical analysis of groundwater monitoring data. The need for information on groundwater quality by regulators and environmental managers makes statistical analysis of monitoring data an important part of RCRA groundwater monitoring programs. The complexity of groundwater monitoring programs and variabilities (spatial, temporal, and analytical) exhibited in groundwater quality variables indicate the need for a data analysis protocol to guide statistical analysis. A data analysis protocol was developed from the perspective of addressing regulatory requirements, data quality, and management information needs. This data analysis protocol contains four elements: data handling methods; graphical evaluation techniques; statistical tests for trend, central tendency, and excursion analysis; and reporting procedures for presenting results to users

  3. I-123 IBZM-SPECT: improved acquisition protocol with HR-collimator

    International Nuclear Information System (INIS)

    Sandrock, D.; Ivancevic, V.; Dopichaj-Menge, U.; Gruber, D.; Munz, D.

    2002-01-01

    Aim: Aim of this study was to evaluate the impact of different acquisition and reconstruction protocols on the quality of SPECT diagnostics with I-123 IBZM in patients with diseases of the dopaminergic system. Material and Methods: Overall, 30 patients (19 men, 11 women, aged 22 - 80 years) were studied with SPECT after i.v. injection of 5 mCi (185 MBq) I-123 IBZM. Acquisition was performed 60 min p.i. (protocol A) using a medium energy collimator, a 64 x 64 matrix, 64 projections, step and shoot technique, 5.6 0 and 20 seconds per step with a MultiSPECT2 double-head gamma camera (Siemens). Immediately afterwards, a second acquisition (protocol B, 90 min p.i.) using a high resolution collimator, a 128 x 128 matrix, 60 projections, step and shoot technique, 3 0 and 30 seconds per step was performed. The reconstruction was done in filtered backprojection technique and a Butterworth filter of order 7, in protocol A using a cutoff of 0.5 and in protocol B of 0.4. Finally, the net count ratios of the basal ganglia to the frontal lobe(s) were calculated and compared with the clinical diagnosis. Results: The visual analysis yielded - as expected -a better image quality for protocol B (concordant impression of 3 independent observers) with more accurate delineation of the basal ganglia. The count ratios with protocol B were (mean) 0.19 higher (equivalent to 13 %) than with protocol A. In the group of patients with count ratios > 1.55 there was the highest (and significant) difference between protocols A and B with (mean count ratio difference) 0.32 (equivalent to 20 %). Protocol B also allowed a better differentiation between patients clinically staged normal and abnormal. In patients with unilateral disease, this difference between normal and abnormal was more prominent (in comparison to the contralateral side as well as compared to the reference value [1.5]). The comparison of the count ratios with the clinical data revealed 7 patients with borderline results with

  4. Communicating systems with UML 2 modeling and analysis of network protocols

    CERN Document Server

    Barrera, David Garduno

    2013-01-01

    This book gives a practical approach to modeling and analyzing communication protocols using UML 2. Network protocols are always presented with a point of view focusing on partial mechanisms and starting models. This book aims at giving the basis needed for anybody to model and validate their own protocols. It follows a practical approach and gives many examples for the description and analysis of well known basic network mechanisms for protocols.The book firstly shows how to describe and validate the main protocol issues (such as synchronization problems, client-server interactions, layer

  5. An approach to standardization of urine sediment analysis via suggestion of a common manual protocol.

    Science.gov (United States)

    Ko, Dae-Hyun; Ji, Misuk; Kim, Sollip; Cho, Eun-Jung; Lee, Woochang; Yun, Yeo-Min; Chun, Sail; Min, Won-Ki

    2016-01-01

    The results of urine sediment analysis have been reported semiquantitatively. However, as recent guidelines recommend quantitative reporting of urine sediment, and with the development of automated urine sediment analyzers, there is an increasing need for quantitative analysis of urine sediment. Here, we developed a protocol for urine sediment analysis and quantified the results. Based on questionnaires, various reports, guidelines, and experimental results, we developed a protocol for urine sediment analysis. The results of this new protocol were compared with those obtained with a standardized chamber and an automated sediment analyzer. Reference intervals were also estimated using new protocol. We developed a protocol with centrifugation at 400 g for 5 min, with the average concentration factor of 30. The correlation between quantitative results of urine sediment analysis, the standardized chamber, and the automated sediment analyzer were generally good. The conversion factor derived from the new protocol showed a better fit with the results of manual count than the default conversion factor in the automated sediment analyzer. We developed a protocol for manual urine sediment analysis to quantitatively report the results. This protocol may provide a mean for standardization of urine sediment analysis.

  6. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    A. Suruliandi

    2015-03-01

    Full Text Available Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN. They are On Demand Multicast Routing Protocol (ODMRP, Protocol for Unified Multicasting through Announcement (PUMA, Multicast Adhoc On demand Distance Vector Protocol (MAODV, Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP, Application Layer Multicast Algorithm (ALMA and enhanced version of ALMA (ALMA-H for WSN. Among them, ODMRP, MAODV and PUMA are reactive protocols while OBAMP, ALMA and ALMA-H are proactive protocols. This paper compares the performance of these protocols with common parameters such as Throughput, Reliability, End-to-End delay and Packet Delivery Ratio (PDR with increasing the numbers of nodes and increasing the speed of the nodes. The main objective of this work is to select the efficient multicast routing protocol for WSN among six multicast routing protocol based on relative strength and weakness of each protocol. The summary of above six multicast routing protocols is presented with a table of different performance characteristics. Experimental result shows that ODMRP attains higher throughput, reliability and higher packet delivery ratio than other multicast routing protocol, while incurring far less end-to-end delay.

  7. SIMULATION AND ANALYSIS OF GREEDY ROUTING PROTOCOL IN VIEW OF ENERGY CONSUMPTION AND NETWORK LIFETIME IN THREE DIMENSIONAL UNDERWATER WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    SHEENA KOHLI

    2017-11-01

    Full Text Available Underwater Wireless Sensor Network (UWSN comprises of a number of miniature sized sensing devices deployed in the sea or ocean, connected by dint of acoustic links to each other. The sensors trap the ambient conditions and transmit the data from one end to another. For transmission of data in any medium, routing protocols play a crucial role. Moreover, being battery limited, an unavoidable parameter to be considered in operation and analysis of protocols is the network energy and the network lifetime. The paper discusses the greedy routing protocol for underwater wireless sensor networks. The simulation of this routing protocol also takes into consideration the characteristics of acoustic communication like attenuation, transmission loss, signal to noise ratio, noise, propagation delay. The results from these observations may be used to construct an accurate underwater communication model.

  8. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  9. Protocol design and analysis for cooperative wireless networks

    CERN Document Server

    Song, Wei; Jin, A-Long

    2017-01-01

    This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...

  10. Business sustainability performance measurement: Eco-ratio analysis

    Directory of Open Access Journals (Sweden)

    Collins C. Ngwakwe

    2016-12-01

    Full Text Available Eco-aware customers and stakeholders are demanding for a measurement that links environmental performance with other business operations. To bridge this seemingly measurement gap, this paper suggests ‘Eco-Ratio Analysis’ and proposes an approach for conducting eco-ratio analysis. It is argued that since accounting ratios function as a tool for evaluating corporate financial viability by management and investors, eco-ratio analysis should be brought to the fore to provide a succinct measurement about the linkage between environmental performance and conventional business performance. It is hoped that this suggestion will usher in a nuance debate and approach in the teaching, research and practice of environmental management and sustainability accounting

  11. Quality assurance in MRI breast screening: comparing signal-to-noise ratio in dynamic contrast-enhanced imaging protocols

    Science.gov (United States)

    Kousi, Evanthia; Borri, Marco; Dean, Jamie; Panek, Rafal; Scurr, Erica; Leach, Martin O.; Schmidt, Maria A.

    2016-01-01

    MRI has been extensively used in breast cancer staging, management and high risk screening. Detection sensitivity is paramount in breast screening, but variations of signal-to-noise ratio (SNR) as a function of position are often overlooked. We propose and demonstrate practical methods to assess spatial SNR variations in dynamic contrast-enhanced (DCE) breast examinations and apply those methods to different protocols and systems. Four different protocols in three different MRI systems (1.5 and 3.0 T) with receiver coils of different design were employed on oil-filled test objects with and without uniformity filters. Twenty 3D datasets were acquired with each protocol; each dataset was acquired in under 60 s, thus complying with current breast DCE guidelines. In addition to the standard SNR calculated on a pixel-by-pixel basis, we propose other regional indices considering the mean and standard deviation of the signal over a small sub-region centred on each pixel. These regional indices include effects of the spatial variation of coil sensitivity and other structured artefacts. The proposed regional SNR indices demonstrate spatial variations in SNR as well as the presence of artefacts and sensitivity variations, which are otherwise difficult to quantify and might be overlooked in a clinical setting. Spatial variations in SNR depend on protocol choice and hardware characteristics. The use of uniformity filters was shown to lead to a rise of SNR values, altering the noise distribution. Correlation between noise in adjacent pixels was associated with data truncation along the phase encoding direction. Methods to characterise spatial SNR variations using regional information were demonstrated, with implications for quality assurance in breast screening and multi-centre trials.

  12. Rethinking Protocol Analysis from a Cultural Perspective.

    Science.gov (United States)

    Smagorinsky, Peter

    2001-01-01

    Outlines a cultural-historical activity theory (CHAT) perspective that accounts for protocol analysis along three key dimensions: the relationship between thinking and speech from a representational standpoint; the social role of speech in research methodology; and the influence of speech on thinking and data collection. (Author/VWL)

  13. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4, Volume IV: Inherent Optical Properties: Instruments, Characterizations, Field Measurements and Data Analysis Protocols

    Science.gov (United States)

    Mueller, J. L.; Fargion, G. S.; McClain, C. R. (Editor); Pegau, S.; Zanefeld, J. R. V.; Mitchell, B. G.; Kahru, M.; Wieland, J.; Stramska, M.

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparision and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background, and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 is entirely superseded by the six volumes of Revision 4 listed above.

  14. Design and Analysis of Transport Protocols for Reliable High-Speed Communications

    NARCIS (Netherlands)

    Oláh, A.

    1997-01-01

    The design and analysis of transport protocols for reliable communications constitutes the topic of this dissertation. These transport protocols guarantee the sequenced and complete delivery of user data over networks which may lose, duplicate and reorder packets. Reliable transport services are

  15. Analysis of the LTE Access Reservation Protocol for Real-Time Traffic

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2013-01-01

    LTE is increasingly seen as a system for serving real-time Machine-to-Machine (M2M) communication needs. The asynchronous M2M user access in LTE is obtained through a two-phase access reservation protocol (contention and data phase). Existing analysis related to these protocols is based...... of the two-phase LTE reservation protocol and asses its performance, when assumptions (1) and (2) do not hold....

  16. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  17. Performance Analysis of Selective Decode-and-Forward Multinode Incremental Relaying with Maximal Ratio Combining

    KAUST Repository

    Hadjtaieb, Amir

    2013-09-12

    In this paper, we propose an incremental multinode relaying protocol with arbitrary N-relay nodes that allows an efficient use of the channel spectrum. The destination combines the received signals from the source and the relays using maximal ratio Combining (MRC). The transmission ends successfully once the accumulated signal-to-noise ratio (SNR) exceeds a predefined threshold. The number of relays participating in the transmission is adapted to the channel conditions based on the feedback from the destination. The use of incremental relaying allows obtaining a higher spectral efficiency. Moreover, the symbol error probability (SEP) performance is enhanced by using MRC at the relays. The use of MRC at the relays implies that each relay overhears the signals from the source and all previous relays and combines them using MRC. The proposed protocol differs from most of existing relaying protocol by the fact that it combines both incremental relaying and MRC at the relays for a multinode topology. Our analyses for a decode-and-forward mode show that: (i) compared to existing multinode relaying schemes, the proposed scheme can essentially achieve the same SEP performance but with less average number of time slots, (ii) compared to schemes without MRC at the relays, the proposed scheme can approximately achieve a 3 dB gain.

  18. Formal Security Analysis of the MaCAN Protocol

    DEFF Research Database (Denmark)

    Bruni, Alessandro; Sojka, Michal; Nielson, Flemming

    2014-01-01

    analysis identifies two flaws in the original protocol: one creates unavailability concerns during key establishment, and the other allows re-using authenticated signals for different purposes. We propose and analyse a modification that improves its behaviour while fitting the constraints of CAN bus...

  19. Ratio analysis specifics of the family dairies' financial statements

    Directory of Open Access Journals (Sweden)

    Mitrović Aleksandra

    2015-01-01

    Full Text Available The subject of this paper is the evaluation of the financial analysis specifics of the dairy enterprises with a focus on the implementation of the ratio analysis of financial statements. The ratio analysis is a central part of financial analysis, since it is based on investigating the relationship between logically related items in the financial statements to assess the financial position of the observed enterprise and its earning capacity. Speaking about the reporting of financial performance in family dairies, the basis is created for displaying techniques of financial analysis, with a special indication on the specifics of their application in agricultural enterprises focusing on companies engaged in dairying. Applied in the paper is ratio analysis on the example of a dairy enterprise, i.e. a family dairy operating in Serbia. The ratio indicators are the basis for identifying relationships based on which by comparing the actual performance and certain business standards differences or variations are identified.

  20. Performance Analysis of Untraceability Protocols for Mobile Agents Using an Adaptable Framework

    OpenAIRE

    LESZCZYNA RAFAL; GORSKI Janusz Kazimierz

    2006-01-01

    Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should extend a sole validation of their security and cover other quality aspects, primarily their efficiency. Thus after conducting a security analysis, we wanted to complement it with a performance analysis. For this purpose we developed a performance evaluation framework, which, as we realised, with certain adjustments, can ...

  1. [Clinical outcomes and economic analysis of two ovulation induction protocols in patients undergoing repeated IVF/ICSI cycles].

    Science.gov (United States)

    Chen, Xiao; Geng, Ling; Li, Hong

    2014-04-01

    To compare the clinical outcomes and cost-effectiveness of luteal phase down-regulation with gonadotrophin-releasing hormone (GnRH) agonist protocol and GnRH antagonist protocol in patients undergoing repeated in vitro fertilization and intracytoplasmic sperm injection (IVF-ICSI) cycles. A retrospective analysis of clinical outcomes and costs was conducted among 198 patients undergoing repeated IVF-ICSI cycles, including 109 receiving luteal phase down-regulation with GnRH agonist protocol (group A) and 89 receiving GnRH antagonist protocol (group B). The numbers of oocytes retrieved and good embryos, clinical pregnancy rate, abortion rate, the live birth rate, mean total cost, and the cost-effective ratio were compared between the two groups. In patients undergoing repeated IVF-ICSI cycles, the two protocols produced no significant differences in the number of good embryos, clinical pregnancy rate, abortion rate, or twin pregnancy rate. Compared with group B, group A had better clinical outcomes though this difference was not statistically significant. The number of retrieved oocytes was significantly greater and live birth rate significantly higher in group A than in group B (9.13=4.98 vs 7.11=4.74, and 20.2% vs 9.0%, respectively). Compared with group B, group A had higher mean total cost per cycle but lower costs for each oocyte retrieved (2729.11 vs 3038.60 RMB yuan), each good embryo (8867.19 vs 9644.85 RMB yuan), each clinical pregnancy (77598.06 vs 96139.85 RMB yuan). For patients undergoing repeated IVF/ICSI cycle, luteal phase down-regulation with GnRH agonist protocol produces good clinical outcomes with also good cost-effectiveness in spite an unsatisfactory ovarian reserve.

  2. A markerless protocol for genetic analysis of Aggregatibacter actinomycetemcomitans

    Science.gov (United States)

    Cheng, Ya-An; Jee, Jason; Hsu, Genie; Huang, Yanyan; Chen, Casey; Lin, Chun-Pin

    2015-01-01

    Background/Purpose The genomes of different Aggregatibacter actinomycetemcomitans strains contain many strain-specific genes and genomic islands (defined as DNA found in some but not all strains) of unknown functions. Genetic analysis for the functions of these islands will be constrained by the limited availability of genetic markers and vectors for A. actinomycetemcomitans. In this study we tested a novel genetic approach of gene deletion and restoration in a naturally competent A. actinomycetemcomitans strain D7S-1. Methods Specific genes’ deletion mutants and mutants restored with the deleted genes were constructed by a markerless loxP/Cre system. In mutants with sequential deletion of multiple genes loxP with different spacer regions were used to avoid unwanted recombinations between loxP sites. Results Eight single-gene deletion mutants, four multiple-gene deletion mutants, and two mutants with restored genes were constructed. No unintended non-specific deletion mutants were generated by this protocol. The protocol did not negatively affect the growth and biofilm formation of A. actinomycetemcomitans. Conclusion The protocol described in this study is efficient and specific for genetic manipulation of A. actinomycetemcomitans, and will be amenable for functional analysis of multiple genes in A. actinomycetemcomitans. PMID:24530245

  3. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  4. Performance Analysis of an Enhanced PRMA-HS Protocol for LEO Satellite Communication

    Institute of Scientific and Technical Information of China (English)

    ZHUO Yong-ning; YAN Shao-hu; WU Shi-qi

    2005-01-01

    The packet reservation multiple access with hindering state (PRMA-HS) is a protocol suitable for LEO satellite mobile communication. Although working well with light system payload (amount of user terminals), the protocol imposes high channel congestion on system with heavy payload, thus degrades the system's quality of service. To controlling the channel congestion, a scheme of enhanced PRMA-HS protocol is proposed, which aims to reduce the collision of voice packets by adopting a mechanism of access control. Through theoretic analysis, the system's mathematic model is presented and the packet drop probability of the scheme is deduced. To testify the performance of the scheme, a simulation is performed and the results support our analysis.

  5. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  6. Ratio Analysis: Where Investments Meet Mathematics.

    Science.gov (United States)

    Barton, Susan D.; Woodbury, Denise

    2002-01-01

    Discusses ratio analysis by which investments may be evaluated. Requires the use of fundamental mathematics, problem solving, and a comparison of the mathematical results within the framework of industry. (Author/NB)

  7. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  8. Uncertainty importance analysis using parametric moment ratio functions.

    Science.gov (United States)

    Wei, Pengfei; Lu, Zhenzhou; Song, Jingwen

    2014-02-01

    This article presents a new importance analysis framework, called parametric moment ratio function, for measuring the reduction of model output uncertainty when the distribution parameters of inputs are changed, and the emphasis is put on the mean and variance ratio functions with respect to the variances of model inputs. The proposed concepts efficiently guide the analyst to achieve a targeted reduction on the model output mean and variance by operating on the variances of model inputs. The unbiased and progressive unbiased Monte Carlo estimators are also derived for the parametric mean and variance ratio functions, respectively. Only a set of samples is needed for implementing the proposed importance analysis by the proposed estimators, thus the computational cost is free of input dimensionality. An analytical test example with highly nonlinear behavior is introduced for illustrating the engineering significance of the proposed importance analysis technique and verifying the efficiency and convergence of the derived Monte Carlo estimators. Finally, the moment ratio function is applied to a planar 10-bar structure for achieving a targeted 50% reduction of the model output variance. © 2013 Society for Risk Analysis.

  9. Performance evaluation using bootstrapping DEA techniques: Evidence from industry ratio analysis

    OpenAIRE

    Halkos, George; Tzeremes, Nickolaos

    2010-01-01

    In Data Envelopment Analysis (DEA) context financial data/ ratios have been used in order to produce a unified measure of performance metric. However, several scholars have indicated that the inclusion of financial ratios create biased efficiency estimates with implications on firms’ and industries’ performance evaluation. There have been several DEA formulations and techniques dealing with this problem including sensitivity analysis, Prior-Ratio-Analysis and DEA/ output–input ratio analysis ...

  10. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    Science.gov (United States)

    2006-12-01

    field of 9 identifies the ICMP message as an adverstisement . Code Mobile IP home agents and foreign agents use the value of 16 to prevent any nodes...ANALYSIS OF THE MOBILE IP PROTOCOL (RFC 3344 AND RELATED RFCS) by Chin Chin Ng December 2006 Thesis Co-Advisors: George W. Dinolt J. D...December 2006 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Performance Analysis of the Mobile IP Protocol (RFC 3344 and

  11. Analysis of transmission speed of AX.25 Protocol implemented in satellital earth station UPTC

    Directory of Open Access Journals (Sweden)

    Oscar Fernando Vera Cely

    2015-11-01

    Full Text Available One of the important parameters for the proper functioning of satellital ground station projected on Pedagogical and Technological University of Colombia (UPTC is the efficiency in transmission speed on communications protocol. This paper shows the results of analysis of the transmission speed of the AX.25 protocol implemented in the communication system of the satellital ground station UPTC. It begins with a brief description of the implemented hardware; the behavior of the transmission rate is evaluated using a theoretical analysis based on equations to estimate this parameter in the operation of the protocol, then tests are performed using the hardware that the satellital ground station UPTC has and finally, the conclusions are presented. Based on comparison of the theoretical analysis results obtained experimentally, it became apparent that AX.25 protocol efficiency is higher when increasing the number of frames.

  12. Effectiveness of different pre-treatments in recovering pre-burial isotopic ratios of charred plants.

    Science.gov (United States)

    Brinkkemper, O; Braadbaart, F; van Os, B; van Hoesel, A; van Brussel, A A N; Fernandes, R

    2018-02-15

    Isotopic analysis of archaeological charred plant remains offers useful archaeological information. However, adequate sample pre-treatment protocols may be necessary to provide a contamination-free isotopic signal while limiting sample loss and achieving a high throughput. Under these constraints, research was undertaken to compare the performance of different pre-treatment protocols. Charred archaeological plant material was selected for isotopic analysis (δ 13 C and δ 15 N values) by isotope ratio mass spectrometry from a variety of plant species, time periods and soil conditions. Preservation conditions and the effectiveness of cleaning protocols were assessed through Fourier transform infrared spectroscopy and X-ray fluorescence (XRF) spectrometry. An acid-base-acid protocol, successfully employed in radiocarbon dating, was used to define a contamination-free isotopic reference. Acid-base-acid isotopic measurements were compared with those obtained from untreated material and an acid-only protocol. The isotopic signals of untreated material and the acid-only protocol typically did not differ more than 1‰ from those of the acid-base-acid reference. There were no significant isotopic offsets between acid-base-acid and acid-only or untreated samples. Sample losses in the acid-base-acid protocol were on average 50 ± 17% (maximum = 98.4%). Elemental XRF measurements showed promising results in the detection of more contaminated samples albeit with a high rate of false positives. For the large range of preservation conditions described in the study, untreated charred plant samples, water cleaned of sediments, provide reliable stable isotope ratios of carbon and nitrogen. The use of pre-treatments may be necessary under different preservation conditions or more conservative measurement uncertainties should be reported. Copyright © 2017 John Wiley & Sons, Ltd.

  13. A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2010-01-01

    We present a formal analysis of the Web Services Atomic Transaction (WS-AT) protocol. WS-AT is a part of the WS-Coordination framework and describes an algorithm for reaching agreement on the outcome of a distributed transaction. The protocol is modelled and verified using the model checker UPPAAL...

  14. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA)

    DEFF Research Database (Denmark)

    Muharemovic, O; Troelsen, A; Thomsen, M G

    2018-01-01

    INTRODUCTION: Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time...... imaging. Radiographers in the control group used a standard RSA protocol. RESULTS: At three months, radiographers in the case group significantly reduced (p .... No significant improvements were found in the control group at any time point. CONCLUSION: There is strong evidence that personalized RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute...

  15. Blocking Optimality in Distributed Real-Time Locking Protocols

    Directory of Open Access Journals (Sweden)

    Björn Bernhard Brandenburg

    2014-09-01

    Full Text Available Lower and upper bounds on the maximum priority inversion blocking (pi-blocking that is generally unavoidable in distributed multiprocessor real-time locking protocols (where resources may be accessed only from specific synchronization processors are established. Prior work on suspension-based shared-memory multiprocessor locking protocols (which require resources to be accessible from all processors has established asymptotically tight bounds of Ω(m and Ω(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively, where m denotes the total number of processors and n denotes the number of tasks. In this paper, it is shown that, in the case of distributed semaphore protocols, there exist two different task allocation scenarios that give rise to distinct lower bounds. In the case of co-hosted task allocation, where application tasks may also be assigned to synchronization processors (i.e., processors hosting critical sections, Ω(Φ · n maximum pi-blocking is unavoidable for some tasks under any locking protocol under both suspension-aware and suspension-oblivious schedulability analysis, where Φ denotes the ratio of the maximum response time to the shortest period. In contrast, in the case of disjoint task allocation (i.e., if application tasks may not be assigned to synchronization processors, only Ω(m and Ω(n maximum pi-blocking is fundamentally unavoidable under suspension-oblivious and suspension-aware analysis, respectively, as in the shared-memory case. These bounds are shown to be asymptotically tight with the construction of two new distributed real-time locking protocols that ensure O(m and O(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively.

  16. PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM

    Directory of Open Access Journals (Sweden)

    S. Prasanna

    2014-03-01

    Full Text Available Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.

  17. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  18. Ratio analysis specifics of the family dairies' financial statements

    OpenAIRE

    Mitrović Aleksandra; Knežević Snežana; Veličković Milica

    2015-01-01

    The subject of this paper is the evaluation of the financial analysis specifics of the dairy enterprises with a focus on the implementation of the ratio analysis of financial statements. The ratio analysis is a central part of financial analysis, since it is based on investigating the relationship between logically related items in the financial statements to assess the financial position of the observed enterprise and its earning capacity. Speaking about the reporting of financial performanc...

  19. Combined slope ratio analysis and linear-subtraction: An extension of the Pearce ratio method

    Science.gov (United States)

    De Waal, Sybrand A.

    1996-07-01

    A new technique, called combined slope ratio analysis, has been developed by extending the Pearce element ratio or conserved-denominator method (Pearce, 1968) to its logical conclusions. If two stoichiometric substances are mixed and certain chemical components are uniquely contained in either one of the two mixing substances, then by treating these unique components as conserved, the composition of the substance not containing the relevant component can be accurately calculated within the limits allowed by analytical and geological error. The calculated composition can then be subjected to rigorous statistical testing using the linear-subtraction method recently advanced by Woronow (1994). Application of combined slope ratio analysis to the rocks of the Uwekahuna Laccolith, Hawaii, USA, and the lavas of the 1959-summit eruption of Kilauea Volcano, Hawaii, USA, yields results that are consistent with field observations.

  20. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  1. ACUTE EFFECTS OF DIFFERENT STATIC STRETCHING PROTOCOLS ON PEAK TORQUE, CONVENTIONAL AND FUNCTIONAL HAMSTRINGS-TO-QUADRICEPS RATIOS IN ACTIVE WOMEN

    Directory of Open Access Journals (Sweden)

    Ghada M. ALQaslah

    2016-10-01

    Full Text Available Background: This study might have been directed to some degree because of clashing results in the past studies regarding the impacts for different SS protocols on muscle strength and possibility for injury. The objective of the study was to investigate the acute effects of different static stretching (SS durations (20, 30, and 60s on isokinetic concentric quadriceps (Q and hamstrings (H peak torque (PT, eccentric H PT and conventional and functional H:Q ratios under different stretching conditions and angular velocities (60°and180°/s in active women. Methods: Isokinetic tests were performed on 108 active women. A HUMAC system was used to measure unilateral concentric Q and H PT, and eccentric H PT at 60 and 180º/s at baseline and after a bout of H-only, Q-only, and combined H and Q muscles SS. The data were statistically treated using five separate three-way (time x conditions x velocity ANOVA. Results: There were no significant differences among groups at baseline (P > 0.05. Significant reductions of all outcome measures have been shown to occur after 30 and 60s of SS (P 0.05. Conclusion: Short-lasting stretching can be done before exercises that require strength. However, since 30s or 60s stretching protocols adversely affect the muscle strength, performance and lower H:Q ratios they are not recommended prior to activities demanding the production of high forces.

  2. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  3. Security analysis of standards-driven communication protocols for healthcare scenarios.

    Science.gov (United States)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  4. Explorations in statistics: the analysis of ratios and normalized data.

    Science.gov (United States)

    Curran-Everett, Douglas

    2013-09-01

    Learning about statistics is a lot like learning about science: the learning is more meaningful if you can actively explore. This ninth installment of Explorations in Statistics explores the analysis of ratios and normalized-or standardized-data. As researchers, we compute a ratio-a numerator divided by a denominator-to compute a proportion for some biological response or to derive some standardized variable. In each situation, we want to control for differences in the denominator when the thing we really care about is the numerator. But there is peril lurking in a ratio: only if the relationship between numerator and denominator is a straight line through the origin will the ratio be meaningful. If not, the ratio will misrepresent the true relationship between numerator and denominator. In contrast, regression techniques-these include analysis of covariance-are versatile: they can accommodate an analysis of the relationship between numerator and denominator when a ratio is useless.

  5. Financial-Ratio Analysis and Medical School Management.

    Science.gov (United States)

    Eastaugh, Steven R.

    1980-01-01

    The value of a uniform program of financial assistance to medical education and research is questioned. Medical schools have an uneven ability to compensate for declining federal capitation and research grants. Financial-ratio analysis and cluster analysis are utilized to suggest four adaptive responses to future financial pressures. (Author/MLW)

  6. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  7. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA).

    Science.gov (United States)

    Muharemovic, O; Troelsen, A; Thomsen, M G; Kallemose, T; Gosvig, K K

    2018-05-01

    Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time and the number of exposure repetitions. Forty patients undergoing primary total hip arthroplasty were equally randomized to either a case or a control group. Radiographers in the case group were assisted by personalized patient protocols containing information about each patient's post-operative RSA imaging. Radiographers in the control group used a standard RSA protocol. At three months, radiographers in the case group significantly reduced (p RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute to the reduction of examination time, thus ensuring a cost benefit for department and patient safety. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.

  8. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  9. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  10. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  11. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  12. A Performance Study of LEACH and Direct Diffusion Routing Protocols in Wireless Sensor Network

    International Nuclear Information System (INIS)

    Fakher, S.; Sharshar, K.; Moawad, M.I.; Shokair, M.

    2016-01-01

    The Wireless Sensor Network (WSN) is composed of a large number of sensor nodes with limited computation communication, and battery facilities. One of the common applications of this network is environment monitoring through sensing motion, measuring temperature, humidity and radiation. One of the basic activities in WSN is data gathering which represents a great challenge. Many routing protocols are proposed for that network to collect and aggregate the data. The most popular ones are hierarchy and data centric routing protocols. The main goal of this study is to identify the most preferable routing protocol, to be used in each mobility model. This paper studies the performance of LEACH (Low Energy Adaptive Clustering Hierarchy) from hierarchy routing protocol and direct diffusion from data centric routing protocol which is not clarified until now. Moreover, a comparison between LEACH and direct diffusion protocol using NS2 simulator will be made, and an analysis of these protocols will be conducted. The comparison includes packet delivery ratio, throughput, average energy ratio, average delay, network lifetime, and routing overhead. The performance is evaluated by varying the number of sensor nodes under three mobility models Reference Point Group Mobility Model (RPGM), Manhattan and random waypoint mobility model. Simulation results show that LEACH routing protocol has a good performance in RPGM and Manhattan than random waypoint mobility model. Direct diffusion has a good performance in random waypoint mobility model than in RPGM and Manhattan mobility model

  13. Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol

    Directory of Open Access Journals (Sweden)

    Xing Hu

    2017-01-01

    Full Text Available In high diversity node situation, multichannel MAC protocol can improve the frequency efficiency, owing to fewer collisions compared with single-channel MAC protocol. And the performance of cyclic quorum-based multichannel (CQM MAC protocol is outstanding. Based on cyclic quorum system and channel slot allocation, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel-hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF, is proposed. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm. In addition, to improve the performance of CQM protocol in unsaturation situation, a dynamic channel slot allocation of CQM (DCQM protocol is proposed, based on wavelet neural network. Finally, the performance of CQM protocol and DCQM protocol is simulated by Qualnet platform. And the simulation results show that the analytic and simulation results match very well; the DCQM performs better in unsaturation situation.

  14. Protocol Analysis as a Method for Analyzing Conversational Data.

    Science.gov (United States)

    Aleman, Carlos G.; Vangelisti, Anita L.

    Protocol analysis, a technique that uses people's verbal reports about their cognitions as they engage in an assigned task, has been used in a number of applications to provide insight into how people mentally plan, assess, and carry out those assignments. Using a system of networked computers where actors communicate with each other over…

  15. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  16. Neutrophil/lymphocyte ratio and platelet/lymphocyte ratio in mood disorders: A meta-analysis.

    Science.gov (United States)

    Mazza, Mario Gennaro; Lucchi, Sara; Tringali, Agnese Grazia Maria; Rossetti, Aurora; Botti, Eugenia Rossana; Clerici, Massimo

    2018-06-08

    The immune and inflammatory system is involved in the etiology of mood disorders. Neutrophil/lymphocyte ratio (NLR), platelet/lymphocyte ratio (PLR) and monocyte/lymphocyte ratio (MLR) are inexpensive and reproducible biomarkers of inflammation. This is the first meta-analysis exploring the role of NLR and PLR in mood disorder. We identified 11 studies according to our inclusion criteria from the main Electronic Databases. Meta-analyses were carried out generating pooled standardized mean differences (SMDs) between index and healthy controls (HC). Heterogeneity was estimated. Relevant sensitivity and meta-regression analyses were conducted. Subjects with bipolar disorder (BD) had higher NLR and PLR as compared with HC (respectively SMD = 0.672; p analysis evidenced an influence of bipolar phase on the overall estimate whit studies including subjects in manic and any bipolar phase showing a significantly higher NLR and PLR as compared with HC whereas the effect was not significant among studies including only euthymic bipolar subjects. Meta-regression showed that age and sex influenced the relationship between BD and NLR but not the relationship between BD and PLR. Meta-analysis was not carried out for MLR because our search identified only one study when comparing BD to HC, and only one study when comparing MDD to HC. Subjects with major depressive disorder (MDD) had higher NLR as compared with HC (SMD = 0.670; p = 0.028; I 2  = 89.931%). Heterogeneity-based sensitivity analyses and meta-regression confirmed these findings. Our meta-analysis supports the hypothesis that an inflammatory activation occurs in mood disorders and NLR and PLR may be useful to detect this activation. More researches including comparison of NLR, PLR and MLR between different bipolar phases and between BD and MDD are needed. Copyright © 2018 Elsevier Inc. All rights reserved.

  17. Analysis of security protocols based on challenge-response

    Institute of Scientific and Technical Information of China (English)

    LUO JunZhou; YANG Ming

    2007-01-01

    Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods,which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques,in which secrecy analysis is split into two parts: Explicit-Information-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand parameters. This new method owns both the power of the Strand Space Model and concision of authentication logic.

  18. Traffic Adaptive MAC Protocols in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Farhan Masud

    2017-01-01

    Full Text Available In Wireless Body Area Networks (WBANs, every healthcare application that is based on physical sensors is responsible for monitoring the vital signs data of patient. WBANs applications consist of heterogeneous and dynamic traffic loads. Routine patient’s observation is described as low-load traffic while an alarming situation that is unpredictable by nature is referred to as high-load traffic. This paper offers a thematic review of traffic adaptive Medium Access Control (MAC protocols in WBANs. First, we have categorized them based on their goals, methods, and metrics of evaluation. The Zigbee standard IEEE 802.15.4 and the baseline MAC IEEE 802.15.6 are also reviewed in terms of traffic adaptive approaches. Furthermore, a comparative analysis of the protocols is made and their performances are analyzed in terms of delay, packet delivery ratio (PDR, and energy consumption. The literature shows that no review work has been done on traffic adaptive MAC protocols in WBANs. This review work, therefore, could add enhancement to traffic adaptive MAC protocols and will stimulate a better way of solving the traffic adaptivity problem.

  19. Augmented Quadruple-Phase Contrast Media Administration and Triphasic Scan Protocol Increases Image Quality at Reduced Radiation Dose During Computed Tomography Urography.

    Science.gov (United States)

    Saade, Charbel; Mohamad, May; Kerek, Racha; Hamieh, Nadine; Alsheikh Deeb, Ibrahim; El-Achkar, Bassam; Tamim, Hani; Abdul Razzak, Farah; Haddad, Maurice; Abi-Ghanem, Alain S; El-Merhi, Fadi

    The aim of this article was to investigate the opacification of the renal vasculature and the urogenital system during computed tomography urography by using a quadruple-phase contrast media in a triphasic scan protocol. A total of 200 patients with possible urinary tract abnormalities were equally divided between 2 protocols. Protocol A used the conventional single bolus and quadruple-phase scan protocol (pre, arterial, venous, and delayed), retrospectively. Protocol B included a quadruple-phase contrast media injection with a triphasic scan protocol (pre, arterial and combined venous, and delayed), prospectively. Each protocol used 100 mL contrast and saline at a flow rate of 4.5 mL. Attenuation profiles and contrast-to-noise ratio of the renal arteries, veins, and urogenital tract were measured. Effective radiation dose calculation, data analysis by independent sample t test, receiver operating characteristic, and visual grading characteristic analyses were performed. In arterial circulation, only the inferior interlobular arteries in both protocols showed a statistical significance (P contrast-to-noise ratio than protocol A (protocol B: 22.68 ± 13.72; protocol A: 14.75 ± 5.76; P contrast media and triphasic scan protocol usage increases the image quality at a reduced radiation dose.

  20. Implementation and Analysis of Real-Time Streaming Protocols.

    Science.gov (United States)

    Santos-González, Iván; Rivero-García, Alexandra; Molina-Gil, Jezabel; Caballero-Gil, Pino

    2017-04-12

    Communication media have become the primary way of interaction thanks to the discovery and innovation of many new technologies. One of the most widely used communication systems today is video streaming, which is constantly evolving. Such communications are a good alternative to face-to-face meetings, and are therefore very useful for coping with many problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability and connectivity. Hence, the quality of service and the quality of experience are considered the two most important issues for this type of communication. This work presents a complete comparative study of two of the most used protocols of video streaming, Real Time Streaming Protocol (RTSP) and the Web Real-Time Communication (WebRTC). In addition, this paper proposes two new mobile applications that implement those protocols in Android whose objective is to know how they are influenced by the aspects that most affect the streaming quality of service, which are the connection establishment time and the stream reception time. The new video streaming applications are also compared with the most popular video streaming applications for Android, and the experimental results of the analysis show that the developed WebRTC implementation improves the performance of the most popular video streaming applications with respect to the stream packet delay.

  1. Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol

    International Nuclear Information System (INIS)

    Hirota, Osamu

    2007-01-01

    There exists a great gap between one-time pad with perfect secrecy and conventional mathematical encryption. The Yuen 2000 (Y00) protocol or αη scheme may provide a protocol which covers from the conventional security to the ultimate one, depending on implementations. This paper presents the complexity-theoretic security analysis on some models of the Y00 protocol with nonlinear pseudo-random-number-generator and quantum noise diffusion mapping (QDM). Algebraic attacks and fast correlation attacks are applied with a model of the Y00 protocol with nonlinear filtering like the Toyocrypt stream cipher as the running key generator, and it is shown that these attacks in principle do not work on such models even when the mapping between running key and quantum state signal is fixed. In addition, a security property of the Y00 protocol with QDM is clarified. Consequently, we show that the Y00 protocol has a potential which cannot be realized by conventional cryptography and that it goes beyond mathematical encryption with physical encryption

  2. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  3. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  4. Inter-comparison of NIOSH and IMPROVE protocols for OC and EC determination: implications for inter-protocol data conversion

    Science.gov (United States)

    Wu, Cheng; Huang, X. H. Hilda; Ng, Wai Man; Griffith, Stephen M.; Zhen Yu, Jian

    2016-09-01

    ) yields the following equation: M1(urban data) : ECIMP_TOR = 2.20 × ECNSH_TOT - 0.05. While both M1 and M2 are acceptable, M2 with site-specific parameters provides the best reconstruction performance. Secondary OC (SOC) estimation using OC and EC by the two protocols is compared. An analysis of the usability of reconstructed ECIMP_TOR and OCIMP_TOR suggests that the reconstructed values are not suitable for SOC estimation due to the poor reconstruction of the OC / EC ratio.

  5. The comparison of microdose flare-up and multiple dose antagonist protocols based on hCG day estradiol (E2), progesterone (P) and P/E2 ratio among poor responder patients in ICSI-ET cycles.

    Science.gov (United States)

    Cicek, M N; Kahyaoglu, I; Kahyaoglu, S

    2015-02-01

    Elevated progesterone levels surpassing exact treshold values impede endometrial receptivity and decrease clinical pregnancy rates in different responder patients during assisted reproductive techniques. A progesterone (P): estradiol (E2) ratio of > 1 on the day of hCG administration has also been suggested to be a manifestation of low ovarian reserve. The clinical significance of P/E2 ratio on the day of hCG administration was investigated among poor responder patients. Based on the ESHRE Bologna consensus criteria related to poor ovarian response diagnosis, 48 poor responder patients were treated with the microdose flare-up regimen and 34 patients were treated with the multiple-dose GnRH antagonist protocol. All patients were destined to perform a ICSI-ET procedure at the end of the stimulation protocols. Progesterone levels and P/E2 ratios have been detected during controlled ovarian hyperstimulation. In the microdose flare-up group; the duration of stimulation, total gonadotropin dose used and hCG day E2 levels were significantly higher than the multiple dose antagonist group. However, the mean hCG day P/E2 rate in the microdose flare-up group was less than that in the multiple-dose antagonist group. The clinical pregnancy rates were non significantly higher in the multiple dose antagonist protocol group than in microdose flare-up group. Impaired endometrial receptivity caused by elevated P levels results with lower pregnancy rates. Regardless of the selected stimulation protocol, poor responder patients are not prone to exhibit high P and E2 secretion. Increased P/E2 ratio of > 1 on hCG day has limited value to predict cycle outcomes in poor responder patients because of ovarian follicle depletion.

  6. A content analysis of posthumous sperm procurement protocols with considerations for developing an institutional policy.

    Science.gov (United States)

    Bahm, Sarah M; Karkazis, Katrina; Magnus, David

    2013-09-01

    To identify and analyze existing posthumous sperm procurement (PSP) protocols in order to outline central themes for institutions to consider when developing future policies. Qualitative content analysis. Large academic institutions across the United States. We performed a literature search and contacted 40 institutions to obtain nine full PSP protocols. We then performed a content analysis on these policies to identify major themes and factors to consider when developing a PSP protocol. Presence of a PSP policy. We identified six components of a thorough PSP protocol: Standard of Evidence, Terms of Eligibility, Sperm Designee, Restrictions on Use in Reproduction, Logistics, and Contraindications. We also identified two different approaches to policy structure. In the Limited Role approach, institutions have stricter consent requirements and limit their involvement to the time of procurement. In the Family-Centered approach, substituted judgment is permitted but a mandatory wait period is enforced before sperm use in reproduction. Institutions seeking to implement a PSP protocol will benefit from considering the six major building blocks of a thorough protocol and where they would like to fall on the spectrum from a Limited Role to a Family-Centered approach. Copyright © 2013 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  7. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  8. Analysis of Financial Ratio to Distinguish Indonesia Joint Venture General Insurance Company Performance using Discriminant Analysis

    Directory of Open Access Journals (Sweden)

    Subiakto Soekarno

    2012-01-01

    Full Text Available Insurance industry stands as a service business that plays a significant role in Indonesiaeconomical condition. The development of insurance industry in Indonesia, both of generalinsurance and life insurance, has increased very fast. The general insurance industry itselfdivided into two major players which are local private company and Joint Venture Company.Lately, the use of statistical techniques and financial ratios models to asses financial institutionsuch as insurance company have been used as one of the appropriate combination inpredicting the performance of an industry. This research aims to distinguish between JointVenture General Insurance Companies that have a good performance and those who are lessperforming well using Discriminant Analysis. Further, the findings led that DiscriminantAnalysis is able to distinguish Joint Venture General Insurance Companies that have a goodperformance and those who are not performing well. There are also six ratios which are RBC,Technical Reserve to Investment Ratio, Debt Ratio, Return on Equity, Loss Ratio, and ExpenseRatio that stand as the most influential ratios to distinguish the performance of joint venturegeneral insurance companies. In addition, the result suggest business people to be concernedtoward those six ratios, to increase their companies’ performance.Key words: general insurance, financial ratio, discriminant analysis

  9. Forensic analysis of explosives using isotope ratio mass spectrometry (IRMS)--part 1: instrument validation of the DELTAplusXP IRMS for bulk nitrogen isotope ratio measurements.

    Science.gov (United States)

    Benson, Sarah J; Lennard, Christopher J; Hill, David M; Maynard, Philip; Roux, Claude

    2010-01-01

    A significant amount of research has been conducted into the use of stable isotopes to assist in determining the origin of various materials. The research conducted in the forensic field shows the potential of isotope ratio mass spectrometry (IRMS) to provide a level of discrimination not achievable utilizing traditional forensic techniques. Despite the research there have been few, if any, publications addressing the validation and measurement uncertainty of the technique for forensic applications. This study, the first in a planned series, presents validation data for the measurement of bulk nitrogen isotope ratios in ammonium nitrate (AN) using the DELTA(plus)XP (Thermo Finnigan) IRMS instrument equipped with a ConFlo III interface and FlashEA 1112 elemental analyzer (EA). Appropriate laboratory standards, analytical methods and correction calculations were developed and evaluated. A validation protocol was developed in line with the guidelines provided by the National Association of Testing Authorities, Australia (NATA). Performance characteristics including: accuracy, precision/repeatability, reproducibility/ruggedness, robustness, linear range, and measurement uncertainty were evaluated for the measurement of nitrogen isotope ratios in AN. AN (99.5%) and ammonium thiocyanate (99.99+%) were determined to be the most suitable laboratory standards and were calibrated against international standards (certified reference materials). All performance characteristics were within an acceptable range when potential uncertainties, including the manufacturer's uncertainty of the technique and standards, were taken into account. The experiments described in this article could be used as a model for validation of other instruments for similar purposes. Later studies in this series will address the more general issue of demonstrating that the IRMS technique is scientifically sound and fit-for-purpose in the forensic explosives analysis field.

  10. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  11. Protocol for Microplastics Sampling on the Sea Surface and Sample Analysis

    Science.gov (United States)

    Kovač Viršek, Manca; Palatinus, Andreja; Koren, Špela; Peterlin, Monika; Horvat, Petra; Kržan, Andrej

    2016-01-01

    Microplastic pollution in the marine environment is a scientific topic that has received increasing attention over the last decade. The majority of scientific publications address microplastic pollution of the sea surface. The protocol below describes the methodology for sampling, sample preparation, separation and chemical identification of microplastic particles. A manta net fixed on an »A frame« attached to the side of the vessel was used for sampling. Microplastic particles caught in the cod end of the net were separated from samples by visual identification and use of stereomicroscopes. Particles were analyzed for their size using an image analysis program and for their chemical structure using ATR-FTIR and micro FTIR spectroscopy. The described protocol is in line with recommendations for microplastics monitoring published by the Marine Strategy Framework Directive (MSFD) Technical Subgroup on Marine Litter. This written protocol with video guide will support the work of researchers that deal with microplastics monitoring all over the world. PMID:28060297

  12. Framework for Financial Ratio Analysis of Audited Federal Financial Reports

    Science.gov (United States)

    1999-12-01

    this period were conducted on the statistical validity of the ratio method in financial analysis. McDonald and Morris conducted a study on the... franchising operations, allowing them to lower costs and share administrative support services with other agencies. [Ref. 60:sec. 402-403] The GMRA also...Press, Washington, D.C., 1955). 21. McDonald , Bill and Morris, Michael H., "The Statistical Validity of the Ratio Method in Financial Analysis: An

  13. 75 FR 74007 - Federal Aquatic Nuisance Species Research Risk Analysis Protocol

    Science.gov (United States)

    2010-11-30

    ... site, http://anstaskforce.gov/documents.php . To obtain a hard copy of the Protocol, see Document... aquatic species that are the target of this risk analysis. Language used in the NANPCA differentiates...: http://anstaskforce.gov/documents.php Write: Susan Pasko, National Oceanic and Atmospheric...

  14. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  15. Correlation dimension based nonlinear analysis of network traffics with different application protocols

    International Nuclear Information System (INIS)

    Wang Jun-Song; Yuan Jing; Li Qiang; Yuan Rui-Xi

    2011-01-01

    This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols—HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic, furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components. (general)

  16. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  17. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  18. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    Science.gov (United States)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  19. Latency correction of event-related potentials between different experimental protocols

    Science.gov (United States)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  20. Financial and Staffing Ratio Analysis: Predicting Fiscal Distress in School Districts.

    Science.gov (United States)

    Lee, Robert Alan

    1983-01-01

    From analysis of data from 579 school districts it is concluded that financial ratios have the ability to forecast fiscal distress a year in advance. Liquidity ratios and salary and fringe benefit ratios were found to be strong forecasters, while per pupil expenditure data had little predictive value. (MJL)

  1. An Improved PRoPHET Routing Protocol in Delay Tolerant Network

    Directory of Open Access Journals (Sweden)

    Seung Deok Han

    2015-01-01

    Full Text Available In delay tolerant network (DTN, an end-to-end path is not guaranteed and packets are delivered from a source node to a destination node via store-carry-forward based routing. In DTN, a source node or an intermediate node stores packets in buffer and carries them while it moves around. These packets are forwarded to other nodes based on predefined criteria and finally are delivered to a destination node via multiple hops. In this paper, we improve the dissemination speed of PRoPHET (probability routing protocol using history of encounters and transitivity protocol by employing epidemic protocol for disseminating message m, if forwarding counter and hop counter values are smaller than or equal to the threshold values. The performance of the proposed protocol was analyzed from the aspect of delivery probability, average delay, and overhead ratio. Numerical results show that the proposed protocol can improve the delivery probability, average delay, and overhead ratio of PRoPHET protocol by appropriately selecting the threshold forwarding counter and threshold hop counter values.

  2. Financial Ratio Analysis: the Development of a Dedicated Management Information System

    Directory of Open Access Journals (Sweden)

    Voicu-Dan Dragomir

    2007-01-01

    Full Text Available This paper disseminates the results of the development process for a financial analysis information system. The system has been subject to conceptual design using the Unified Modeling Language (UML and has been implemented in object-oriented manner using the Visual Basic .NET 2003 programming language. The classic financial analysis literature is focused on the chain-substitution method of computing the prior-year to current-year variation of linked financial ratios. We have applied this technique on the DuPont System of analysis concerning the Return on Equity ratio, by designing several structural UML diagrams depicting the breakdown and analysis of each financial ratio involved. The resulting computer application offers a flexible approach to the analytical tools: the user is required to introduce the raw data and the system provides both table-style and charted information on the output of computation. User-friendliness is also a key feature of this particular financial analysis application.

  3. Sensitivity Analysis of Per-Protocol Time-to-Event Treatment Efficacy in Randomized Clinical Trials

    Science.gov (United States)

    Gilbert, Peter B.; Shepherd, Bryan E.; Hudgens, Michael G.

    2013-01-01

    Summary Assessing per-protocol treatment effcacy on a time-to-event endpoint is a common objective of randomized clinical trials. The typical analysis uses the same method employed for the intention-to-treat analysis (e.g., standard survival analysis) applied to the subgroup meeting protocol adherence criteria. However, due to potential post-randomization selection bias, this analysis may mislead about treatment efficacy. Moreover, while there is extensive literature on methods for assessing causal treatment effects in compliers, these methods do not apply to a common class of trials where a) the primary objective compares survival curves, b) it is inconceivable to assign participants to be adherent and event-free before adherence is measured, and c) the exclusion restriction assumption fails to hold. HIV vaccine efficacy trials including the recent RV144 trial exemplify this class, because many primary endpoints (e.g., HIV infections) occur before adherence is measured, and nonadherent subjects who receive some of the planned immunizations may be partially protected. Therefore, we develop methods for assessing per-protocol treatment efficacy for this problem class, considering three causal estimands of interest. Because these estimands are not identifiable from the observable data, we develop nonparametric bounds and semiparametric sensitivity analysis methods that yield estimated ignorance and uncertainty intervals. The methods are applied to RV144. PMID:24187408

  4. Progressive-Ratio Schedules and Applied Behavior Analysis

    Science.gov (United States)

    Poling, Alan

    2010-01-01

    Establishing appropriate relations between the basic and applied areas of behavior analysis has been of long and persistent interest to the author. In this article, the author illustrates that there is a direct relation between how hard an organism will work for access to an object or activity, as indexed by the largest ratio completed under a…

  5. Representing the Past by Solid Modeling + Golden Ratio Analysis

    Science.gov (United States)

    Ding, Suining

    2008-01-01

    This paper describes the procedures of reconstructing ancient architecture using solid modeling with geometric analysis, especially the Golden Ratio analysis. In the past the recovery and reconstruction of ruins required bringing together fragments of evidence and vast amount of measurements from archaeological site. Although researchers and…

  6. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  7. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  8. An improved method of studying user-system interaction by combining transaction log analysis and protocol analysis

    Directory of Open Access Journals (Sweden)

    Jillian R. Griffiths

    2002-01-01

    Full Text Available The paper reports a novel approach to studying user-system interaction that captures a complete record of the searcher's actions, the system responses and synchronised talk-aloud comments from the searcher. The data is recorded unobtrusively and is available for later analysis. The approach is set in context by a discussion of transaction logging and protocol analysis and examples of the search logging in operation are presented

  9. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  10. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  11. A routine PET/CT protocol with simple calculations for assessing cardiac amyloid using 18F-Florbetapir

    Directory of Open Access Journals (Sweden)

    Dustin Ryan Osborne

    2015-05-01

    Full Text Available Introduction: Cardiac amyloidosis is a rare condition characterized by the deposition of well-structured protein fibrils, proteoglycans, and serum proteins as amyloid. Recent work has shown that it may be possible to use 18F-Florbetapir to image cardiac amyloidosis. Current methods for assessment include invasive biopsy techniques. This work enhances foundational work by Dorbala et al. by developing a routine imaging and analysis protocol using 18F-Florbetapir for cardiac amyloid assessment.Methods: Ten patients, 3 healthy controls and 7 amyloid positive patients, were imaged using 18F-Florbetapir to assess cardiac amyloid burden. Four of the patients also were imaged using 82Rb-Chloride to evaluate possible 18F-Florbetapir retention because of reduced myocardial blood flow. Quantitative methods using modeling, SUVs and SUV ratios were used to define a new streamlined clinical imaging protocol that could be used routinely and provide patient stratification.Results: Quantitative analysis of 18F-Florbetapir cardiac amyloid data were compiled from a 20 minute listmode protocol with data histogrammed into two static images at 0-5 minutes and, 10-15 min or 15-20 min. Data analysis indicated the use of SUVs or ratios of SUVs calculated from regions draw in the septal wall were adequate in identification of all healthy controls from amyloid positive patients in this small cohort. Additionally, we found that it may be possible to use this method to differentiate patients suffering from AL vs. TTR amyloid.Conclusions: This work builds on the seminal work by Dorbala et Al. by describing a short 18F-Florbetapir imaging protocol that is suitable for routine clinical use and uses a simple method for quantitative analysis of cardiac amyloid disease.

  12. Explorations in Statistics: The Analysis of Ratios and Normalized Data

    Science.gov (United States)

    Curran-Everett, Douglas

    2013-01-01

    Learning about statistics is a lot like learning about science: the learning is more meaningful if you can actively explore. This ninth installment of "Explorations in Statistics" explores the analysis of ratios and normalized--or standardized--data. As researchers, we compute a ratio--a numerator divided by a denominator--to compute a…

  13. Cost-utility analysis of an advanced pressure ulcer management protocol followed by trained wound, ostomy, and continence nurses.

    Science.gov (United States)

    Kaitani, Toshiko; Nakagami, Gojiro; Iizaka, Shinji; Fukuda, Takashi; Oe, Makoto; Igarashi, Ataru; Mori, Taketoshi; Takemura, Yukie; Mizokami, Yuko; Sugama, Junko; Sanada, Hiromi

    2015-01-01

    The high prevalence of severe pressure ulcers (PUs) is an important issue that requires to be highlighted in Japan. In a previous study, we devised an advanced PU management protocol to enable early detection of and intervention for deep tissue injury and critical colonization. This protocol was effective for preventing more severe PUs. The present study aimed to compare the cost-effectiveness of the care provided using an advanced PU management protocol, from a medical provider's perspective, implemented by trained wound, ostomy, and continence nurses (WOCNs), with that of conventional care provided by a control group of WOCNs. A Markov model was constructed for a 1-year time horizon to determine the incremental cost-effectiveness ratio of advanced PU management compared with conventional care. The number of quality-adjusted life-years gained, and the cost in Japanese yen (¥) ($US1 = ¥120; 2015) was used as the outcome. Model inputs for clinical probabilities and related costs were based on our previous clinical trial results. Univariate sensitivity analyses were performed. Furthermore, a Bayesian multivariate probability sensitivity analysis was performed using Monte Carlo simulations with advanced PU management. Two different models were created for initial cohort distribution. For both models, the expected effectiveness for the intervention group using advanced PU management techniques was high, with a low expected cost value. The sensitivity analyses suggested that the results were robust. Intervention by WOCNs using advanced PU management techniques was more effective and cost-effective than conventional care. © 2015 by the Wound Healing Society.

  14. Two-stage meta-analysis of survival data from individual participants using percentile ratios

    Science.gov (United States)

    Barrett, Jessica K; Farewell, Vern T; Siannis, Fotios; Tierney, Jayne; Higgins, Julian P T

    2012-01-01

    Methods for individual participant data meta-analysis of survival outcomes commonly focus on the hazard ratio as a measure of treatment effect. Recently, Siannis et al. (2010, Statistics in Medicine 29:3030–3045) proposed the use of percentile ratios as an alternative to hazard ratios. We describe a novel two-stage method for the meta-analysis of percentile ratios that avoids distributional assumptions at the study level. Copyright © 2012 John Wiley & Sons, Ltd. PMID:22825835

  15. Performance Analysis of a Cluster-Based MAC Protocol for Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jesús Alonso-Zárate

    2010-01-01

    Full Text Available An analytical model to evaluate the non-saturated performance of the Distributed Queuing Medium Access Control Protocol for Ad Hoc Networks (DQMANs in single-hop networks is presented in this paper. DQMAN is comprised of a spontaneous, temporary, and dynamic clustering mechanism integrated with a near-optimum distributed queuing Medium Access Control (MAC protocol. Clustering is executed in a distributed manner using a mechanism inspired by the Distributed Coordination Function (DCF of the IEEE 802.11. Once a station seizes the channel, it becomes the temporary clusterhead of a spontaneous cluster and it coordinates the peer-to-peer communications between the clustermembers. Within each cluster, a near-optimum distributed queuing MAC protocol is executed. The theoretical performance analysis of DQMAN in single-hop networks under non-saturation conditions is presented in this paper. The approach integrates the analysis of the clustering mechanism into the MAC layer model. Up to the knowledge of the authors, this approach is novel in the literature. In addition, the performance of an ad hoc network using DQMAN is compared to that obtained when using the DCF of the IEEE 802.11, as a benchmark reference.

  16. A Novel UDT-Based Transfer Speed-Up Protocol for Fog Computing

    Directory of Open Access Journals (Sweden)

    Zhijie Han

    2018-01-01

    Full Text Available Fog computing is a distributed computing model as the middle layer between the cloud data center and the IoT device/sensor. It provides computing, network, and storage devices so that cloud based services can be closer to IOT devices and sensors. Cloud computing requires a lot of bandwidth, and the bandwidth of the wireless network is limited. In contrast, the amount of bandwidth required for “fog computing” is much less. In this paper, we improved a new protocol Peer Assistant UDT-Based Data Transfer Protocol (PaUDT, applied to Iot-Cloud computing. Furthermore, we compared the efficiency of the congestion control algorithm of UDT with the Adobe’s Secure Real-Time Media Flow Protocol (RTMFP, based on UDP completely at the transport layer. At last, we built an evaluation model of UDT in RTT and bit error ratio which describes the performance. The theoretical analysis and experiment result have shown that UDT has good performance in IoT-Cloud computing.

  17. Integrating usability testing and think-aloud protocol analysis with "near-live" clinical simulations in evaluating clinical decision support.

    Science.gov (United States)

    Li, Alice C; Kannry, Joseph L; Kushniruk, Andre; Chrimes, Dillon; McGinn, Thomas G; Edonyabo, Daniel; Mann, Devin M

    2012-11-01

    Usability evaluations can improve the usability and workflow integration of clinical decision support (CDS). Traditional usability testing using scripted scenarios with think-aloud protocol analysis provide a useful but incomplete assessment of how new CDS tools interact with users and clinical workflow. "Near-live" clinical simulations are a newer usability evaluation tool that more closely mimics clinical workflow and that allows for a complementary evaluation of CDS usability as well as impact on workflow. This study employed two phases of testing a new CDS tool that embedded clinical prediction rules (an evidence-based medicine tool) into primary care workflow within a commercial electronic health record. Phase I applied usability testing involving "think-aloud" protocol analysis of 8 primary care providers encountering several scripted clinical scenarios. Phase II used "near-live" clinical simulations of 8 providers interacting with video clips of standardized trained patient actors enacting the clinical scenario. In both phases, all sessions were audiotaped and had screen-capture software activated for onscreen recordings. Transcripts were coded using qualitative analysis methods. In Phase I, the impact of the CDS on navigation and workflow were associated with the largest volume of negative comments (accounting for over 90% of user raised issues) while the overall usability and the content of the CDS were associated with the most positive comments. However, usability had a positive-to-negative comment ratio of only 0.93 reflecting mixed perceptions about the usability of the CDS. In Phase II, the duration of encounters with simulated patients was approximately 12 min with 71% of the clinical prediction rules being activated after half of the visit had already elapsed. Upon activation, providers accepted the CDS tool pathway 82% of times offered and completed all of its elements in 53% of all simulation cases. Only 12.2% of encounter time was spent using the

  18. Performance Analysis of TDMA Protocol in a Femtocell Network

    Directory of Open Access Journals (Sweden)

    Wanod Kumar

    2014-07-01

    Full Text Available In this paper, we evaluate the performance of TDMA (Time Division Multiple Access protocol using queuing theory in a femtocell network. The fair use of wireless channel among the users of network is carried out using TDMA protocol. The arrival of data packets from M communicating nodes becomes multiple Poisson process. The time slots of TDMA protocol represent c servers to communicate data packets coming from communicating nodes to the input of FAP (Femtocell Access Point. The service time of each server (time slot is exponentially distributed. This complete communication scenario using TDMA protocol is modeled using M/M/c queue. The performance of the protocol is evaluated in terms of mean number in system, average system delay and utilization for varying traffic intensity

  19. Analysis of MD5 authentication in various routing protocols using simulation tools

    Science.gov (United States)

    Dinakaran, M.; Darshan, K. N.; Patel, Harsh

    2017-11-01

    Authentication being an important paradigm of security and Computer Networks require secure paths to make the flow of the data even more secure through some security protocols. So MD-5(Message Digest 5) helps in providing data integrity to the data being sent through it and authentication to the network devices. This paper gives a brief introduction to the MD-5, simulation of the networks by including MD-5 authentication using various routing protocols like OSPF, EIGRP and RIPv2. GNS3 is being used to simulate the scenarios. Analysis of the MD-5 authentication is done in the later sections of the paper.

  20. Direct uranium isotope ratio analysis of single micrometer-sized glass particles

    International Nuclear Information System (INIS)

    Kappel, Stefanie; Boulyga, Sergei F.; Prohaska, Thomas

    2012-01-01

    We present the application of nanosecond laser ablation (LA) coupled to a ‘Nu Plasma HR’ multi collector inductively coupled plasma mass spectrometer (MC-ICP-MS) for the direct analysis of U isotope ratios in single, 10–20 μm-sized, U-doped glass particles. Method development included studies with respect to (1) external correction of the measured U isotope ratios in glass particles, (2) the applied laser ablation carrier gas (i.e. Ar versus He) and (3) the accurate determination of lower abundant 236 U/ 238 U isotope ratios (i.e. 10 −5 ). In addition, a data processing procedure was developed for evaluation of transient signals, which is of potential use for routine application of the developed method. We demonstrate that the developed method is reliable and well suited for determining U isotope ratios of individual particles. Analyses of twenty-eight S1 glass particles, measured under optimized conditions, yielded average biases of less than 0.6% from the certified values for 234 U/ 238 U and 235 U/ 238 U ratios. Experimental results obtained for 236 U/ 238 U isotope ratios deviated by less than −2.5% from the certified values. Expanded relative total combined standard uncertainties U c (k = 2) of 2.6%, 1.4% and 5.8% were calculated for 234 U/ 238 U, 235 U/ 238 U and 236 U/ 238 U, respectively. - Highlights: ► LA-MC-ICP-MS was fully validated for the direct analysis of individual particles. ► Traceability was established by using an IRMM glass particle reference material. ► Measured U isotope ratios were in agreement with the certified range. ► A comprehensive total combined uncertainty evaluation was performed. ► The analysis of 236 U/ 238 U isotope ratios was improved by using a deceleration filter.

  1. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  2. Impact of reduced-radiation dual-energy protocols using 320-detector row computed tomography for analyzing urinary calculus components: initial in vitro evaluation.

    Science.gov (United States)

    Cai, Xiangran; Zhou, Qingchun; Yu, Juan; Xian, Zhaohui; Feng, Youzhen; Yang, Wencai; Mo, Xukai

    2014-10-01

    To evaluate the impact of reduced-radiation dual-energy (DE) protocols using 320-detector row computed tomography on the differentiation of urinary calculus components. A total of 58 urinary calculi were placed into the same phantom and underwent DE scanning with 320-detector row computed tomography. Each calculus was scanned 4 times with the DE protocols using 135 kV and 80 kV tube voltage and different tube current combinations, including 100 mA and 570 mA (group A), 50 mA and 290 mA (group B), 30 mA and 170 mA (group C), and 10 mA and 60 mA (group D). The acquisition data of all 4 groups were then analyzed by stone DE analysis software, and the results were compared with x-ray diffraction analysis. Noise, contrast-to-noise ratio, and radiation dose were compared. Calculi were correctly identified in 56 of 58 stones (96.6%) using group A and B protocols. However, only 35 stones (60.3%) and 16 stones (27.6%) were correctly diagnosed using group C and D protocols, respectively. Mean noise increased significantly and mean contrast-to-noise ratio decreased significantly from groups A to D (P calculus component analysis while reducing patient radiation exposure to 1.81 mSv. Further reduction of tube currents may compromise diagnostic accuracy. Copyright © 2014 Elsevier Inc. All rights reserved.

  3. iLAP: a workflow-driven software for experimental protocol development, data acquisition and analysis

    Directory of Open Access Journals (Sweden)

    McNally James

    2009-01-01

    Full Text Available Abstract Background In recent years, the genome biology community has expended considerable effort to confront the challenges of managing heterogeneous data in a structured and organized way and developed laboratory information management systems (LIMS for both raw and processed data. On the other hand, electronic notebooks were developed to record and manage scientific data, and facilitate data-sharing. Software which enables both, management of large datasets and digital recording of laboratory procedures would serve a real need in laboratories using medium and high-throughput techniques. Results We have developed iLAP (Laboratory data management, Analysis, and Protocol development, a workflow-driven information management system specifically designed to create and manage experimental protocols, and to analyze and share laboratory data. The system combines experimental protocol development, wizard-based data acquisition, and high-throughput data analysis into a single, integrated system. We demonstrate the power and the flexibility of the platform using a microscopy case study based on a combinatorial multiple fluorescence in situ hybridization (m-FISH protocol and 3D-image reconstruction. iLAP is freely available under the open source license AGPL from http://genome.tugraz.at/iLAP/. Conclusion iLAP is a flexible and versatile information management system, which has the potential to close the gap between electronic notebooks and LIMS and can therefore be of great value for a broad scientific community.

  4. Analysis of limiting information characteristics of quantum-cryptography protocols

    International Nuclear Information System (INIS)

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-01

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  5. Allowing Students to Select Deliverables for Peer Review: Analysis of a Free-Selection Protocol

    DEFF Research Database (Denmark)

    Papadopoulos, Pantelis M.; Lagkas, Thomas; Demetriadis, Stavros

    2011-01-01

    This study analyzes the benefits and limitations of a “free-selection” peer assignment protocol by comparing them to the widely implemented “assigned-pair” protocol. The primary motivation was to circumvent the issues that often appear to the instructors implementing peer review activities with pre......-Selection, where students were able to explore and select peer work for review. Result analysis showed a very strong tendency in favor of the Free-Selection students regarding both domain specific (conceptual) and domain-general (reviewing) knowledge....

  6. A BLUEPRINT OF RATIO ANALYSIS AS INFORMATION BASIS OF CORPORATION FINANCIAL MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Maja Andrijasevic

    2014-10-01

    Full Text Available Ratio analysis, due to its simplicity, has, for a long time, been one of the most frequently used methods of financial analysis. However, the question is how its results are a good basis for assessment of financial condition of a company by the external users of financial reports. If one takes into account numerous limitations, one can rather say that ratio analysis is a rough approximation of financial situation. What are the limitations, can they be overcome and in what way, can they, at least, be reduced, and to what extent the user has to take a reserved attitude when making business decisions on the basis of ratio analysis? The last but not the least, we should accept the fact that by insisting on financial analysis other aspects of the analyses are, in practice frequently marginalized, thus neglecting the fact that actually they themselves in the most direct manner point to the causes of potential disorders in business activities of a company.

  7. Lead isotope ratio analysis of bullet samples by using quadrupole ICP-MS

    International Nuclear Information System (INIS)

    Tamura, Shu-ichi; Hokura, Akiko; Nakai, Izumi; Oishi, Masahiro

    2006-01-01

    The measurement conditions for the precise analysis of the lead stable isotope ratio by using an ICP-MS equipped with a quadrupole mass spectrometer were studied in order to apply the technique to the forensic identification of bullet samples. The values of the relative standard deviation obtained for the ratio of 208 Pb/ 206 Pb, 207 Pb/ 206 Pb and 204 Pb/ 206 Pb were lower than 0.2% after optimization of the analytical conditions, including the optimum lead concentration of the sample solution to be about 70 ppb and an integration time for 1 m/s of 15 s. This method was applied to an analysis of lead in bullets for rifles and handguns; a stable isotope ratio of lead was found to be suitable for the identification of bullets. This study has demonstrated that the lead isotope ratio measured by using a quadrupole ICP-MS was useful for a practical analysis of bullet samples in forensic science. (author)

  8. Results of Am isotopic ratio analysis in irradiated MOX fuels

    Energy Technology Data Exchange (ETDEWEB)

    Koyama, Shin-ichi; Osaka, Masahiko; Mitsugashira, Toshiaki; Konno, Koichi [Power Reactor and Nuclear Fuel Development Corp., Oarai, Ibaraki (Japan). Oarai Engineering Center; Kajitani, Mikio

    1997-04-01

    For analysis of a small quantity of americium, it is necessary to separate from curium which has similar chemical property. As a chemical separation method for americium and curium, the oxidation of americium with pentavalent bismuth and subsequent co-precipitation of trivalent curium with BIP O{sub 4} were applied to analyze americium in irradiated MOX fuels which contained about 30wt% plutonium and 0.9wt% {sup 241}Am before irradiation and were irradiated up to 26.2GWd/t in the experimental fast reactor Joyo. The purpose of this study is to measure isotopic ratio of americium and to evaluate the change of isotopic ratio with irradiation. Following results are obtained in this study. (1) The isotopic ratio of americium ({sup 241}Am, {sup 242m}Am and {sup 243}Am) can be analyzed in the MOX fuels by isolating americium. The isotopic ratio of {sup 242m}Am and {sup 243}Am increases up to 0.62at% and 0.82at% at maximum burnup, respectively, (2) The results of isotopic analysis indicates that the contents of {sup 241}Am decreases, whereas {sup 242m}Am, {sup 243}Am increase linearly with increasing burnup. (author)

  9. Performance Analysis of AODV Routing Protocol for Wireless Sensor Network based Smart Metering

    International Nuclear Information System (INIS)

    Farooq, Hasan; Jung, Low Tang

    2013-01-01

    Today no one can deny the need for Smart Grid and it is being considered as of utmost importance to upgrade outdated electric infrastructure to cope with the ever increasing electric load demand. Wireless Sensor Network (WSN) is considered a promising candidate for internetworking of smart meters with the gateway using mesh topology. This paper investigates the performance of AODV routing protocol for WSN based smart metering deployment. Three case studies are presented to analyze its performance based on four metrics of (i) Packet Delivery Ratio, (ii) Average Energy Consumption of Nodes (iii) Average End-End Delay and (iv) Normalized Routing Load.

  10. Efficiency Analysis of Financial Management Administration of ABC Hospital using Financial Ratio Analysis Method

    Directory of Open Access Journals (Sweden)

    Jonny Jonny

    2016-05-01

    Full Text Available This paper evaluated the financial performance of ABC hospital within the period of 2012 to 2013. To overcome the problems faced by the hospital related to how to measure and presented its financial performance in which financial ratio analysis was undertaken. These financial ratios were employed to measure the liquidity, assets utilization, long-term solvency and profitability of the hospital. This analysis was conducted in order to prove whether the hospital has been managed efficiently or not in accordance to Indonesian Hospital Quality Accreditation as stated in its clause on Administration Standard No. 5 Parameter No. 3 that the hospital financial management shall be conducted in appropriate way in order to guarantee its operation efficiently. The result showed that overall financial performance of ABC hospital increased considerably in those two years of the analysis. A significant change was occurred on its solvency ratio which was decreased from -2% to -8%, indicating its loose dependency due to its founder’s strong financial support. Therefore, based on this favorable result, the hospital was regarded to have efficient hospital management and thus, together with other standard fulfillment, it was accredited by Indonesian Health Ministry.

  11. Trade-off analysis of high-aspect-ratio-cooling-channels for rocket engines

    International Nuclear Information System (INIS)

    Pizzarelli, Marco; Nasuti, Francesco; Onofri, Marcello

    2013-01-01

    Highlights: • Aspect ratio has a significant effect on cooling efficiency and hydraulic losses. • Minimizing power loss is of paramount importance in liquid rocket engine cooling. • A suitable quasi-2D model is used to get fast cooling system analysis. • Trade-off with assigned weight, temperature, and channel height or wall thickness. • Aspect ratio is found that minimizes power loss in the cooling circuit. -- Abstract: High performance liquid rocket engines are often characterized by rectangular cooling channels with high aspect ratio (channel height-to-width ratio) because of their proven superior cooling efficiency with respect to a conventional design. However, the identification of the optimum aspect ratio is not a trivial task. In the present study a trade-off analysis is performed on a cooling channel system that can be of interest for rocket engines. This analysis requires multiple cooling channel flow calculations and thus cannot be efficiently performed by CFD solvers. Therefore, a proper numerical approach, referred to as quasi-2D model, is used to have fast and accurate predictions of cooling system properties. This approach relies on its capability of describing the thermal stratification that occurs in the coolant and in the wall structure, as well as the coolant warming and pressure drop along the channel length. Validation of the model is carried out by comparison with solutions obtained with a validated CFD solver. Results of the analysis show the existence of an optimum channel aspect ratio that minimizes the requested pump power needed to overcome losses in the cooling circuit

  12. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  13. A financial Ratio Analysis of Commercial Bank Performance in ...

    African Journals Online (AJOL)

    A financial Ratio Analysis of Commercial Bank Performance in South Africa. ... Journal Home > Vol 2, No 1 (2010) >. Log in or ... This paper investigates the performance of South Africa's commercial banking sector for the period 2005- 2009.

  14. Protocol: An updated integrated methodology for analysis of metabolites and enzyme activities of ethylene biosynthesis

    Directory of Open Access Journals (Sweden)

    Geeraerd Annemie H

    2011-06-01

    Full Text Available Abstract Background The foundations for ethylene research were laid many years ago by researchers such as Lizada, Yang and Hoffman. Nowadays, most of the methods developed by them are still being used. Technological developments since then have led to small but significant improvements, contributing to a more efficient workflow. Despite this, many of these improvements have never been properly documented. Results This article provides an updated, integrated set of protocols suitable for the assembly of a complete picture of ethylene biosynthesis, including the measurement of ethylene itself. The original protocols for the metabolites 1-aminocyclopropane-1-carboxylic acid and 1-(malonylaminocyclopropane-1-carboxylic acid have been updated and downscaled, while protocols to determine in vitro activities of the key enzymes 1-aminocyclopropane-1-carboxylate synthase and 1-aminocyclopropane-1-carboxylate oxidase have been optimised for efficiency, repeatability and accuracy. All the protocols described were optimised for apple fruit, but have been proven to be suitable for the analysis of tomato fruit as well. Conclusions This work collates an integrated set of detailed protocols for the measurement of components of the ethylene biosynthetic pathway, starting from well-established methods. These protocols have been optimised for smaller sample volumes, increased efficiency, repeatability and accuracy. The detailed protocol allows other scientists to rapidly implement these methods in their own laboratories in a consistent and efficient way.

  15. Tolerance analysis in manufacturing using process capability ratio with measurement uncertainty

    DEFF Research Database (Denmark)

    Mahshid, Rasoul; Mansourvar, Zahra; Hansen, Hans Nørgaard

    2017-01-01

    . In this paper, a new statistical analysis was applied to manufactured products to assess achieved tolerances when the process is known while using capability ratio and expanded uncertainty. The analysis has benefits for process planning, determining actual precision limits, process optimization, troubleshoot......Tolerance analysis provides valuable information regarding performance of manufacturing process. It allows determining the maximum possible variation of a quality feature in production. Previous researches have focused on application of tolerance analysis to the design of mechanical assemblies...... malfunctioning existing part. The capability measure is based on a number of measurements performed on part’s quality variable. Since the ratio relies on measurements, elimination of any possible error has notable negative impact on results. Therefore, measurement uncertainty was used in combination with process...

  16. Biometrics from the carbon isotope ratio analysis of amino acids in human hair.

    Science.gov (United States)

    Jackson, Glen P; An, Yan; Konstantynova, Kateryna I; Rashaid, Ayat H B

    2015-01-01

    This study compares and contrasts the ability to classify individuals into different grouping factors through either bulk isotope ratio analysis or amino-acid-specific isotope ratio analysis of human hair. Using LC-IRMS, we measured the isotope ratios of 14 amino acids in hair proteins independently, and leucine/isoleucine as a co-eluting pair, to provide 15 variables for classification. Multivariate analysis confirmed that the essential amino acids and non-essential amino acids were mostly independent variables in the classification rules, thereby enabling the separation of dietary factors of isotope intake from intrinsic or phenotypic factors of isotope fractionation. Multivariate analysis revealed at least two potential sources of non-dietary factors influencing the carbon isotope ratio values of the amino acids in human hair: body mass index (BMI) and age. These results provide evidence that compound-specific isotope ratio analysis has the potential to go beyond region-of-origin or geospatial movements of individuals-obtainable through bulk isotope measurements-to the provision of physical and characteristic traits about the individuals, such as age and BMI. Further development and refinement, for example to genetic, metabolic, disease and hormonal factors could ultimately be of great assistance in forensic and clinical casework. Copyright © 2014 Forensic Science Society. Published by Elsevier Ireland Ltd. All rights reserved.

  17. Analysis of Intracellular Metabolites from Microorganisms: Quenching and Extraction Protocols.

    Science.gov (United States)

    Pinu, Farhana R; Villas-Boas, Silas G; Aggio, Raphael

    2017-10-23

    Sample preparation is one of the most important steps in metabolome analysis. The challenges of determining microbial metabolome have been well discussed within the research community and many improvements have already been achieved in last decade. The analysis of intracellular metabolites is particularly challenging. Environmental perturbations may considerably affect microbial metabolism, which results in intracellular metabolites being rapidly degraded or metabolized by enzymatic reactions. Therefore, quenching or the complete stop of cell metabolism is a pre-requisite for accurate intracellular metabolite analysis. After quenching, metabolites need to be extracted from the intracellular compartment. The choice of the most suitable metabolite extraction method/s is another crucial step. The literature indicates that specific classes of metabolites are better extracted by different extraction protocols. In this review, we discuss the technical aspects and advancements of quenching and extraction of intracellular metabolite analysis from microbial cells.

  18. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  19. Evaluation of Extraction Protocols for Simultaneous Polar and Non-Polar Yeast Metabolite Analysis Using Multivariate Projection Methods

    Directory of Open Access Journals (Sweden)

    Nicolas P. Tambellini

    2013-07-01

    Full Text Available Metabolomic and lipidomic approaches aim to measure metabolites or lipids in the cell. Metabolite extraction is a key step in obtaining useful and reliable data for successful metabolite studies. Significant efforts have been made to identify the optimal extraction protocol for various platforms and biological systems, for both polar and non-polar metabolites. Here we report an approach utilizing chemoinformatics for systematic comparison of protocols to extract both from a single sample of the model yeast organism Saccharomyces cerevisiae. Three chloroform/methanol/water partitioning based extraction protocols found in literature were evaluated for their effectiveness at reproducibly extracting both polar and non-polar metabolites. Fatty acid methyl esters and methoxyamine/trimethylsilyl derivatized aqueous compounds were analyzed by gas chromatography mass spectrometry to evaluate non-polar or polar metabolite analysis. The comparative breadth and amount of recovered metabolites was evaluated using multivariate projection methods. This approach identified an optimal protocol consisting of 64 identified polar metabolites from 105 ion hits and 12 fatty acids recovered, and will potentially attenuate the error and variation associated with combining metabolite profiles from different samples for untargeted analysis with both polar and non-polar analytes. It also confirmed the value of using multivariate projection methods to compare established extraction protocols.

  20. System and method for high precision isotope ratio destructive analysis

    Science.gov (United States)

    Bushaw, Bruce A; Anheier, Norman C; Phillips, Jon R

    2013-07-02

    A system and process are disclosed that provide high accuracy and high precision destructive analysis measurements for isotope ratio determination of relative isotope abundance distributions in liquids, solids, and particulate samples. The invention utilizes a collinear probe beam to interrogate a laser ablated plume. This invention provides enhanced single-shot detection sensitivity approaching the femtogram range, and isotope ratios that can be determined at approximately 1% or better precision and accuracy (relative standard deviation).

  1. New method development in prehistoric stone tool research: evaluating use duration and data analysis protocols.

    Science.gov (United States)

    Evans, Adrian A; Macdonald, Danielle A; Giusca, Claudiu L; Leach, Richard K

    2014-10-01

    Lithic microwear is a research field of prehistoric stone tool (lithic) analysis that has been developed with the aim to identify how stone tools were used. It has been shown that laser scanning confocal microscopy has the potential to be a useful quantitative tool in the study of prehistoric stone tool function. In this paper, two important lines of inquiry are investigated: (1) whether the texture of worn surfaces is constant under varying durations of tool use, and (2) the development of rapid objective data analysis protocols. This study reports on the attempt to further develop these areas of study and results in a better understanding of the complexities underlying the development of flexible analytical algorithms for surface analysis. The results show that when sampling is optimised, surface texture may be linked to contact material type, independent of use duration. Further research is needed to validate this finding and test an expanded range of contact materials. The use of automated analytical protocols has shown promise but is only reliable if sampling location and scale are defined. Results suggest that the sampling protocol reports on the degree of worn surface invasiveness, complicating the ability to investigate duration related textural characterisation. Copyright © 2014. Published by Elsevier Ltd.

  2. Hepatic MR imaging for in vivo differentiation of steatosis, iron deposition and combined storage disorder: Single-ratio in/opposed phase analysis vs. dual-ratio Dixon discrimination

    International Nuclear Information System (INIS)

    Bashir, Mustafa R.; Merkle, Elmar M.; Smith, Alastair D.; Boll, Daniel T.

    2012-01-01

    Objective: To assess whether in vivo dual-ratio Dixon discrimination can improve detection of diffuse liver disease, specifically steatosis, iron deposition and combined disease over traditional single-ratio in/opposed phase analysis. Methods: Seventy-one patients with biopsy-proven (17.7 ± 17.0 days) hepatic steatosis (n = 16), iron deposition (n = 11), combined deposition (n = 3) and neither disease (n = 41) underwent MR examinations. Dual-echo in/opposed-phase MR with Dixon water/fat reconstructions were acquired. Analysis consisted of: (a) single-ratio hepatic region-of-interest (ROI)-based assessment of in/opposed ratios; (b) dual-ratio hepatic ROI assessment of in/opposed and fat/water ratios; (c) computer-aided dual-ratio assessment evaluating all hepatic voxels. Disease-specific thresholds were determined; statistical analyses assessed disease-dependent voxel ratios, based on single-ratio (a) and dual-ratio (b and c) techniques. Results: Single-ratio discrimination succeeded in identifying iron deposition (I/O Ironthreshold Fatthreshold>1.15 ) from normal parenchyma, sensitivity 70.0%; it failed to detect combined disease. Dual-ratio discrimination succeeded in identifying abnormal hepatic parenchyma (F/W Normalthreshold > 0.05), sensitivity 96.7%; logarithmic functions for iron deposition (I/O Iron d iscriminator (0.01−F/W Iron )/0.48 ) and for steatosis (I/O Fatdiscriminator > e (F/W Fat −0.01)/0.48 ) differentiated combined from isolated diseases, sensitivity 100.0%; computer-aided dual-ratio analysis was comparably sensitive but less specific, 90.2% vs. 97.6%. Conclusion: MR two-point-Dixon imaging using dual-ratio post-processing based on in/opposed and fat/water ratios improved in vivo detection of hepatic steatosis, iron deposition, and combined storage disease beyond traditional in/opposed analysis.

  3. [Professional divers: analysis of critical issues and proposal of a health protocol for work fitness].

    Science.gov (United States)

    Pedata, Paola; Corvino, Anna Rita; Napolitano, Raffaele Carmine; Garzillo, Elpidio Maria; Furfaro, Ciro; Lamberti, Monica

    2016-01-20

    From many years now, thanks to the development of modern diving techniques, there has been a rapid spread of diving activities everywhere. In fact, divers are ever more numerous both among the Armed Forces and civilians who dive for work, like fishing, biological research and archeology. The aim of the study was to propose a health protocol for work fitness of professional divers keeping in mind the peculiar work activity, existing Italian legislation that is almost out of date and the technical and scientific evolution in this occupational field. We performed an analysis of the most frequently occurring diseases among professional divers and of the clinical investigation and imaging techniques used for work fitness assessment of professional divers. From analysis of the health protocol recommended by D.M. 13 January 1979 (Ministerial Decree), that is most used by occupational health physician, several critical issues emerged. Very often the clinical investigation and imaging techniques still used are almost obsolete, ignoring the execution of simple and inexpensive investigations that are more useful for work fitness assessment. Considering the out-dated legislation concerning diving disciplines, it is necessary to draw up a common health protocol that takes into account clinical and scientific knowledge and skills acquired in this area. This protocol's aim is to propose a useful tool for occupational health physicians who work in this sector.

  4. Analysis of Intracellular Metabolites from Microorganisms: Quenching and Extraction Protocols

    Directory of Open Access Journals (Sweden)

    Farhana R. Pinu

    2017-10-01

    Full Text Available Sample preparation is one of the most important steps in metabolome analysis. The challenges of determining microbial metabolome have been well discussed within the research community and many improvements have already been achieved in last decade. The analysis of intracellular metabolites is particularly challenging. Environmental perturbations may considerably affect microbial metabolism, which results in intracellular metabolites being rapidly degraded or metabolized by enzymatic reactions. Therefore, quenching or the complete stop of cell metabolism is a pre-requisite for accurate intracellular metabolite analysis. After quenching, metabolites need to be extracted from the intracellular compartment. The choice of the most suitable metabolite extraction method/s is another crucial step. The literature indicates that specific classes of metabolites are better extracted by different extraction protocols. In this review, we discuss the technical aspects and advancements of quenching and extraction of intracellular metabolite analysis from microbial cells.

  5. Investigation of the Study Characteristics Affecting Clinical Trial Quality Using the Protocol Deviations Leading to Exclusion of Subjects From the Per Protocol Set Data in Studies for New Drug Application: A Retrospective Analysis.

    Science.gov (United States)

    Kohara, Norihito; Kaneko, Masayuki; Narukawa, Mamoru

    2018-01-01

    The concept of the risk-based approach has been introduced as an effort to secure the quality of clinical trials. In the risk-based approach, identification and evaluation of risk in advance are considered important. For recently completed clinical trials, we investigated the relationship between study characteristics and protocol deviations leading to the exclusion of subjects from Per Protocol Set (PPS) efficacy analysis. New drugs approved in Japan in the fiscal year 2014-2015 were targeted in the research. The reasons for excluding subjects from the PPS efficacy analysis were described in 102 trials out of 492 in the summary of new drug application documents, which was publicly disclosed after the drug's regulatory approval. The author extracted these reasons along with the numbers of the cases and the study characteristics of each clinical trial. Then, the direct comparison, univariate regression analysis, and multivariate regression analysis was carried out based on the exclusion rate. The study characteristics for which exclusion of subjects from the PPS efficacy analysis were frequently observed was multiregional clinical trials in study region; inhalant and external use in administration route; Anti-infective for systemic use; Respiratory system, Dermatologicals, and Nervous system in therapeutic drug under the Anatomical Therapeutic Chemical Classification. In the multivariate regression analysis, the clinical trial variables of inhalant, Respiratory system, or Dermatologicals were selected as study characteristics leading to a higher exclusion rate. The characteristics of the clinical trial that is likely to cause protocol deviations that will affect efficacy analysis were suggested. These studies should be considered for specific attention and priority observation in the trial protocol or its monitoring plan and execution, such as a clear description of inclusion/exclusion criteria in the protocol, development of training materials to site staff, and

  6. The CD4+/CD8+ Ratio in Pulmonary Tuberculosis: Systematic and Meta-Analysis Article.

    Science.gov (United States)

    Yin, Yongmei; Qin, Jie; Dai, Yaping; Zeng, Fanwei; Pei, Hao; Wang, Jun

    2015-02-01

    The ratio of CD4+/CD8+ has been used as a clinically index to evaluate patients' immunity. Numerous researchers have studied CD4+/CD8+ ratio in pulmonary tuberculosis (PTB) patients. However, the change of CD4+/CD8+ ratio remains controversial. We present a meta-analysis of 15 case-control studies to identify the change of CD4+/CD8+ ratio in PTB patients. We assessed heterogeneity of effect estimates within each group using I(2) test. Subgroup analysis was performed to explore the potential source of heterogeneity. To investigate further the potential publication bias, we visually examined the funnel plots. For robustness of results, we performed sensitivity analysis by removing studies. Data entry and analyses were carried out with RevMan 5.2 (The Nordic Cochrane Centre). Twelve peripheral blood studies were categorized into two subgroups. Eight studies presented a significant decrease of CD4+/CD8+ ratio in PTB cases compared to healthy subjects (SMD: -0.45; 95% CI -0.65--0.25; I(2) = 7%). Other four studies researched on the newly diagnosed patients presented a more seriously and significantly decrease (SMD: -2.17; 95% CI -2.61--1.74; I(2) = 37%). The pooled analysis of bronchoalveolar lavage fluid (BALF) studies showed a significant increase of CD4+/CD8+ ratio using Flow Cytometry (FCM) (SMD: 4.75; 95% CI 3.44-6.05; I(2) =0%). The present meta-analysis indicated that there was a synthetic evidence for the reduced CD4+/CD8+ ratio in peripheral blood of PTB patients, especially newly diagnosed cases. However, the CD4+/CD8+ ratio in BALF was increased using method of FCM.

  7. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  8. Analysis of 213 currently used rehabilitation protocols in foot and ankle fractures.

    Science.gov (United States)

    Pfeifer, Christian G; Grechenig, Stephan; Frankewycz, Borys; Ernstberger, Antonio; Nerlich, Michael; Krutsch, Werner

    2015-10-01

    Fractures of the ankle, hind- and midfoot are amongst the five most common fractures. Besides initial operative or non-operative treatment, rehabilitation of the patients plays a crucial role for fracture union and long term functional outcome. Limited evidence is available with regard to what a rehabilitation regimen should include and what guidelines should be in place for the initial clinical course of these patients. This study therefore investigated the current rehabilitation concepts after fractures of the ankle, hind- and midfoot. Written rehabilitation protocols provided by orthopedic and trauma surgery institutions in terms of recommendations for weight bearing, range of motion (ROM), physiotherapy and choice of orthosis were screened and analysed. All protocols for lateral ankle fractures type AO 44A1, AO 44B1 and AO 44C1, for calcaneal fractures and fractures of the metatarsal as well as other not specific were included. Descriptive analysis was carried out and statistical analysis applied where appropriate. 209 rehabilitation protocols for ankle fractures type AO 44B1 and AO 44C1, 98 for AO 44A1, 193 for metatarsal fractures, 142 for calcaneal fractures, 107 for 5(th) metatarsal base fractures and 70 for 5(th) metatarsal Jones fractures were evaluated. The mean time recommended for orthosis treatment was 6.04 (SD 0.04) weeks. While the majority of protocols showed a trend towards increased weight bearing and increased ROM over time, the best consensus was noted for weight bearing recommendations. Our study shows that there exists a huge variability in rehabilitation of fractures of the ankle-, hind- and midfoot. This may be contributed to a lack of consensus (e.g. missing publication of guidelines), individualized patient care (e.g. in fragility fractures) or lack of specialization. This study might serve as basis for prospective randomized controlled trials in order to optimize rehabilitation for these common fractures. Copyright © 2015 Elsevier Ltd

  9. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  10. Sr/Ca mass ratio determination in bones using fast neutron activation analysis

    International Nuclear Information System (INIS)

    Hult, Mikael; Fessler, Andreas

    1998-01-01

    The Sr/Ca mass ratio in human bones reveals information regarding the diet which is of interest in archaeology. By using fast neutron activation analysis this ratio can be measured in a non-destructive manner, which is important when bones are considered too precious to allow for destructive analysis. Simulations and measurements showed that the nuclear reactions 88 Sr(n, 2n) 87m Sr and 44 Ca(n, p) 44 K are highly useful for the purpose

  11. Energy Reduction Multipath Routing Protocol for MANET Using Recoil Technique

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Sahu

    2018-04-01

    Full Text Available In Mobile Ad-hoc networks (MANET, power conservation and utilization is an acute problem and has received significant attention from academics and industry in recent years. Nodes in MANET function on battery power, which is a rare and limited energy resource. Hence, its conservation and utilization should be done judiciously for the effective functioning of the network. In this paper, a novel protocol namely Energy Reduction Multipath Routing Protocol for MANET using Recoil Technique (AOMDV-ER is proposed, which conserves the energy along with optimal network lifetime, routing overhead, packet delivery ratio and throughput. It performs better than any other AODV based algorithms, as in AOMDV-ER the nodes transmit packets to their destination smartly by using a varying recoil off time technique based on their geographical location. This concept reduces the number of transmissions, which results in the improvement of network lifetime. In addition, the local level route maintenance reduces the additional routing overhead. Lastly, the prediction based link lifetime of each node is estimated which helps in reducing the packet loss in the network. This protocol has three subparts: an optimal route discovery algorithm amalgamation with the residual energy and distance mechanism; a coordinated recoiled nodes algorithm which eliminates the number of transmissions in order to reduces the data redundancy, traffic redundant, routing overhead, end to end delay and enhance the network lifetime; and a last link reckoning and route maintenance algorithm to improve the packet delivery ratio and link stability in the network. The experimental results show that the AOMDV-ER protocol save at least 16% energy consumption, 12% reduction in routing overhead, significant achievement in network lifetime and packet delivery ratio than Ad hoc on demand multipath distance vector routing protocol (AOMDV, Ad hoc on demand multipath distance vector routing protocol life

  12. TH-C-18A-08: A Management Tool for CT Dose Monitoring, Analysis, and Protocol Review

    International Nuclear Information System (INIS)

    Wang, J; Chan, F; Newman, B; Larson, D; Leung, A; Fleischmann, D; Molvin, L; Marsh, D; Zorich, C; Phillips, L

    2014-01-01

    Purpose: To develop a customizable tool for enterprise-wide managing of CT protocols and analyzing radiation dose information of CT exams for a variety of quality control applications Methods: All clinical CT protocols implemented on the 11 CT scanners at our institution were extracted in digital format. The original protocols had been preset by our CT management team. A commercial CT dose tracking software (DoseWatch,GE healthcare,WI) was used to collect exam information (exam date, patient age etc.), scanning parameters, and radiation doses for all CT exams. We developed a Matlab-based program (MathWorks,MA) with graphic user interface which allows to analyze the scanning protocols with the actual dose estimates, and compare the data to national (ACR,AAPM) and internal reference values for CT quality control. Results: The CT protocol review portion of our tool allows the user to look up the scanning and image reconstruction parameters of any protocol on any of the installed CT systems among about 120 protocols per scanner. In the dose analysis tool, dose information of all CT exams (from 05/2013 to 02/2014) was stratified on a protocol level, and within a protocol down to series level, i.e. each individual exposure event. This allows numerical and graphical review of dose information of any combination of scanner models, protocols and series. The key functions of the tool include: statistics of CTDI, DLP and SSDE, dose monitoring using user-set CTDI/DLP/SSDE thresholds, look-up of any CT exam dose data, and CT protocol review. Conclusion: our inhouse CT management tool provides radiologists, technologists and administration a first-hand near real-time enterprise-wide knowledge on CT dose levels of different exam types. Medical physicists use this tool to manage CT protocols, compare and optimize dose levels across different scanner models. It provides technologists feedback on CT scanning operation, and knowledge on important dose baselines and thresholds

  13. White Matter Fiber-based Analysis of T1w/T2w Ratio Map.

    Science.gov (United States)

    Chen, Haiwei; Budin, Francois; Noel, Jean; Prieto, Juan Carlos; Gilmore, John; Rasmussen, Jerod; Wadhwa, Pathik D; Entringer, Sonja; Buss, Claudia; Styner, Martin

    2017-02-01

    To develop, test, evaluate and apply a novel tool for the white matter fiber-based analysis of T1w/T2w ratio maps quantifying myelin content. The cerebral white matter in the human brain develops from a mostly non-myelinated state to a nearly fully mature white matter myelination within the first few years of life. High resolution T1w/T2w ratio maps are believed to be effective in quantitatively estimating myelin content on a voxel-wise basis. We propose the use of a fiber-tract-based analysis of such T1w/T2w ratio data, as it allows us to separate fiber bundles that a common regional analysis imprecisely groups together, and to associate effects to specific tracts rather than large, broad regions. We developed an intuitive, open source tool to facilitate such fiber-based studies of T1w/T2w ratio maps. Via its Graphical User Interface (GUI) the tool is accessible to non-technical users. The framework uses calibrated T1w/T2w ratio maps and a prior fiber atlas as an input to generate profiles of T1w/T2w values. The resulting fiber profiles are used in a statistical analysis that performs along-tract functional statistical analysis. We applied this approach to a preliminary study of early brain development in neonates. We developed an open-source tool for the fiber based analysis of T1w/T2w ratio maps and tested it in a study of brain development.

  14. White matter fiber-based analysis of T1w/T2w ratio map

    Science.gov (United States)

    Chen, Haiwei; Budin, Francois; Noel, Jean; Prieto, Juan Carlos; Gilmore, John; Rasmussen, Jerod; Wadhwa, Pathik D.; Entringer, Sonja; Buss, Claudia; Styner, Martin

    2017-02-01

    Purpose: To develop, test, evaluate and apply a novel tool for the white matter fiber-based analysis of T1w/T2w ratio maps quantifying myelin content. Background: The cerebral white matter in the human brain develops from a mostly non-myelinated state to a nearly fully mature white matter myelination within the first few years of life. High resolution T1w/T2w ratio maps are believed to be effective in quantitatively estimating myelin content on a voxel-wise basis. We propose the use of a fiber-tract-based analysis of such T1w/T2w ratio data, as it allows us to separate fiber bundles that a common regional analysis imprecisely groups together, and to associate effects to specific tracts rather than large, broad regions. Methods: We developed an intuitive, open source tool to facilitate such fiber-based studies of T1w/T2w ratio maps. Via its Graphical User Interface (GUI) the tool is accessible to non-technical users. The framework uses calibrated T1w/T2w ratio maps and a prior fiber atlas as an input to generate profiles of T1w/T2w values. The resulting fiber profiles are used in a statistical analysis that performs along-tract functional statistical analysis. We applied this approach to a preliminary study of early brain development in neonates. Results: We developed an open-source tool for the fiber based analysis of T1w/T2w ratio maps and tested it in a study of brain development.

  15. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature...... of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a process algebra model and deriving from this process models analysable by the Imperial PEPA Compiler and the LySatool....

  16. Modelling and analysis of distributed simulation protocols with distributed graph transformation

    OpenAIRE

    Lara, Juan de; Taentzer, Gabriele

    2005-01-01

    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. J. de Lara, and G. Taentzer, "Modelling and analysis of distributed simulation protocols with distributed graph transformation...

  17. Performance analysis of simultaneous dense coding protocol under decoherence

    Science.gov (United States)

    Huang, Zhiming; Zhang, Cai; Situ, Haozhen

    2017-09-01

    The simultaneous dense coding (SDC) protocol is useful in designing quantum protocols. We analyze the performance of the SDC protocol under the influence of noisy quantum channels. Six kinds of paradigmatic Markovian noise along with one kind of non-Markovian noise are considered. The joint success probability of both receivers and the success probabilities of one receiver are calculated for three different locking operators. Some interesting properties have been found, such as invariance and symmetry. Among the three locking operators we consider, the SWAP gate is most resistant to noise and results in the same success probabilities for both receivers.

  18. A critical analysis of a locally agreed protocol for clinical practice

    International Nuclear Information System (INIS)

    Owen, A.; Hogg, P.; Nightingale, J.

    2004-01-01

    Within the traditional scope of radiographic practice (including advanced practice) there is a need to demonstrate effective patient care and management. Such practice should be set within a context of appropriate evidence and should also reflect peer practice. In order to achieve such practice the use of protocols is encouraged. Effective protocols can maximise care and management by minimising inter- and intra-professional variation; they can also allow for detailed procedural records to be kept in case of legal claims. However, whilst literature exists to encourage the use of protocols there is little published material available to indicate how to create, manage and archive them. This article uses an analytical approach to propose a suitable method for protocol creation and archival, it also offers suggestions on the scope and content of a protocol. To achieve this an existing clinical protocol for radiographer reporting barium enemas is analysed to draw out the general issues. Proposals for protocol creation, management, and archival were identified. The clinical practice described or inferred in the protocol should be drawn from evidence, such evidence could include peer-reviewed material, national standards and peer practice. The protocol should include an explanation of how to proceed when the radiographers reach the limit of their ability. It should refer to the initial training required to undertake the clinical duties as well as the on-going continual professional updating required to maintain competence. Audit of practice should be indicated, including the preferred audit methodology, and associated with this should be a clear statement about standards and what to do if standards are not adequately met. Protocols should be archived, in a paper-based form, for lengthy periods in case of legal claims. On the archived protocol the date it was in clinical use should be included

  19. Comparison of gas chromatography/isotope ratio mass spectrometry and liquid chromatography/isotope ratio mass spectrometry for carbon stable-isotope analysis of carbohydrates

    NARCIS (Netherlands)

    Moerdijk-Poortvliet, Tanja C. W.; Schierbeek, Henk; Houtekamer, Marco; van Engeland, Tom; Derrien, Delphine; Stal, Lucas J.; Boschker, Henricus T. S.

    2015-01-01

    We compared gas chromatography/isotope ratio mass spectrometry (GC/IRMS) and liquid chromatography/isotope ratio mass spectrometry (LC/IRMS) for the measurement of δ(13)C values in carbohydrates. Contrary to GC/IRMS, no derivatisation is needed for LC/IRMS analysis of carbohydrates. Hence, although

  20. Comparison of gas chromatography/isotope ratio mass spectrometry and liquid chromatography/isotope ratio mass spectrometry for carbon stable-isotope analysis of carbohydrates

    NARCIS (Netherlands)

    Moerdijk-Poortvliet, T.C.W.; Schierbeek, H.; Houtekamer, M.; van Engeland, T.; Derrien, D.; Stal, L.J.; Boschker, H.T.S.

    2015-01-01

    We compared gas chromatography/isotope ratio mass spectrometry (GC/IRMS) and liquid chromatography/isotope ratio mass spectrometry (LC/IRMS) for the measurement of d13C values in carbohydrates. Contrary to GC/IRMS, no derivatisation is needed for LC/IRMS analysis of carbohydrates. Hence, although

  1. Comparison of gas chromatography/isotope ratio mass spectrometry and liquid chromatography/isotope ratio mass spectrometry for carbon stable-isotope analysis of carbohydrates

    NARCIS (Netherlands)

    Moerdijk-Poortvliet, T.C.W.; Schierbeek, H.; Houtekamer, M.; van Engeland, T.; Derrien, D.; Stal, L.J.; Boschker, H.T.S.

    2015-01-01

    Rationale: We compared gas chromatography/isotope ratio mass spectrometry (GC/IRMS) and liquid chromatography/isotope ratio mass spectrometry (LC/IRMS) for the measurement of δ13C values in carbohydrates. Contrary to GC/IRMS, no derivatisation is needed for LC/IRMS analysis of carbohydrates. Hence,

  2. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2013-12-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  3. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal; Ismail, Amr; Alouini, Mohamed-Slim; Aï ssa, Sonia

    2013-01-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  4. Organ donation in the ICU: A document analysis of institutional policies, protocols, and order sets.

    Science.gov (United States)

    Oczkowski, Simon J W; Centofanti, John E; Durepos, Pamela; Arseneau, Erika; Kelecevic, Julija; Cook, Deborah J; Meade, Maureen O

    2018-04-01

    To better understand how local policies influence organ donation rates. We conducted a document analysis of our ICU organ donation policies, protocols and order sets. We used a systematic search of our institution's policy library to identify documents related to organ donation. We used Mindnode software to create a publication timeline, basic statistics to describe document characteristics, and qualitative content analysis to extract document themes. Documents were retrieved from Hamilton Health Sciences, an academic hospital system with a high volume of organ donation, from database inception to October 2015. We retrieved 12 active organ donation documents, including six protocols, two policies, two order sets, and two unclassified documents, a majority (75%) after the introduction of donation after circulatory death in 2006. Four major themes emerged: organ donation process, quality of care, patient and family-centred care, and the role of the institution. These themes indicate areas where documented institutional standards may be beneficial. Further research is necessary to determine the relationship of local policies, protocols, and order sets to actual organ donation practices, and to identify barriers and facilitators to improving donation rates. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Prognostic value of the neutrophil to lymphocyte ratio in lung cancer: A meta-analysis.

    Science.gov (United States)

    Yin, Yongmei; Wang, Jun; Wang, Xuedong; Gu, Lan; Pei, Hao; Kuai, Shougang; Zhang, Yingying; Shang, Zhongbo

    2015-07-01

    Recently, a series of studies explored the correlation between the neutrophil to lymphocyte ratio and the prognosis of lung cancer. However, the current opinion regarding the prognostic role of the neutrophil to lymphocyte ratio in lung cancer is inconsistent. We performed a meta-analysis of published articles to investigate the prognostic value of the neutrophil to lymphocyte ratio in lung cancer. The hazard ratio (HR) and its 95% confidence interval (CI) were calculated. An elevated neutrophil to lymphocyte ratio predicted worse overall survival, with a pooled HR of 1.243 (95%CI: 1.106-1.397; P(heterogeneity)=0.001) from multivariate studies and 1.867 (95%CI: 1.487-2.344; P(heterogeneity)=0.047) from univariate studies. Subgroup analysis showed that a high neutrophil to lymphocyte ratio yielded worse overall survival in non-small cell lung cancer (NSCLC) (HR=1.192, 95%CI: 1.061-1.399; P(heterogeneity)=0.003) as well as small cell lung cancer (SCLC) (HR=1.550, 95% CI: 1.156-2.077; P(heterogeneity)=0.625) in multivariate studies. The synthesized evidence from this meta-analysis of published articles demonstrated that an elevated neutrophil to lymphocyte ratio was a predictor of poor overall survival in patients with lung cancer.

  6. Design and analysis of communication protocols for quantum repeater networks

    International Nuclear Information System (INIS)

    Jones, Cody; Kim, Danny; Rakher, Matthew T; Ladd, Thaddeus D; Kwiat, Paul G

    2016-01-01

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on entanglement-distribution rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol (‘MidpointSource’) delivers the highest entanglement-distribution rate for typical cases where there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network. (paper)

  7. Performance Analysis of Secure and Private Billing Protocols for Smart Metering

    Directory of Open Access Journals (Sweden)

    Tom Eccles

    2017-11-01

    Full Text Available Traditional utility metering is to be replaced by smart metering. Smart metering enables fine-grained utility consumption measurements. These fine-grained measurements raise privacy concerns due to the lifestyle information which can be inferred from the precise time at which utilities were consumed. This paper outlines and compares two privacy-respecting time of use billing protocols for smart metering and investigates their performance on a variety of hardware. These protocols protect the privacy of customers by never transmitting the fine-grained utility readings outside of the customer’s home network. One protocol favors complexity on the trusted smart meter hardware while the other uses homomorphic commitments to offload computation to a third device. Both protocols are designed to operate on top of existing cryptographic secure channel protocols in place on smart meters. Proof of concept software implementations of these protocols have been written and their suitability for real world application to low-performance smart meter hardware is discussed. These protocols may also have application to other privacy conscious aggregation systems, such as electronic voting.

  8. FULLPROF as a new tool for flipping ratio analysis: further improvements

    International Nuclear Information System (INIS)

    Frontera, C.; Rodriguez-Carvajal, J.

    2004-01-01

    In the international workshop on polarized neutron for condensed matter investigation (Juelich, September 2002), we presented the implementations done in FULLPROF in order to introduce the ability of performing flipping ratio analysis. During this year we have modified the program in order to extend the initial features. We have tested these new implementations by re-analyzing flipping ratio data on Metrz-Nit (C 10 H 16 N 5 O 2 ) compound

  9. Analysis of agreement between cardiac risk stratification protocols applied to participants of a center for cardiac rehabilitation

    Directory of Open Access Journals (Sweden)

    Ana A. S. Santos

    2016-01-01

    Full Text Available ABSTRACT Background Cardiac risk stratification is related to the risk of the occurrence of events induced by exercise. Despite the existence of several protocols to calculate risk stratification, studies indicating that there is similarity between these protocols are still unknown. Objective To evaluate the agreement between the existing protocols on cardiac risk rating in cardiac patients. Method The records of 50 patients from a cardiac rehabilitation program were analyzed, from which the following information was extracted: age, sex, weight, height, clinical diagnosis, medical history, risk factors, associated diseases, and the results from the most recent laboratory and complementary tests performed. This information was used for risk stratification of the patients in the protocols of the American College of Sports Medicine, the Brazilian Society of Cardiology, the American Heart Association, the protocol designed by Frederic J. Pashkow, the American Association of Cardiovascular and Pulmonary Rehabilitation, the Société Française de Cardiologie, and the Sociedad Española de Cardiología. Descriptive statistics were used to characterize the sample and the analysis of agreement between the protocols was calculated using the Kappa coefficient. Differences were considered with a significance level of 5%. Results Of the 21 analyses of agreement, 12 were considered significant between the protocols used for risk classification, with nine classified as moderate and three as low. No agreements were classified as excellent. Different proportions were observed in each risk category, with significant differences between the protocols for all risk categories. Conclusion The agreements between the protocols were considered low and moderate and the risk proportions differed between protocols.

  10. Energy Consumption Research of Mobile Data Collection Protocol for Underwater Nodes Using an USV

    Directory of Open Access Journals (Sweden)

    Zhichao Lv

    2018-04-01

    Full Text Available The Unmanned Surface Vehicle (USV integrated with an acoustic modem is a novel mobile vehicle for data collection, which has an advantage in terms of mobility, efficiency, and collection cost. In the scenario of data collection, the USV is controlled autonomously along the planning trajectory and the data of underwater nodes are dynamically collected. In order to improve the efficiency of data collection and extend the life of the underwater nodes, a mobile data collection protocol for underwater nodes using the USV was proposed. In the protocol, the stop-and-wait ARQ transmission mechanism is adopted, where the duty cycle is designed considering the ratio between the sleep mode and the detection mode, and the transmission ratio is defined by the duty cycle, wake-up signal cycles, and USV’s speed. According to protocol, the evaluation index for energy consumption is constructed based on the duty cycle and the transmission ratio. The energy consumption of the protocol is simulated and analyzed using the mobile communication experiment data of USV, taking into consideration USV’s speed, data sequence length, and duty cycle. Optimized protocol parameters are identified, which in turn denotes the proposed protocol’s feasibility and effectiveness.

  11. Comparative Analysis of Different Protocols to Manage Large Scale Networks

    OpenAIRE

    Anil Rao Pimplapure; Dr Jayant Dubey; Prashant Sen

    2013-01-01

    In recent year the numbers, complexity and size is increased in Large Scale Network. The best example of Large Scale Network is Internet, and recently once are Data-centers in Cloud Environment. In this process, involvement of several management tasks such as traffic monitoring, security and performance optimization is big task for Network Administrator. This research reports study the different protocols i.e. conventional protocols like Simple Network Management Protocol and newly Gossip bas...

  12. Nonlinear Finite Element Analysis of Shells with Large Aspect Ratio

    Science.gov (United States)

    Chang, T. Y.; Sawamiphakdi, K.

    1984-01-01

    A higher order degenerated shell element with nine nodes was selected for large deformation and post-buckling analysis of thick or thin shells. Elastic-plastic material properties are also included. The post-buckling analysis algorithm is given. Using a square plate, it was demonstrated that the none-node element does not have shear locking effect even if its aspect ratio was increased to the order 10 to the 8th power. Two sample problems are given to illustrate the analysis capability of the shell element.

  13. Performance analysis of signaling protocols on OBS switches

    Science.gov (United States)

    Kirci, Pinar; Zaim, A. Halim

    2005-10-01

    In this paper, Just-In-Time (JIT), Just-Enough-Time (JET) and Horizon signalling schemes for Optical Burst Switched Networks (OBS) are presented. These signaling schemes run over a core dWDM network and a network architecture based on Optical Burst Switches (OBS) is proposed to support IP, ATM and Burst traffic. In IP and ATM traffic several packets are assembled in a single packet called burst and the burst contention is handled by burst dropping. The burst length distribution in IP traffic is arbitrary between 0 and 1, and is fixed in ATM traffic at 0,5. Burst traffic on the other hand is arbitrary between 1 and 5. The Setup and Setup ack length distributions are arbitrary. We apply the Poisson model with rate λ and Self-Similar model with pareto distribution rate α to identify inter-arrival times in these protocols. We consider a communication between a source client node and a destination client node over an ingress and one or more multiple intermediate switches.We use buffering only in the ingress node. The communication is based on single burst connections in which, the connection is set up just before sending a burst and then closed as soon as the burst is sent. Our analysis accounts for several important parameters, including the burst setup, burst setup ack, keepalive messages and the optical switching protocol. We compare the performance of the three signalling schemes on the network under as burst dropping probability under a range of network scenarios.

  14. Cardiothoracic ratio for prediction of left ventricular dilation: a systematic review and pooled analysis.

    Science.gov (United States)

    Loomba, Rohit S; Shah, Parinda H; Nijhawan, Karan; Aggarwal, Saurabh; Arora, Rohit

    2015-03-01

    Increased cardiothoracic ratio noted on chest radiographs often prompts concern and further evaluation with additional imaging. This study pools available data assessing the utility of cardiothoracic ratio in predicting left ventricular dilation. A systematic review of the literature was conducted to identify studies comparing cardiothoracic ratio by chest x-ray to left ventricular dilation by echocardiography. Electronic databases were used to identify studies which were then assessed for quality and bias, with those with adequate quality and minimal bias ultimately being included in the pooled analysis. The pooled data were used to determine the sensitivity, specificity, positive predictive value and negative predictive value of cardiomegaly in predicting left ventricular dilation. A total of six studies consisting of 466 patients were included in this analysis. Cardiothoracic ratio had 83.3% sensitivity, 45.4% specificity, 43.5% positive predictive value and 82.7% negative predictive value. When a secondary analysis was conducted with a pediatric study excluded, a total of five studies consisting of 371 patients were included. Cardiothoracic ratio had 86.2% sensitivity, 25.2% specificity, 42.5% positive predictive value and 74.0% negative predictive value. Cardiothoracic ratio as determined by chest radiograph is sensitive but not specific for identifying left ventricular dilation. Cardiothoracic ratio also has a strong negative predictive value for identifying left ventricular dilation.

  15. Performance evaluation of tile-based Fisher Ratio analysis using a benchmark yeast metabolome dataset.

    Science.gov (United States)

    Watson, Nathanial E; Parsons, Brendon A; Synovec, Robert E

    2016-08-12

    Performance of tile-based Fisher Ratio (F-ratio) data analysis, recently developed for discovery-based studies using comprehensive two-dimensional gas chromatography coupled with time-of-flight mass spectrometry (GC×GC-TOFMS), is evaluated with a metabolomics dataset that had been previously analyzed in great detail, but while taking a brute force approach. The previously analyzed data (referred to herein as the benchmark dataset) were intracellular extracts from Saccharomyces cerevisiae (yeast), either metabolizing glucose (repressed) or ethanol (derepressed), which define the two classes in the discovery-based analysis to find metabolites that are statistically different in concentration between the two classes. Beneficially, this previously analyzed dataset provides a concrete means to validate the tile-based F-ratio software. Herein, we demonstrate and validate the significant benefits of applying tile-based F-ratio analysis. The yeast metabolomics data are analyzed more rapidly in about one week versus one year for the prior studies with this dataset. Furthermore, a null distribution analysis is implemented to statistically determine an adequate F-ratio threshold, whereby the variables with F-ratio values below the threshold can be ignored as not class distinguishing, which provides the analyst with confidence when analyzing the hit table. Forty-six of the fifty-four benchmarked changing metabolites were discovered by the new methodology while consistently excluding all but one of the benchmarked nineteen false positive metabolites previously identified. Copyright © 2016 Elsevier B.V. All rights reserved.

  16. Prognostic roles of neutrophil to lymphocyte ratio and platelet to lymphocyte ratio in ovarian cancer: a meta-analysis of retrospective studies.

    Science.gov (United States)

    Zhao, Zhe; Zhao, Xinrui; Lu, Jingjing; Xue, Jing; Liu, Peishu; Mao, Hongluan

    2018-04-01

    The systemic inflammatory response markers have been reported to be associated with the prognosis of various cancers. We conducted this meta-analysis of retrospective studies to evaluate and identify the prognostic impact of neutrophil to lymphocyte ratio (NLR) and platelet to lymphocyte ratio (PLR) on ovarian cancer. PubMed, EMBASE, and China National Knowledge Infrastructure databases were included to search for eligible studies. The following terms were used: "neutrophil to lymphocyte ratio", "NLR", "platelet to lymphocyte ratio", "PLR", "ovarian cancer", "ovary cancer", "ovarian carcinoma", "ovary carcinoma", "ovarian neoplasm", "ovary neoplasm", "ovarian tumor", and "ovary tumor". The random-effects model was chosen to estimate the pooled HR with 95% CI. Heterogeneity between studies was assessed by Higgins I 2 value. The stability and heterogeneity of studies were analyzed by sensitivity analysis. Publication bias was examined by Egger's test and Begg's test with the funnel plots. 13 studies consisting of 3467 patients were considered for meta-analysis. We found that the high NLR had a poor prognostic impact on OS and PFS in ovarian cancer, with a pooled HR 1.70, 95% CI 1.35-2.15 and HR 1.77, 95% CI 1.48-2.12, respectively. Similarly, the results showed the high PLR adversely affected OS and PFS in ovarian cancer, with a pooled HR 2.05, 95% CI 1.70-2.48 and HR 1.85, 95% CI 1.53-2.25, respectively. In conclusion, we found that both NLR and PLR had an unfavorable impact on PFS and OS of patients with ovarian cancer. Our meta-analysis supported that NLR/PLR could be effective prognostic predictors of ovarian cancer.

  17. A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios.

    Science.gov (United States)

    Ai, Zheng-Yang; Zhou, Yu-Tong; Song, Fei

    2018-06-13

    It is knotty for current routing protocols to meet the needs of reliable data diffusion during the Internet of Things (IoT) deployments. Due to the random placement, limited resources and unattended features of existing sensor nodes, the wireless transmissions are easily exposed to unauthorized users, which becomes a vulnerable area for various malicious attacks, such as wormhole and Sybil attacks. However, the scheme based on geographic location is a suitable candidate to defend against them. This paper is inspired to propose a smart collaborative routing protocol, Geographic energy aware routing and Inspecting Node (GIN), for guaranteeing the reliability of data exchanging. The proposed protocol integrates the directed diffusion routing, Greedy Perimeter Stateless Routing (GPSR), and the inspecting node mechanism. We first discuss current wireless routing protocols from three diverse perspectives (improving transmission rate, shortening transmission range and reducing transmission consumption). Then, the details of GIN, including the model establishment and implementation processes, are presented by means of the theoretical analysis. Through leveraging the game theory, the inspecting node is elected to monitor the network behaviors. Thirdly, we evaluate the network performances, in terms of transmission delay, packet loss ratio, and throughput, between GIN and three traditional schemes (i.e., Flooding, GPSR, and GEAR). The simulation results illustrate that the proposed protocol is able to outperform the others.

  18. Validation of a novel protocol for calculating estimated energy requirements and average daily physical activity ratio for the US population: 2005-2006.

    Science.gov (United States)

    Archer, Edward; Hand, Gregory A; Hébert, James R; Lau, Erica Y; Wang, Xuewen; Shook, Robin P; Fayad, Raja; Lavie, Carl J; Blair, Steven N

    2013-12-01

    To validate the PAR protocol, a novel method for calculating population-level estimated energy requirements (EERs) and average physical activity ratio (APAR), in a nationally representative sample of US adults. Estimates of EER and APAR values were calculated via a factorial equation from a nationally representative sample of 2597 adults aged 20 and 74 years (US National Health and Nutrition Examination Survey; data collected between January 1, 2005, and December 31, 2006). Validation of the PAR protocol-derived EER (EER(PAR)) values was performed via comparison with values from the Institute of Medicine EER equations (EER(IOM)). The correlation between EER(PAR) and EER(IOM) was high (0.98; Pmen to 148 kcal/d (5.7% higher) in obese women. The 2005-2006 EERs for the US population were 2940 kcal/d for men and 2275 kcal/d for women and ranged from 3230 kcal/d in obese (BMI ≥30) men to 2026 kcal/d in normal weight (BMI women. There were significant inverse relationships between APAR and both obesity and age. For men and women, the APAR values were 1.53 and 1.52, respectively. Obese men and women had lower APAR values than normal weight individuals (P¼.023 and P¼.015, respectively) [corrected], and younger individuals had higher APAR values than older individuals (Pphysical activity and health. Copyright © 2013 Mayo Foundation for Medical Education and Research. Published by Elsevier Inc. All rights reserved.

  19. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  20. Optimization of oligonucleotide arrays and RNA amplification protocols for analysis of transcript structure and alternative splicing.

    Science.gov (United States)

    Castle, John; Garrett-Engele, Phil; Armour, Christopher D; Duenwald, Sven J; Loerch, Patrick M; Meyer, Michael R; Schadt, Eric E; Stoughton, Roland; Parrish, Mark L; Shoemaker, Daniel D; Johnson, Jason M

    2003-01-01

    Microarrays offer a high-resolution means for monitoring pre-mRNA splicing on a genomic scale. We have developed a novel, unbiased amplification protocol that permits labeling of entire transcripts. Also, hybridization conditions, probe characteristics, and analysis algorithms were optimized for detection of exons, exon-intron edges, and exon junctions. These optimized protocols can be used to detect small variations and isoform mixtures, map the tissue specificity of known human alternative isoforms, and provide a robust, scalable platform for high-throughput discovery of alternative splicing.

  1. Prognostic value of neutrophil-to-lymphocyte ratio and platelet-to-lymphocyte ratio in acute pulmonary embolism: a systematic review and meta-analysis.

    Science.gov (United States)

    Wang, Qian; Ma, Junfen; Jiang, Zhiyun; Ming, Liang

    2018-02-01

    Neutrophil-to-lymphocyte ratio (NLR) and platelet-to-lymphocyte ratio (PLR) have been reported to predict prognosis of acute pulmonary embolism (PE). However, the prognostic value of NLR and PLR remained inconsistent between studies. The aim of this meta-analysis was to assess the prognostic role of NLR and PLR in acute PE. We systematically searched Pubmed, Embase, Web of Science and CNKI for relative literature up to March 2017. The pooled statistics for all outcomes were expressed as odds ratio (OR) and 95% confidence intervals (95% CI). The statistical analyses were performed using Review Manager 5.3.5 analysis software and Stata software. Totally 7 eligible studies consisting of 2323 patients were enrolled in our meta-analysis. Elevated NLR was significantly associated with overall (short-term and long-term) mortality (OR 10.13, 95% CI 6.57-15.64, Panalysis revealed that NLR and PLR are promising biomarkers in predicting prognosis in acute PE patients. We suggest NLR and PLR be used routinely in the PE prognostic assessment.

  2. Sex ratio and time to pregnancy: analysis of four large European population surveys

    DEFF Research Database (Denmark)

    Joffe, Mike; Bennett, James; Best, Nicky

    2007-01-01

    To test whether the secondary sex ratio (proportion of male births) is associated with time to pregnancy, a marker of fertility. Design Analysis of four large population surveys. Setting Denmark and the United Kingdom. Participants 49 506 pregnancies.......To test whether the secondary sex ratio (proportion of male births) is associated with time to pregnancy, a marker of fertility. Design Analysis of four large population surveys. Setting Denmark and the United Kingdom. Participants 49 506 pregnancies....

  3. Analysis of root surface properties by fluorescence/Raman intensity ratio.

    Science.gov (United States)

    Nakamura, Shino; Ando, Masahiro; Hamaguchi, Hiro-O; Yamamoto, Matsuo

    2017-11-01

    The aim of this study is to evaluate the existence of residual calculus on root surfaces by determining the fluorescence/Raman intensity ratio. Thirty-two extracted human teeth, partially covered with calculus on the root surface, were evaluated by using a portable Raman spectrophotometer, and a 785-nm, 100-mW laser was applied for fluorescence/Raman excitation. The collected spectra were normalized to the hydroxyapatite Raman band intensity at 960 cm -1 . Raman spectra were recorded from the same point after changing the focal distance of the laser and the target radiating angle. In seven teeth, the condition of calculus, cementum, and dentin were evaluated. In 25 teeth, we determined the fluorescence/Raman intensity ratio following three strokes of debridement. Raman spectra collected from the dentin, cementum, and calculus were different. After normalization, spectra values were constant. The fluorescence/Raman intensity ratio of calculus region showed significant differences compared to the cementum and dentin (p Raman intensity ratio decreased with calculus debridement. For this analysis, the delta value was defined as the difference between the values before and after three strokes, with the final 2 delta values close to zero, indicating a gradual asymptotic curve and the change in intensity ratio approximating that of individual constants. Fluorescence/Raman intensity ratio was effectively used to cancel the angle- and distance-dependent fluctuations of fluorescence collection efficiency during measurement. Changes in the fluorescence/Raman intensity ratio near zero suggested that cementum or dentin was exposed, and calculus removed.

  4. Analysis of Security Protocols for Mobile Healthcare.

    Science.gov (United States)

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  5. Cluster protocols in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    K. Ovaliadis

    2014-07-01

    Full Text Available Underwater Wireless Sensor Networks (UWSN have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for underwater sensor networks. Up to today major efforts have been made for designing efficient protocols while considering the underwater communication characteristics. An important issue on this research area is the construction of an efficient clustering algorithm. Clustering in the context of UWSN is important as it contributes a great deal towards the efficient use of energy resources. This paper reviews the most significant cluster based protocols proposed for UWSN. Major performance issues of these protocols with respect to the network conditions such as packet delivery ratio, average packet delay, node mobility effect and energy consumption are examined. The advantages and disadvantages of each protocol are also pointed out.

  6. Protocol Analysis of Group Problem Solving in Mathematics: A Cognitive-Metacognitive Framework for Assessment.

    Science.gov (United States)

    Artzt, Alice F.; Armour-Thomas, Eleanor

    The roles of cognition and metacognition were examined in the mathematical problem-solving behaviors of students as they worked in small groups. As an outcome, a framework that links the literature of cognitive science and mathematical problem solving was developed for protocol analysis of mathematical problem solving. Within this framework, each…

  7. Safety of protocol violations in acute stroke tPA administration.

    Science.gov (United States)

    Lyerly, Michael J; Albright, Karen C; Boehme, Amelia K; Bavarsad Shahripour, Reza; Houston, James T; Rawal, Pawan V; Kapoor, Niren; Alvi, Muhammad; Sisson, April; Alexandrov, Anne W; Alexandrov, Andrei V

    2014-01-01

    Intravenous (IV) tissue plasminogen activator remains the only approved therapy for acute ischemic stroke (AIS) in the United States; however, less than 10% of patients receive treatment. This is partially because of the large number of contraindications, narrow treatment window, and physician reluctance to deviate from these criteria. We retrospectively analyzed consecutive patients who received IV thrombolysis at our stroke center for National Institute of Neurological Disorders and Stroke (NINDS) protocol violations and rates of symptomatic intracerebral hemorrhage (sICH). Other outcome variables included systemic hemorrhage, modified Rankin Scale at discharge, and discharge disposition. A total of 212 patients were identified in our stroke registry between 2009 and 2011 and included in the analysis. Protocol violations occurred in 76 patients (36%). The most common violations were thrombolysis beyond 3 hours (26%), aggressive blood pressure management (15%), elevated prothrombin time (PT) or partial thromboplastin time (PTT) (6.6%), minor or resolving deficits (4.2%), unclear time of onset (3.9%), and stroke within 3 months (3%). There were no significant differences in any of the safety outcomes or discharge disposition between patients with or without protocol violations. Controlling for age, National Institutes of Health Stroke Scale on admission, and glucose on admission, there was no significant increase in sICH (odds ratio: 3.8; 95% confidence interval: .37-38.72) in the patients who had protocol violations. Despite more than one third of patients receiving thrombolysis with protocol violations, overall rates of hemorrhage remained low and did not differ from those who did not have violations. Our data support the need to expand access to thrombolysis in AIS patients. Published by Elsevier Inc.

  8. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    Science.gov (United States)

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-03-31

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  9. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    Science.gov (United States)

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  10. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kashif Saleem

    2016-03-01

    Full Text Available The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP involves an artificial immune system (AIS that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2 and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  11. Transient Elastography vs. Aspartate Aminotransferase to Platelet Ratio Index in Hepatitis C: A Meta-Analysis.

    Science.gov (United States)

    Mattos, A Z; Mattos, A A

    Many different non-invasive methods have been studied with the purpose of staging liver fibrosis. The objective of this study was verifying if transient elastography is superior to aspartate aminotransferase to platelet ratio index for staging fibrosis in patients with chronic hepatitis C. A systematic review with meta-analysis of studies which evaluated both non-invasive tests and used biopsy as the reference standard was performed. A random-effects model was used, anticipating heterogeneity among studies. Diagnostic odds ratio was the main effect measure, and summary receiver operating characteristic curves were created. A sensitivity analysis was planned, in which the meta-analysis would be repeated excluding each study at a time. Eight studies were included in the meta-analysis. Regarding the prediction of significant fibrosis, transient elastography and aspartate aminotransferase to platelet ratio index had diagnostic odds ratios of 11.70 (95% confidence interval = 7.13-19.21) and 8.56 (95% confidence interval = 4.90-14.94) respectively. Concerning the prediction of cirrhosis, transient elastography and aspartate aminotransferase to platelet ratio index had diagnostic odds ratios of 66.49 (95% confidence interval = 23.71-186.48) and 7.47 (95% confidence interval = 4.88-11.43) respectively. In conclusion, there was no evidence of significant superiority of transient elastography over aspartate aminotransferase to platelet ratio index regarding the prediction of significant fibrosis, but the former proved to be better than the latter concerning prediction of cirrhosis.

  12. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  13. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  14. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.......e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful...... in this direction is to extend saturation-based techniques so that enough state information can be modelled and analysed. Finally, we present a methodology for proving the same security properties in the computational model, by means of typing protocol implementations....

  15. Evaluation of atmospheric particulate concentrations derived from analysis of ratio Thematic Mapper data

    Science.gov (United States)

    Carnahan, W. H.; Mausel, P. W.; Zhou, G. P.

    1984-01-01

    An approach for atmospheric particulate concentration evaluation above urban areas using ratio Thematic Mapper (TM) data is discussed. October 25, 1982 TM data over Chicago, IL are analyzed using TM band ratios of 1/2, 1/3, 1/4, 1/5, and 1/6 and particulate concentration estimates derived from TM ratios are tested over low reflective turbid water sites and highly reflective concrete highways. From analysis of the data it is evident that for water, the pattern of increasing particulate concentration is associated with decreasing ratio values in all band combinations used. Over concrete features, the TM band 1/4 ratio values follow the predicted pattern, while the TM band 1/6 has ratios which are reversed from anticipated values.

  16. Analiza protokola kvaliteta usluga telekomunikacionih mreža / Analysis of quality of service protocols in telecommunication networks

    Directory of Open Access Journals (Sweden)

    Milojko Jevtović

    2003-05-01

    Full Text Available Protokoli kvaliteta usluga (Quality of Service - QoS sadašnjih i budućih telekomunikacionih mreža razvijeni su, pored ostalog, sa ciljem da podrže različite klase usluga (Class of Service - CoS komunikaciju u realnom vremenu, kao i prenos multimedijalnih poruka preko paketskih IP (Internet Protocol mreža. U raduje dat pregled karakteristika tih protokola i ocena njihovih konkretnih mogućnosti u obezbeđenju kvaliteta usluga unutar sistema ('s vrha do dna', tj. vertikalno u OSI arhitekturi kao i 'horizontalno' odnosno s kraja na kraj veze, tj. između izvora i odredišta. / Today's and future telecommunication networks must enable transmission throughout heterogeneous environment, using different Quality of Service protocols, Quality of Service protocols use a variety of complementary mechanisms to enable deterministic end-to-end different data delivery. The analysis of these protocols and their efficiency in providing QoS and CoS has been given in this paper.

  17. The interventional effect of new drugs combined with the Stupp protocol on glioblastoma: A network meta-analysis.

    Science.gov (United States)

    Li, Mei; Song, Xiangqi; Zhu, Jun; Fu, Aijun; Li, Jianmin; Chen, Tong

    2017-08-01

    New therapeutic agents in combination with the standard Stupp protocol (a protocol about the temozolomide combined with radiotherapy treatment with glioblastoma was research by Stupp R in 2005) were assessed to evaluate whether they were superior to the Stupp protocol alone, to determine the optimum treatment regimen for patients with newly diagnosed glioblastoma. We implemented a search strategy to identify studies in the following databases: PubMed, Cochrane Library, EMBASE, CNKI, CBM, Wanfang, and VIP, and assessed the quality of extracted data from the trials included. Statistical software was used to perform network meta-analysis. The use of novel therapeutic agents in combination with the Stupp protocol were all shown to be superior than the Stupp protocol alone for the treatment of newly diagnosed glioblastoma, ranked as follows: cilengitide 2000mg/5/week, bevacizumab in combination with irinotecan, nimotuzumab, bevacizumab, cilengitide 2000mg/2/week, cytokine-induced killer cell immunotherapy, and the Stupp protocol. In terms of serious adverse effects, the intervention group showed a 29% increase in the incidence of adverse events compared with the control group (patients treated only with Stupp protocol) with a statistically significant difference (RR=1.29; 95%CI 1.17-1.43; P<0.001). The most common adverse events were thrombocytopenia, lymphopenia, neutropenia, pneumonia, nausea, and vomiting, none of which were significantly different between the groups except for neutropenia, pneumonia, and embolism. All intervention drugs evaluated in our study were superior to the Stupp protocol alone when used in combination with it. However, we could not conclusively confirm whether cilengitide 2000mg/5/week was the optimum regime, as only one trial using this protocol was included in our study. Copyright © 2017. Published by Elsevier B.V.

  18. Digital color analysis of color-ratio composite LANDSAT scenes. [Nevada

    Science.gov (United States)

    Raines, G. L.

    1977-01-01

    A method is presented that can be used to calculate approximate Munsell coordinates of the colors produced by making a color composite from three registered images. Applied to the LANDSAT MSS data of the Goldfield, Nevada, area, this method permits precise and quantitative definition of the limonitic areas originally observed in a LANDSAT color ratio composite. In addition, areas of transported limonite can be discriminated from the limonite in the hydrothermally altered areas of the Goldfield mining district. From the analysis, the numerical distinction between limonitic and nonlimonitic ground is generally less than 3% using the LANDSAT bands and as much as 8% in ratios of LANDSAT MSS bands.

  19. Comparative study on DuPont analysis and DEA models for measuring stock performance using financial ratio

    Science.gov (United States)

    Arsad, Roslah; Shaari, Siti Nabilah Mohd; Isa, Zaidi

    2017-11-01

    Determining stock performance using financial ratio is challenging for many investors and researchers. Financial ratio can indicate the strengths and weaknesses of a company's stock performance. There are five categories of financial ratios namely liquidity, efficiency, leverage, profitability and market ratios. It is important to interpret the ratio correctly for proper financial decision making. The purpose of this study is to compare the performance of listed companies in Bursa Malaysia using Data Envelopment Analysis (DEA) and DuPont analysis Models. The study is conducted in 2015 involving 116 consumer products companies listed in Bursa Malaysia. The estimation method of Data Envelopment Analysis computes the efficiency scores and ranks the companies accordingly. The Alirezaee and Afsharian's method of analysis based Charnes, Cooper and Rhodes (CCR) where Constant Return to Scale (CRS) is employed. The DuPont analysis is a traditional tool for measuring the operating performance of companies. In this study, DuPont analysis is used to evaluate three different aspects such as profitability, efficiency of assets utilization and financial leverage. Return on Equity (ROE) is also calculated in DuPont analysis. This study finds that both analysis models provide different rankings of the selected samples. Hypothesis testing based on Pearson's correlation, indicates that there is no correlation between rankings produced by DEA and DuPont analysis. The DEA ranking model proposed by Alirezaee and Asharian is unstable. The method cannot provide complete ranking because the values of Balance Index is equal and zero.

  20. Numerical analysis on the ion species ratios in a steady state hydrogen plasma

    International Nuclear Information System (INIS)

    Fukumasa, Osamu; Saeki, Setsuo; Osaki, Katashi; Sakiyama, Satoshi; Itatani, Ryohei.

    1984-07-01

    Ion species ratios in a hydrogen plasma are calculated systematically as a function of plasma parameters, i.e. the electron density, the electron temperature, the pressure of hydrogen gas and the plasma volume. Furthermore, in the present analysis, the recombination factor for hydrogen atoms at the wall surface of a vacuum vessel is treated as another plasma parameter. The most significant point is that ion species ratios depend strongly not only on plasma parameters, but also on the recombination factor. The proton ratio increases with decreasing value of the recombination factor. Primary electrons also play an important role for ion species ratios, and the presence of primary electrons causes the proton ratio to decrease. (author)

  1. Direct uranium isotope ratio analysis of single micrometer-sized glass particles

    OpenAIRE

    Kappel, Stefanie; Boulyga, Sergei F.; Prohaska, Thomas

    2012-01-01

    We present the application of nanosecond laser ablation (LA) coupled to a ‘Nu Plasma HR’ multi collector inductively coupled plasma mass spectrometer (MC-ICP-MS) for the direct analysis of U isotope ratios in single, 10–20 μm-sized, U-doped glass particles. Method development included studies with respect to (1) external correction of the measured U isotope ratios in glass particles, (2) the applied laser ablation carrier gas (i.e. Ar versus He) and (3) the accurate determination of lower abu...

  2. A Protocol for the Comprehensive Flow Cytometric Analysis of Immune Cells in Normal and Inflamed Murine Non-Lymphoid Tissues

    Science.gov (United States)

    Yu, Yen-Rei A.; O’Koren, Emily G.; Hotten, Danielle F.; Kan, Matthew J.; Kopin, David; Nelson, Erik R.; Que, Loretta; Gunn, Michael D.

    2016-01-01

    Flow cytometry is used extensively to examine immune cells in non-lymphoid tissues. However, a method of flow cytometric analysis that is both comprehensive and widely applicable has not been described. We developed a protocol for the flow cytometric analysis of non-lymphoid tissues, including methods of tissue preparation, a 10-fluorochrome panel for cell staining, and a standardized gating strategy, that allows the simultaneous identification and quantification of all major immune cell types in a variety of normal and inflamed non-lymphoid tissues. We demonstrate that our basic protocol minimizes cell loss, reliably distinguishes macrophages from dendritic cells (DC), and identifies all major granulocytic and mononuclear phagocytic cell types. This protocol is able to accurately quantify 11 distinct immune cell types, including T cells, B cells, NK cells, neutrophils, eosinophils, inflammatory monocytes, resident monocytes, alveolar macrophages, resident/interstitial macrophages, CD11b- DC, and CD11b+ DC, in normal lung, heart, liver, kidney, intestine, skin, eyes, and mammary gland. We also characterized the expression patterns of several commonly used myeloid and macrophage markers. This basic protocol can be expanded to identify additional cell types such as mast cells, basophils, and plasmacytoid DC, or perform detailed phenotyping of specific cell types. In examining models of primary and metastatic mammary tumors, this protocol allowed the identification of several distinct tumor associated macrophage phenotypes, the appearance of which was highly specific to individual tumor cell lines. This protocol provides a valuable tool to examine immune cell repertoires and follow immune responses in a wide variety of tissues and experimental conditions. PMID:26938654

  3. Analysis of signal to background ratio in synchrotron radiation X-ray fluorescence

    International Nuclear Information System (INIS)

    Sakurai, Kenji; Gohshi, Yohichi; Iida, Atsuo.

    1988-01-01

    The signal to background (S/B) ratio in energy dispersive X-ray fluorescence using synchrotron radiation (SR) was quantitatively analyzed. The S/B ratio, which has been significantly improved by taking advantage of the polarized nature of SR, was found to be strongly dependent on geometrical factors of the measurement system. From the analysis on the origin of the scattered background, the dependence of the S/B ratio on the geometry was quantitatively explained, mainly by the polarization properties of SR. Experimental conditions could be optimized by adjusting the degree of polarization of the incident beam and the detector solid angle. (author)

  4. A reliable, delay bounded and less complex communication protocol for multicluster FANETs

    Directory of Open Access Journals (Sweden)

    Wajiya Zafar

    2017-02-01

    Full Text Available Recently, Flying Ad-hoc Networks (FANETs, enabling ad-hoc networking between Unmanned Aerial Vehicles (UAVs is gaining importance in several military and civilian applications. The sensitivity of the applications requires adaptive; efficient; delay bounded and scalable communication network among UAVs for data transmission. Due to communication protocol complexity; rigidity; cost of commercial-off-the-shelf (COT components; limited radio bandwidth; high mobility and computational resources; maintaining the desired level of Quality of Service (QoS becomes a daunting task. For the first time in this research we propose multicluster FANETs for efficient network management; the proposed scheme considerably reduces communication cost and optimizes network performance as well as exploit low power; less complex and low cost IEEE 802.15.4 (MAC protocol for intercluster and intracluster communication. In this research both beacon enabled mode and beaconless modes have been investigated with Guaranteed Time Slots (GTS and virtual Time Division Multiple Access (TDMA respectively. The methodology plays a key role towards reserving bandwidth for latency critical applications; eliminate collisions and medium access delays. Moreover analysis ad-hoc routing protocols including two proactive (OLSR, DSDV and one reactive (AODV is also presented. The results shows that the proposed scheme guarantees high packet delivery ratios while maintaining acceptable levels of latency requirements comparable with more complex and dedicatedly designed protocols in literature.

  5. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  6. Head CT: Image quality improvement with ASIR-V using a reduced radiation dose protocol for children

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Gi [Ajou University School of Medicine, Ajou University Medical Center, Department of Radiology, Yeongtong-gu, Suwon (Korea, Republic of); Lee, Ho-Joon; Lee, Seung-Koo; Kim, Myung-Joon [Severance Hospital, Yonsei University College of Medicine, Department of Radiology and Research Institute of Radiological Science, Seodaemun-gu, Seoul (Korea, Republic of); Kim, Hyun Ji [Ajou University School of Medicine, Office of Biostatistics, Department of Humanities and Social Medicine, Yeongtong-gu, Suwon (Korea, Republic of)

    2017-09-15

    To investigate the quality of images reconstructed with adaptive statistical iterative reconstruction V (ASIR-V), using pediatric head CT protocols. A phantom was scanned at decreasing 20% mA intervals using our standard pediatric head CT protocols. Each study was then reconstructed at 10% ASIR-V intervals. After the phantom study, we reduced mA by 10% in the protocol for <3-year-old patients and applied 30% ASIR-V and by 30% in the protocol for 3- to 15-year-old patients and applied 40% ASIR-V. Increasing the percentage of ASIR-V resulted in lower noise and higher contrast-to-noise ratio (CNR) and preserved spatial resolution in the phantom study. Compared to a conventional-protocol, reduced-dose protocol with ASIR-V achieved 12.8% to 34.0% of dose reduction and showed images of lower noise (9.22 vs. 10.73, P = 0.043) and higher CNR in different levels (centrum semiovale, 2.14 vs. 1.52, P = 0.003; basal ganglia, 1.46 vs. 1.07, P = 0.001; and cerebellum, 2.18 vs. 1.33, P < 0.001). Qualitative analysis showed higher gray-white matter differentiation and sharpness and preserved overall diagnostic quality in the images with ASIR-V. Use of ASIR-V allowed a 12.8% to 34.0% dose reduction in each age group with potential to improve image quality. (orig.)

  7. Head CT: Image quality improvement with ASIR-V using a reduced radiation dose protocol for children

    International Nuclear Information System (INIS)

    Kim, Hyun Gi; Lee, Ho-Joon; Lee, Seung-Koo; Kim, Myung-Joon; Kim, Hyun Ji

    2017-01-01

    To investigate the quality of images reconstructed with adaptive statistical iterative reconstruction V (ASIR-V), using pediatric head CT protocols. A phantom was scanned at decreasing 20% mA intervals using our standard pediatric head CT protocols. Each study was then reconstructed at 10% ASIR-V intervals. After the phantom study, we reduced mA by 10% in the protocol for <3-year-old patients and applied 30% ASIR-V and by 30% in the protocol for 3- to 15-year-old patients and applied 40% ASIR-V. Increasing the percentage of ASIR-V resulted in lower noise and higher contrast-to-noise ratio (CNR) and preserved spatial resolution in the phantom study. Compared to a conventional-protocol, reduced-dose protocol with ASIR-V achieved 12.8% to 34.0% of dose reduction and showed images of lower noise (9.22 vs. 10.73, P = 0.043) and higher CNR in different levels (centrum semiovale, 2.14 vs. 1.52, P = 0.003; basal ganglia, 1.46 vs. 1.07, P = 0.001; and cerebellum, 2.18 vs. 1.33, P < 0.001). Qualitative analysis showed higher gray-white matter differentiation and sharpness and preserved overall diagnostic quality in the images with ASIR-V. Use of ASIR-V allowed a 12.8% to 34.0% dose reduction in each age group with potential to improve image quality. (orig.)

  8. From human monocytes to genome-wide binding sites--a protocol for small amounts of blood: monocyte isolation/ChIP-protocol/library amplification/genome wide computational data analysis.

    Directory of Open Access Journals (Sweden)

    Sebastian Weiterer

    Full Text Available Chromatin immunoprecipitation in combination with a genome-wide analysis via high-throughput sequencing is the state of the art method to gain genome-wide representation of histone modification or transcription factor binding profiles. However, chromatin immunoprecipitation analysis in the context of human experimental samples is limited, especially in the case of blood cells. The typically extremely low yields of precipitated DNA are usually not compatible with library amplification for next generation sequencing. We developed a highly reproducible protocol to present a guideline from the first step of isolating monocytes from a blood sample to analyse the distribution of histone modifications in a genome-wide manner.The protocol describes the whole work flow from isolating monocytes from human blood samples followed by a high-sensitivity and small-scale chromatin immunoprecipitation assay with guidance for generating libraries compatible with next generation sequencing from small amounts of immunoprecipitated DNA.

  9. Laser assisted ratio analysis - An alternative to GC/IRMS for CO2

    International Nuclear Information System (INIS)

    Murnick, D.E.

    2001-01-01

    A new technique for laser based analysis of carbon isotope ratios, with the acronym LARA, based on large isotope shifts in molecular spectra, the use of fixed frequency isotopic lasers, and sensitive detection via the laser optogalvanic effect is reviewed and compared with GC/IRMS for carbon dioxide in specific applications. The possibility for development of new classes of isotope ratio measurement systems with LARA is explored. (author)

  10. An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues.

    Science.gov (United States)

    Corces, M Ryan; Trevino, Alexandro E; Hamilton, Emily G; Greenside, Peyton G; Sinnott-Armstrong, Nicholas A; Vesuna, Sam; Satpathy, Ansuman T; Rubin, Adam J; Montine, Kathleen S; Wu, Beijing; Kathiria, Arwa; Cho, Seung Woo; Mumbach, Maxwell R; Carter, Ava C; Kasowski, Maya; Orloff, Lisa A; Risca, Viviana I; Kundaje, Anshul; Khavari, Paul A; Montine, Thomas J; Greenleaf, William J; Chang, Howard Y

    2017-10-01

    We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content. The Omni-ATAC protocol generates chromatin accessibility profiles from archival frozen tissue samples and 50-μm sections, revealing the activities of disease-associated DNA elements in distinct human brain structures. The Omni-ATAC protocol enables the interrogation of personal regulomes in tissue context and translational studies.

  11. Wald Sequential Probability Ratio Test for Analysis of Orbital Conjunction Data

    Science.gov (United States)

    Carpenter, J. Russell; Markley, F. Landis; Gold, Dara

    2013-01-01

    We propose a Wald Sequential Probability Ratio Test for analysis of commonly available predictions associated with spacecraft conjunctions. Such predictions generally consist of a relative state and relative state error covariance at the time of closest approach, under the assumption that prediction errors are Gaussian. We show that under these circumstances, the likelihood ratio of the Wald test reduces to an especially simple form, involving the current best estimate of collision probability, and a similar estimate of collision probability that is based on prior assumptions about the likelihood of collision.

  12. [Perinatal bioethics: euthanasia or end-of-life decisions? Analysis of the Groningen Protocol].

    Science.gov (United States)

    Halac, Jacobo; Halac, Eduardo; Moya, Martín P; Olmas, José M; Dopazo, Silvina L; Dolagaray, Nora

    2009-12-01

    The so called "Groningen Protocol" was conceived as a framework to discuss the euthanasia in neonates. Originally, it presents three groups of babies who might be candidates to this option. We analyzed the protocol in its original context and that of the Dutch society in which it was created. The analysis started with a careful reading of the protocol in both English and Dutch versions, translated later into Spanish. The medical and nursing staff participated in discussing it. A final consensus was reached. The Institutional Ethics Committee at our hospital discussed it freely and made recommendations for its application as a guideline to honestly discuss with parents the clinical condition of their babies, without permitting the option included literally in the word euthanasia. We selected four extremely ill infants. Their parents were interviewed at least twice daily: three stages were identified: the initial one of promoting all possible treatments; a second one of guarded and cautious request for the staff to evaluate "suffering", and a last one where requests were made to reduce therapeutic efforts to provide dignified death. A week after the death of their infants, they were presented with the facts of the protocol and the limits of our legal system. In all four cases the parents suggested that they would have chosen ending the life of their infants, in order to avoid them undue suffering. They clearly pointed out that this option emerged as a viable one to them once the ultimate outcome was evident. The protocol must not be viewed as a guideline for euthanasia in newborns, but rather as a mean to discuss the critical condition of an infant with the parents. Its direct implementation in our setting remains difficult. As a clear limitation for its overall application remains the definition of what is considered "unbearable suffering" in newborns, and how to certify when the infant has "no prospect". We emphasize the benefits of securing the help of the Ethics

  13. Indirect MR venography: contrast medium protocols, postprocessing and combination in diagnosing pulmonary emboli with MRI

    International Nuclear Information System (INIS)

    Kluge, A.; Bachmann, G.; Rominger, M.; Schoenburg, M.

    2004-01-01

    Purpose: Integration of MR venography in a comprehensive MR imaging protocol in patients with suspected pulmonary embolism (PE) and evaluation of contrast media dosage, timing and postprocessing for diagnostic accuracy. Materials and Methods: Fortyeight consecutive inpatients with suspected PE or deep vein thrombosis were examined by MR venography according to one of the following protocols: protocol I: MR venography only, 0.25 mmol/kg bodyweight (BW) Gadopentate dimeglumine(Gd-DTPA) as single dose, bolus timing; protocol II: MR angiography of pulmonary arteries with a cumulative dosage of 0.25 mmol/kg contrast media, modification of coil setting for MR venography without further contrast media application; protocol III: as protocol II but with 0.125 mmol/kg BW, followed by MR venography. Signal-to-noise ratio, contrast-to-noise ratio, number of definable vascular segments and image quality were evaluated. The results were compared to conventional bilateral venography. Results: All MR venography examinations were of diagnostic quality and the examination time was below 10 min. MR venography could be performed in all 48 patients comparted to 43 of 48 patients for conventional venography. Significantly more superficial and deep veins of the leg could be visualized by MR venography (94% compared to 83% for conventional venography). Sensitivity and specificity were 100% and 92%, respectively. Quality differed significantly between 0.125 mmol/kg (protocol III) and 0.25 mmol/kg Gd-DTPA (protocols I and II) while timing did not influence quality (protocol I vs. II). (orig.) [de

  14. Performance Analysis of an Optical CDMA MAC Protocol With Variable-Size Sliding Window

    Science.gov (United States)

    Mohamed, Mohamed Aly A.; Shalaby, Hossam M. H.; Abdel-Moety El-Badawy, El-Sayed

    2006-10-01

    A media access control protocol for optical code-division multiple-access packet networks with variable length data traffic is proposed. This protocol exhibits a sliding window with variable size. A model for interference-level fluctuation and an accurate analysis for channel usage are presented. Both multiple-access interference (MAI) and photodetector's shot noise are considered. Both chip-level and correlation receivers are adopted. The system performance is evaluated using a traditional average system throughput and average delay. Finally, in order to enhance the overall performance, error control codes (ECCs) are applied. The results indicate that the performance can be enhanced to reach its peak using the ECC with an optimum number of correctable errors. Furthermore, chip-level receivers are shown to give much higher performance than that of correlation receivers. Also, it has been shown that MAI is the main source of signal degradation.

  15. EpSoc: Social-Based Epidemic-Based Routing Protocol in Opportunistic Mobile Social Network

    Directory of Open Access Journals (Sweden)

    Halikul Lenando

    2018-01-01

    Full Text Available In opportunistic networks, the nature of intermittent and disruptive connections degrades the efficiency of routing. Epidemic routing protocol is used as a benchmark for most of routing protocols in opportunistic mobile social networks (OMSNs due to its high message delivery and latency. However, Epidemic incurs high cost in terms of overhead and hop count. In this paper, we propose a hybrid routing protocol called EpSoc which utilizes the Epidemic routing forwarding strategy and exploits an important social feature, that is, degree centrality. Two techniques are used in EpSoc. Messages’ TTL is adjusted based on the degree centrality of nodes, and the message blocking mechanism is used to control replication. Simulation results show that EpSoc increases the delivery ratio and decreases the overhead ratio, the average latency, and the hop counts as compared to Epidemic and Bubble Rap.

  16. A Financial Ratio Analysis of For-Profit and Non-Profit Rural Referral Centers

    Science.gov (United States)

    McCue, Michael J.; Nayar, Preethy

    2009-01-01

    Context: National financial data show that rural referral center (RRC) hospitals have performed well financially. RRC hospitals' median cash flow margin ratio was 10.04% in 2002 and grew to 11.04% in 2004. Purpose: The aim of this study is to compare the ratio analysis of key operational and financial performance measures of for-profit RRCs to…

  17. Generalized HARQ Protocols with Delayed Channel State Information and Average Latency Constraints

    DEFF Research Database (Denmark)

    Trillingsgaard, Kasper Fløe; Popovski, Petar

    2018-01-01

    In many practical wireless systems, the signal-to-interference-and-noise ratio (SINR) that is applicable to a certain transmission, referred to as channel state information (CSI), can only be learned after the transmission has taken place and is thereby delayed (outdated). In such systems, hybrid...... automatic repeat request (HARQ) protocols are often used to achieve high throughput with low latency. This paper put forth the family of expandable message space (EMS) protocols that generalize the HARQ protocol and allow for rate adaptation based on delayed CSI at the transmitter (CSIT). Assuming a block...

  18. A Ten Step Protocol and Plan for CCS Site Characterization, Based on an Analysis of the Rocky Mountain Region, USA

    Energy Technology Data Exchange (ETDEWEB)

    McPherson, Brian; Matthews, Vince

    2013-09-15

    This report expresses a Ten-Step Protocol for CO2 Storage Site Characterization, the final outcome of an extensive Site Characterization analysis of the Rocky Mountain region, USA. These ten steps include: (1) regional assessment and data gathering; (2) identification and analysis of appropriate local sites for characterization; (3) public engagement; (4) geologic and geophysical analysis of local site(s); (5) stratigraphic well drilling and coring; (6) core analysis and interpretation with other data; (7) database assembly and static model development; (8) storage capacity assessment; (9) simulation and uncertainty assessment; (10) risk assessment. While the results detailed here are primarily germane to the Rocky Mountain region, the intent of this protocol is to be portable or generally applicable for CO2 storage site characterization.

  19. Comparative analysis of protocols for DNA extraction from soybean caterpillars.

    Science.gov (United States)

    Palma, J; Valmorbida, I; da Costa, I F D; Guedes, J V C

    2016-04-07

    Genomic DNA extraction is crucial for molecular research, including diagnostic and genome characterization of different organisms. The aim of this study was to comparatively analyze protocols of DNA extraction based on cell lysis by sarcosyl, cetyltrimethylammonium bromide, and sodium dodecyl sulfate, and to determine the most efficient method applicable to soybean caterpillars. DNA was extracted from specimens of Chrysodeixis includens and Spodoptera eridania using the aforementioned three methods. DNA quantification was performed using spectrophotometry and high molecular weight DNA ladders. The purity of the extracted DNA was determined by calculating the A260/A280 ratio. Cost and time for each DNA extraction method were estimated and analyzed statistically. The amount of DNA extracted by these three methods was sufficient for PCR amplification. The sarcosyl method yielded DNA of higher purity, because it generated a clearer pellet without viscosity, and yielded high quality amplification products of the COI gene I. The sarcosyl method showed lower cost per extraction and did not differ from the other methods with respect to preparation times. Cell lysis by sarcosyl represents the best method for DNA extraction in terms of yield, quality, and cost effectiveness.

  20. Ratio analysis and Piotroski scoring system in the automobile industry in Croatia

    Directory of Open Access Journals (Sweden)

    Morana Mesarić

    2014-10-01

    Full Text Available To gain insight into operational efficiency, sustainable profitability, the ability to fulfil commitments, use of funds borrowed or investment risk or operational self-sufficiency, it is necessary to conduct analyses of financial statements usually known as ratio analysis. The paper provides analyses of five Croatian general distributors of the automobile industry. Ratios used in the analyses are those used in the Piotroski f-scoring analyses, which are famous for assessing financial capacities of enterprises on the stock exchange market. Based on ratios used in Piotroski scoring systems the assessment of five enterprises, as well as the sector as a whole was carried out. The analysis covers the period 2007-2012. That is the period of the rise, falling and recovery of the automotive industry throughout the world as well as the rise, falling and recession of the whole economy including the automobile market. In general, the sector itself is financially unstable and consequently risk exposed. Results are used for preliminary analyses and prediction of the future financial strength of the auto industry in Croatia.

  1. Evaluation of radiation doses delivered in different chest CT protocols

    International Nuclear Information System (INIS)

    Gorycki, Tomasz; Lasek, Iwona; Kamiński, Kamil; Studniarek, Michał

    2014-01-01

    There are differences in the reference diagnostic levels for the computed tomography (CT) of the chest as cited in different literature sources. The doses are expressed either in weighted CT dose index (CTDI VOL ) used to express the dose per slice, dose-length product (DLP), and effective dose (E). The purpose of this study was to assess the radiation dose used in Low Dose Computer Tomography (LDCT) of the chest in comparison with routine chest CT examinations as well as to compare doses delivered in low dose chest CT with chest X-ray doses. CTDI VOL and DLP doses were taken to analysis from routine CT chest examinations (64 MDCT TK LIGHT SPEED GE Medical System) performed in 202 adult patients with FBP reconstruction: 51 low dose, 106 helical, 20 angio CT, and 25 high resolution CT protocols, as well as 19 helical protocols with iterative ASIR reconstruction. The analysis of chest X-ray doses was made on the basis of reports from 44 examinations. Mean values of CTDI VOL and DLP were, respectively: 2.1 mGy and 85.1 mGy·cm, for low dose, 9.7 mGy and 392.3 mGy·cm for helical, 18.2 mGy and 813.9 mGy·cm for angio CT, 2.3 mGy and 64.4 mGy·cm for high resolution CT, 8.9 mGy. and 317.6 mGy·cm for helical ASIR protocols. Significantly lower CTDI VOL and DLP values were observed for low dose and high resolution CT versus the remaining CT protocols; doses delivered in CT ASIR protocols were also lower (80–81%). The ratio between medial doses in low dose CT and chest X-ray was 11.56. Radiation dose in extended chest LDCT with parameters allowing for identification of mediastinal structures and adrenal glands is still much lower than that in standard CT protocols. Effective doses predicted for LDCT may exceed those used in chest X-ray examinations by a factor of 4 to 12, depending on LDCT scan parameters. Our results, as well as results from other authors, suggest a possibility of reducing the dose by means of iterative reconstruction. Efforts towards further dose

  2. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  3. Failure mode and effects analysis of witnessing protocols for ensuring traceability during IVF.

    Science.gov (United States)

    Rienzi, Laura; Bariani, Fiorenza; Dalla Zorza, Michela; Romano, Stefania; Scarica, Catello; Maggiulli, Roberta; Nanni Costa, Alessandro; Ubaldi, Filippo Maria

    2015-10-01

    Traceability of cells during IVF is a fundamental aspect of treatment, and involves witnessing protocols. Failure mode and effects analysis (FMEA) is a method of identifying real or potential breakdowns in processes, and allows strategies to mitigate risks to be developed. To examine the risks associated with witnessing protocols, an FMEA was carried out in a busy IVF centre, before and after implementation of an electronic witnessing system (EWS). A multidisciplinary team was formed and moderated by human factors specialists. Possible causes of failures, and their potential effects, were identified and risk priority number (RPN) for each failure calculated. A second FMEA analysis was carried out after implementation of an EWS. The IVF team identified seven main process phases, 19 associated process steps and 32 possible failure modes. The highest RPN was 30, confirming the relatively low risk that mismatches may occur in IVF when a manual witnessing system is used. The introduction of the EWS allowed a reduction in the moderate-risk failure mode by two-thirds (highest RPN = 10). In our experience, FMEA is effective in supporting multidisciplinary IVF groups to understand the witnessing process, identifying critical steps and planning changes in practice to enable safety to be enhanced. Copyright © 2015 Reproductive Healthcare Ltd. Published by Elsevier Ltd. All rights reserved.

  4. Steady state likelihood ratio sensitivity analysis for stiff kinetic Monte Carlo simulations.

    Science.gov (United States)

    Núñez, M; Vlachos, D G

    2015-01-28

    Kinetic Monte Carlo simulation is an integral tool in the study of complex physical phenomena present in applications ranging from heterogeneous catalysis to biological systems to crystal growth and atmospheric sciences. Sensitivity analysis is useful for identifying important parameters and rate-determining steps, but the finite-difference application of sensitivity analysis is computationally demanding. Techniques based on the likelihood ratio method reduce the computational cost of sensitivity analysis by obtaining all gradient information in a single run. However, we show that disparity in time scales of microscopic events, which is ubiquitous in real systems, introduces drastic statistical noise into derivative estimates for parameters affecting the fast events. In this work, the steady-state likelihood ratio sensitivity analysis is extended to singularly perturbed systems by invoking partial equilibration for fast reactions, that is, by working on the fast and slow manifolds of the chemistry. Derivatives on each time scale are computed independently and combined to the desired sensitivity coefficients to considerably reduce the noise in derivative estimates for stiff systems. The approach is demonstrated in an analytically solvable linear system.

  5. Practical Guidance for Conducting Mediation Analysis With Multiple Mediators Using Inverse Odds Ratio Weighting

    OpenAIRE

    Nguyen, Quynh C.; Osypuk, Theresa L.; Schmidt, Nicole M.; Glymour, M. Maria; Tchetgen Tchetgen, Eric J.

    2015-01-01

    Despite the recent flourishing of mediation analysis techniques, many modern approaches are difficult to implement or applicable to only a restricted range of regression models. This report provides practical guidance for implementing a new technique utilizing inverse odds ratio weighting (IORW) to estimate natural direct and indirect effects for mediation analyses. IORW takes advantage of the odds ratio's invariance property and condenses information on the odds ratio for the relationship be...

  6. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  7. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2015-02-24

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  8. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal; Tammam, Amr; Alouini, Mohamed-Slim; Aissa, Sonia

    2015-01-01

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  9. A guideline for the validation of likelihood ratio methods used for forensic evidence evaluation

    NARCIS (Netherlands)

    Meuwly, Didier; Ramos, Daniel; Haraksim, Rudolf

    2017-01-01

    This Guideline proposes a protocol for the validation of forensic evaluation methods at the source level, using the Likelihood Ratio framework as defined within the Bayes’ inference model. In the context of the inference of identity of source, the Likelihood Ratio is used to evaluate the strength of

  10. Maintaining high precision of isotope ratio analysis over extended periods of time.

    Science.gov (United States)

    Brand, Willi A

    2009-06-01

    Stable isotope ratios are reliable and long lasting process tracers. In order to compare data from different locations or different sampling times at a high level of precision, a measurement strategy must include reliable traceability to an international stable isotope scale via a reference material (RM). Since these international RMs are available in low quantities only, we have developed our own analysis schemes involving laboratory working RM. In addition, quality assurance RMs are used to control the long-term performance of the delta-value assignments. The analysis schemes allow the construction of quality assurance performance charts over years of operation. In this contribution, the performance of three typical techniques established in IsoLab at the MPI-BGC in Jena is discussed. The techniques are (1) isotope ratio mass spectrometry with an elemental analyser for delta(15)N and delta(13)C analysis of bulk (organic) material, (2) high precision delta(13)C and delta(18)O analysis of CO(2) in clean-air samples, and (3) stable isotope analysis of water samples using a high-temperature reaction with carbon. In addition, reference strategies on a laser ablation system for high spatial resolution delta(13)C analysis in tree rings is exemplified briefly.

  11. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  12. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    ’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture......Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication...... the designer’s authentic line of reasoning. To illustrate how RPA can be used, the site planning case is briefly presented, and part of the replicated line of reasoning analysed. One result of the analysis is a glimpse of a ‘logic of design’; another is an insight which sheds new light on Darke’s classical...

  13. Traditional cardiovascular risk factors and coronary collateral circulation: Protocol for a systematic review and meta-analysis of case-control studies.

    Science.gov (United States)

    Xing, Zhenhua; Pei, Junyu; Tang, Liang; Hu, Xinqun

    2018-04-01

    Well-developed coronary collateral circulation usually results in fewer infarct size, improved cardiac function, and fewer mortality. Traditional coronary risk factors (diabetes, hypertension, and smoking) have some effects on coronary collateral circulation. However, the association between these risk factors and coronary collateral circulation are controversial. Given the confusing evidences regarding traditional cardiovascular risk factors on coronary collateral circulation, we performed this meta-analysis protocol to investigate the relationship between traditional risk factors of coronary artery disease and coronary collateral circulation. MEDINE, EMBASE, and Science Citation Index will be searched to identify relevant studies. The primary outcomes of this meta-analysis are well-developed coronary collateral circulation. Meta-analysis was performed to calculate the odds ratio (OR) and 95% confidence interval (CI) of traditional coronary risk factors (diabetes, smoking, hypertriton). Pooled ORs were computed as the Mantel-Haenszel-weighted average of the ORs for all included studies. Sensitivity analysis, quality assessment, publication bias analysis, and the Grading of Recommendations Assessment, Development and Evaluation approach (GRADE) will be performed to ensure the reliability of our results. This study will provide a high-quality synthesis of current evidence of traditional risk factors on collateral circulation. This conclusion of our systematic review and meta-analysis will provide evidence to judge whether traditional risk factors affects coronary collateral circulation.Ethics and dissemination: Ethical approval is not required because our systematic review and meta-analysis will be based on published data without interventions on patients. The findings of this study will be published in a peer-reviewed journal.

  14. Metabolic flux ratio analysis and cell staining suggest the existence of C4 photosynthesis in Phaeodactylum tricornutum.

    Science.gov (United States)

    Huang, A; Liu, L; Zhao, P; Yang, C; Wang, G C

    2016-03-01

    Mechanisms for carbon fixation via photosynthesis in the diatom Phaeodactylum tricornutum Bohlin were studied recently but there remains a long-standing debate concerning the occurrence of C4 photosynthesis in this species. A thorough investigation of carbon metabolism and the evidence for C4 photosynthesis based on organelle partitioning was needed. In this study, we identified the flux ratios between C3 and C4 compounds in P. tricornutum using (13)C-labelling metabolic flux ratio analysis, and stained cells with various cell-permeant fluorescent probes to investigate the likely organelle partitioning required for single-cell C4 photosynthesis. Metabolic flux ratio analysis indicated the C3/C4 exchange ratios were high. Cell staining indicated organelle partitioning required for single-cell C4 photosynthesis might exist in P. tricornutum. The results of (13)C-labelling metabolic flux ratio analysis and cell staining suggest single-cell C4 photosynthesis exists in P. tricornutum. This study provides insights into photosynthesis patterns of P. tricornutum and the evidence for C4 photosynthesis based on (13)C-labelling metabolic flux ratio analysis and organelle partitioning. © 2015 The Society for Applied Microbiology.

  15. Settleability assessment protocol for anaerobic granular sludge and ...

    African Journals Online (AJOL)

    The re revealed that the protocol was sufficiently sensitive to define the settleability of the sludge samples and to accurately determ their allowable upflow velocities, resultant organic loading rates, and recycling ratios according to the settleability of the gran bed. Also, a series of graphical procedures with settling tests which ...

  16. Direct uranium isotope ratio analysis of single micrometer-sized glass particles.

    Science.gov (United States)

    Kappel, Stefanie; Boulyga, Sergei F; Prohaska, Thomas

    2012-11-01

    We present the application of nanosecond laser ablation (LA) coupled to a 'Nu Plasma HR' multi collector inductively coupled plasma mass spectrometer (MC-ICP-MS) for the direct analysis of U isotope ratios in single, 10-20 μm-sized, U-doped glass particles. Method development included studies with respect to (1) external correction of the measured U isotope ratios in glass particles, (2) the applied laser ablation carrier gas (i.e. Ar versus He) and (3) the accurate determination of lower abundant (236)U/(238)U isotope ratios (i.e. 10(-5)). In addition, a data processing procedure was developed for evaluation of transient signals, which is of potential use for routine application of the developed method. We demonstrate that the developed method is reliable and well suited for determining U isotope ratios of individual particles. Analyses of twenty-eight S1 glass particles, measured under optimized conditions, yielded average biases of less than 0.6% from the certified values for (234)U/(238)U and (235)U/(238)U ratios. Experimental results obtained for (236)U/(238)U isotope ratios deviated by less than -2.5% from the certified values. Expanded relative total combined standard uncertainties U(c) (k = 2) of 2.6%, 1.4% and 5.8% were calculated for (234)U/(238)U, (235)U/(238)U and (236)U/(238)U, respectively. Copyright © 2012 Elsevier Ltd. All rights reserved.

  17. Ratio of slopes method for quantitative analysis in ceramic bodies

    International Nuclear Information System (INIS)

    Zainal Arifin Ahmad; Ahmad Fauzi Mohd Noor; Radzali Othman; Messer, P.F.

    1996-01-01

    A quantitative x-ray diffraction analysis technique developed at University of Sheffield was adopted, rather than the previously widely used internal standard method, to determine the amount of the phases present in a reformulated whiteware porcelain and a BaTiO sub 3 electrochemical material. This method, although still employs an internal standard, was found to be very easy and accurate. The required weight fraction of a phase in the mixture to be analysed is determined from the ratio of slopes of two linear plots, designated as the analysis and reference lines, passing through their origins using the least squares method

  18. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  19. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Science.gov (United States)

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  20. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Omar Elizarraras

    2014-01-01

    Full Text Available The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15% compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput.

  1. Appearance of Abnormal Cardiothoracic Ratio of Fetuses with Hemoglobin Bart's Disease: Life Table Analysis.

    Science.gov (United States)

    Wanapirak, Chanane; Sirichotiyakul, Supatra; Luewan, Suchaya; Srisupundit, Kasemsri; Tongprasert, Fuanglada; Tongsong, Theera

    2017-10-01

    Objective  To determine the timeline of the first appearance of an increased CT ratio of fetuses with hemoglobin (Hb) Bart's disease. Materials and Methods  A prospective longitudinal study was conducted on pregnancies at risk for fetal Hb Bart's disease. Sonographic markers including cardiothoracic (CT) ratio and middle cerebral artery peak systolic velocity (MCA-PSV) were serially assessed and recorded from the first trimester. The definite diagnosis of fetal Hb Bart's disease based on DNA analysis (CVS), or fetal Hb typing (HPLC; cordocentesis) was performed at the first appearance of an increased CT ratio. Results  Of 275 pregnancies at risk, 64 fetuses were finally proven to be affected and life table analysis was performed. Most affected fetuses showed an increased CT ratio in late first trimester and early second trimester, with median time of the first appearance at 13 weeks and all affected fetuses were detected at 23 weeks or less. The CT ratio yielded a sensitivity of 100 % at a gestational age of 23 weeks with a false-positive rate of 8 %. MCA-PSV appeared later than CT ratio. Only 9.4 % of affected cases developed abnormal MCA-PSV before an increased CT ratio. Conclusion  The timeline of the first appearance of an increased CT ratio of fetuses with Hb Bart's disease was established. This may help us identify Hb Bart's disease among fetuses at risk in earlier gestation and proper schedules for serial ultrasound could be made more effectively. © Georg Thieme Verlag KG Stuttgart · New York.

  2. Validation of CBZ code system for post-irradiation examination analysis and sensitivity analysis of (n,γ) branching ratio

    International Nuclear Information System (INIS)

    Kawamoto, Yosuke; Chiba, Go; Tsuji, Masashi; Narabayashi, Tadashi

    2013-01-01

    A code system CBZ is being developed in Hokkaido University. In order to validate it, PIE data, which are nuclide composition data of a spent fuel, have been analyzed with CBZ. The validity is evaluated as ratios of the calculation values to the experimental ones (C/E ratios). Differences between experimental values and calculation ones are smaller than 20% except some nuclides. Thus this code system is validated. Additionally, we evaluate influence of change of (n,γ) branching ratio on inventories of fission products and actinides. As a result, branching ratios of Sb-121, Pm-147, and Am-241 influence inventories of several nuclides. We perform PIE analysis using different (n,γ) branching ratio data from the ORIGEN-2 library, JNDC-Ver.2, and JEFF-3.1A, and find that differences in (n,γ) branching ratios between different nuclear libraries have a non-negligible influence on inventories of several nuclides. (author)

  3. The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel

    International Nuclear Information System (INIS)

    Li Jian; Sun Feng-Qi; Pan Ze-Shi; Nie Jin-Rui; Chen Yan-Hua; Yuan Kai-Guo

    2015-01-01

    To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein–Podolsky–Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003) 042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Q 0 (M : (Q 0 , 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ϵ is, the larger the error rate Q is. When the noise level ϵ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q < 0.153. Similarly, if error rate Q > 0.153 = Q 0 , eavesdropping information I > 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. (paper)

  4. Analysis of protection spanning-tree protocol

    Directory of Open Access Journals (Sweden)

    Б.Я. Корнієнко

    2007-01-01

    Full Text Available  Extraordinary sweeping  of  IT – development  causes vulnerabilities and, thereafter, attacks that use these vulnerabilities. That is why one must post factum or even in advance speed up invention of new information  security systems as well as develop the old ones. The matter of article concerns Spanning-Tree Protocol  – the vivid example of the case, when the cure of the vulnerability creates dozen of new "weak spots".

  5. Cost effectiveness of a protocol using palivizumab in preterm infants

    Directory of Open Access Journals (Sweden)

    Yolanda Hernández-Gago

    2017-03-01

    Full Text Available Objective: The main objective was to evaluate the cost-effectiveness of protocol use of palivizumab in premature established by consensus in our Hospital comparing it based on the recommendations of various Scientific Societies. As a secondary objective risk factors and severity of hospitalized patients attending the established protocol in our Hospital were analyzed. Methods: The study period was 4 seasons with the expanded protocol (retrospective data versus 2 with restricted or agreed protocol (prospective data. The perspective of the study was the Health System, including the costs of hospitalization and palivizumab our center. The calculation of the effectiveness was determined with the admission rate of premature patients stratified by weeks of gestational age <29, <32; and <35. For the analysis of risk factors and severity in patients admitted seasons with the new protocol are collected prospectively clinical data and environmental and social factors. Results: In the range of gestational age <29 years old and <32 greater effectiveness of the extended protocol was not demonstrated against the consensus. Only more effective for EG <35 in the accumulated data and comparing seasons 12/13 and 08/09 to 13/14 for individual data was observed. This range has an associated incremental cost effectiveness ratio of € 53 250,07 (range: € 14 793,39 to € 90 446,47 for singles data and € 50 525,53 (€ 28 688.22 to € 211 575,65 for accumulated. The establishment of this protocol in our center meant an average saving per season € 169 911,51. A cost- effectiveness of the extended protocol appropriate relationship is found if the cost of palivizumab per patient was less than € 1 206,67 (calculated for maximum use of the vial and a higher rate of hospitalization of 9.21%. Children entering the season with the new protocol (season 12/13 and 13/14 are 63.4% in children under 3 months and 90% are term infants who do not belong to any population at

  6. Performance Evaluation of AODV Routing Protocol in VANET with NS2

    Directory of Open Access Journals (Sweden)

    Divya Rathi

    2017-03-01

    Full Text Available In intelligent transportation systems, the collaboration between vehicles and the road side units is essential to bring these systems to realization. The emerging Vehicular Ad Hoc Network (VANET is becoming more and more important as it provides intelligent transportation application, comfort, safety, entertainment for people in vehicles. In order to provide stable routes and to get good performance in VANET, there is a need of proper routing protocols must be designed. In this paper, we are working with the very well-known ad-hoc on-demand distance vector (AODV routing protocol. The existing Routing protocol AODV-L which is based on the Link expiration time is extended to propose a more reliable AODV-AD which is based on multichannel MAC protocol. For the performance evaluation of routing protocols, a simulation tool ‘NS2’ has been used. Simulation results show that the proposed AODV-AD protocol can achieves better performances in forms of high Route stability, Packet Delivery ratio and packet loss rate than traditional AODV-L and traditional AODV.

  7. A fresh look at the freeze-all protocol: a SWOT analysis.

    Science.gov (United States)

    Blockeel, Christophe; Drakopoulos, Panagiotis; Santos-Ribeiro, Samuel; Polyzos, Nikolaos P; Tournaye, Herman

    2016-03-01

    The 'freeze-all' strategy with the segmentation of IVF treatment, namely with the use of a GnRH antagonist protocol, GnRH agonist triggering, the elective cryopreservation of all embryos by vitrification and a frozen-thawed embryo transfer in a subsequent cycle, has become more popular. However, the approach still encounters drawbacks. In this opinion paper, a SWOT (strengths, weaknesses, opportunities and threats) analysis sheds light on the different aspects of this strategy. © The Author 2016. Published by Oxford University Press on behalf of the European Society of Human Reproduction and Embryology. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  8. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  9. The impact of an ED-only full-capacity protocol.

    Science.gov (United States)

    Watase, Taketo; Fu, Rongwei; Foster, Denise; Langley, Denise; Handel, Daniel A

    2012-10-01

    The objective of this study was to assess the impact of an emergency department (ED)-only full-capacity protocol and diversion, controlling for patient volumes and other potential confounding factors. This was a preintervention and postintervention cohort study using data 12 months before and 12 months after the implementation of the protocol. During the implementation period, attending physicians and charge nurses were educated with clear and simple figures on the criteria for the initiation of the new protocol. A multiple logistic regression model was used to compare ambulance diversion between the 2 periods. The proportion of days when the ED went on diversion at least once during a 24-hour period was 60.4% during the preimplementation period and 20% in the postimplementation periods (P model, the use of the new protocol was significantly associated with decreased odds of diversion rate in the postimplementation period (odds ratio, 0.32; 95% confidence interval, 0.21-0.48). Our predivert/full-capacity protocol is a simple and generalizable strategy that can be implemented within the boundaries of the ED and is significantly associated with a decreased diversion rate. Copyright © 2012 Elsevier Inc. All rights reserved.

  10. Control of size and aspect ratio in hydroquinone-based synthesis of gold nanorods

    International Nuclear Information System (INIS)

    Morasso, Carlo; Picciolini, Silvia; Schiumarini, Domitilla; Mehn, Dora; Ojea-Jiménez, Isaac; Zanchetta, Giuliano; Vanna, Renzo; Bedoni, Marzia; Prosperi, Davide; Gramatica, Furio

    2015-01-01

    In this article, we describe how it is possible to tune the size and the aspect ratio of gold nanorods obtained using a highly efficient protocol based on the use of hydroquinone as a reducing agent by varying the amounts of CTAB and silver ions present in the “seed-growth” solution. Our approach not only allows us to prepare nanorods with a four times increased Au 3+ reduction yield, when compared with the commonly used protocol based on ascorbic acid, but also allows a remarkable reduction of 50–60 % of the amount of CTAB needed. In fact, according to our findings, the concentration of CTAB present in the seed-growth solution do not linearly influence the final aspect ratio of the obtained nanorods, and an optimal concentration range between 30 and 50 mM has been identified as the one that is able to generate particles with more elongated shapes. On the optimized protocol, the effect of the concentration of Ag + ions in the seed-growth solution and the stability of the obtained particles has also been investigated

  11. A modified protocol for myocardial perfusion SPECT using natural plant extracts for enbancement of biliorg excretion

    International Nuclear Information System (INIS)

    Jeong, Hwan Jeong; Kim, Chang Guhn

    2003-01-01

    For good quality of myocardial perfusion images, an approximately 30 min to 1 hour of waiting time after radiopharmaceutical injection of fatty meal are asked of the patients. The aim of this study was to investigate the shortening of waiting time after radiopharmaceutical injection and improvement of image quality using natural plant extracts that promote bile excretion. Ten volunteers participated in protocol 1 (7 men, 3 women; mean age, 24.1±2.4 years) and protocol 2 (8 men, 2 women; mean age, 26.1±2.9 years), respectively. For the modified method of both protocols, subjects took natural plant extracts 15 minutes before the first injection of 99m Tc MIBI without taking fatty meals. Control (Conventional) methods were performed with intake of a fatty meal 20 to 30 minutes after 99m Tc MIBI injection. As the results of protocol 1 and 2, the ratio of myocardial to lung ratio were not different between modified and conventional method. Liver to lung ratio of modified method showed significantly lower value than that of conventional method. In modified method, myocardial to liver ratio was higher persistently. In protocol 2, natural plant extracts took before the first injection of 99m Tc MIBI exerted accelerating effect of excretion of bile juice into intestine until the end of examination. These results represent that natural plant extracts for facilitation of bile excretion before injection of 99m Tc MIBI may provide better quality of myocardial perfusion images without the need for preparations such as ingestion of fatty meal within the 2 hours compared with conventional method

  12. Comprehensive assessment of firm financial performance using financial ratios and linguistic analysis of annual reports

    OpenAIRE

    Renáta Myšková; Petr Hájek

    2017-01-01

    Indicators of financial performance, especially financial ratio analysis, have become important financial decision-support information used by firm management and other stakeholders to assess financial stability and growth potential. However, additional information may be hidden in management communication. The article deals with the analysis of the annual reports of U.S. firms from both points of view, a financial one based on a set of financial ratios, and a linguistic one based on the anal...

  13. Error Ratio Analysis: Alternate Mathematics Assessment for General and Special Educators.

    Science.gov (United States)

    Miller, James H.; Carr, Sonya C.

    1997-01-01

    Eighty-seven elementary students in grades four, five, and six, were administered a 30-item multiplication instrument to assess performance in computation across grade levels. An interpretation of student performance using error ratio analysis is provided and the use of this method with groups of students for instructional decision making is…

  14. [Analysis of palliative sedation in hospitalised elderly patients: Effectiveness of a protocol].

    Science.gov (United States)

    Mateos-Nozal, Jesús; García-Cabrera, Lorena; Montero Errasquín, Beatriz; Cruz-Jentoft, Alfonso José; Rexach Cano, Lourdes

    2016-01-01

    To measure changes in the practice of palliative sedation during agony in hospitalised elderly patients before and after the implementation of a palliative sedation protocol. A retrospective before-after study was performed in hospitalised patients over 65 years old who received midazolam during hospital admission and died in the hospital in two 3-month periods, before and after the implementation of the protocol. Non-sedative uses of midazolam and patients in intensive care were excluded. Patient and admission characteristics, the consent process, withdrawal of life-sustaining treatments, and the sedation process (refractory symptom treated, drug doses, assessment and use of other drugs) were recorded. Association was analysed using the Chi(2) and Student t tests. A total of 143 patients were included, with no significant differences between groups in demographic characteristics or symptoms. Do not resuscitate (DNR) orders were recorded in approximately 70% of the subjects of each group, and informed consent for sedation was recorded in 91% before vs. 84% after the protocol. Induction and maintenance doses of midazolam followed protocol recommendations in 1.3% before vs 10.4% after the protocol was implemented (P=.02) and adequate rescue doses were used in 1.3% vs 11.9% respectively (P=.01). Midazolam doses were significantly lower (9.86mg vs 18.67mg, Psedation score was used in 8% vs. 12% and the Palliative Care Team was involved in 35.5% and 16.4% of the cases (P=.008) before and after the protocol, respectively. Use of midazolam slightly improved after the implementation of a hospital protocol on palliative sedation. The percentage of adequate sedations and the general process of sedation were mostly unchanged by the protocol. More education and further assessment is needed to gauge the effect of these measures in the future. Copyright © 2015 SEGG. Published by Elsevier Espana. All rights reserved.

  15. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  16. 75 FR 53273 - Federal Aquatic Nuisance Species Research Risk Analysis Protocol

    Science.gov (United States)

    2010-08-31

    ... Aquatic Nuisance Species Task Force (ANSTF). The Protocol is available for public review and comment... the draft revised Protocol are available on the ANSTF website, http://anstaskforce.gov/documents.php... nonindigenous species (ANS) and is designed to reduce the risk that research activities may cause introduction...

  17. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  18. Analysis of the radius and diameter protocols in terms of pricing telecommunication services

    Directory of Open Access Journals (Sweden)

    Vesna M. Radonjić

    2013-06-01

    Full Text Available Accounting of telecommunication services is closely related to the functions of authentication and authorization. These functions are usually considered together and implemented within the same server using a common protocol. The most renowned protocols for authentication, authorization and accounting are the RADIUS and Diameter protocols.   AAA functions and related protocols   In this chapter, the accounting management architecture developed by IETF is presented. It includes the interaction between network elements, accounting servers and billing and charging servers. Accounting data can be used for management, planning and charging users as well as other (specific purposes. Authentication is the process of confirming a user's digital identity, usually through some type of identifiers and related data. Authorization determines whether a particular entity is authorized to perform an activity.   Basic Functions of the RADIUS Protocol   The RADIUS architecture is based on a client-server model. It uses UDP on the transport layer. Transactions between the client and the server are authenticated, which is achieved by using a common secret key that is never sent through the network. Given the limited resources available to network devices, RADIUS facilitates and centralizes charging end users, provides some protection against active attacks by unauthorized users and it has great support from different network equipment vendors. Although RADIUS is a widely accepted protocol for the mechanisms of authentication, authorization and accounting, it has certain shortcomings that may be caused by the protocol itself or by its poor implementation.   Architecture and Operation of the Diameter Protocol   Diameter is a scalable protocol designed by the IETF working group in order to eliminate shortcomings and functional limitations of the RADIUS protocol and eventually to replace it in the near future. Most of the basic Diameter mechanisms and its

  19. Composite flexible skin with large negative Poisson’s ratio range: numerical and experimental analysis

    Science.gov (United States)

    Chen, Y. J.; Scarpa, F.; Farrow, I. R.; Liu, Y. J.; Leng, J. S.

    2013-04-01

    This paper describes the manufacturing, characterization and parametric modeling of a novel fiber-reinforced composite flexible skin with in-plane negative Poisson’s ratio (auxetic) behavior. The elastic mechanical performance of the auxetic skin is evaluated using a three-dimensional analytical model based on the classical laminate theory (CLT) and Sun’s thick laminate theory. Good agreement is observed between in-plane Poisson’s ratios and Young’s moduli of the composite skin obtained by the theoretical model and the experimental results. A parametric analysis carried out with the validated model shows that significant changes in the in-plane negative Poisson’s ratio can be achieved through different combinations of matrix and fiber materials and stacking sequences. It is also possible to identify fiber-reinforced composite skin configurations with the same in-plane auxeticity but different orthotropic stiffness performance, or the same orthotropic stiffness performance but different in-plane auxeticity. The analysis presented in this work provides useful guidelines to develop and manufacture flexible skins with negative Poisson’s ratio for applications focused on morphing aircraft wing designs.

  20. Composite flexible skin with large negative Poisson’s ratio range: numerical and experimental analysis

    International Nuclear Information System (INIS)

    Chen, Y J; Leng, J S; Scarpa, F; Farrow, I R; Liu, Y J

    2013-01-01

    This paper describes the manufacturing, characterization and parametric modeling of a novel fiber-reinforced composite flexible skin with in-plane negative Poisson’s ratio (auxetic) behavior. The elastic mechanical performance of the auxetic skin is evaluated using a three-dimensional analytical model based on the classical laminate theory (CLT) and Sun’s thick laminate theory. Good agreement is observed between in-plane Poisson’s ratios and Young’s moduli of the composite skin obtained by the theoretical model and the experimental results. A parametric analysis carried out with the validated model shows that significant changes in the in-plane negative Poisson’s ratio can be achieved through different combinations of matrix and fiber materials and stacking sequences. It is also possible to identify fiber-reinforced composite skin configurations with the same in-plane auxeticity but different orthotropic stiffness performance, or the same orthotropic stiffness performance but different in-plane auxeticity. The analysis presented in this work provides useful guidelines to develop and manufacture flexible skins with negative Poisson’s ratio for applications focused on morphing aircraft wing designs. (paper)

  1. Effects of the Ratio between Pigment and Bleaching Gel on the Fracture Resistance and Dentin Microhardness of endodontically treated Teeth.

    Science.gov (United States)

    Galloza, Marina Og; Jordão-Basso, Keren Cf; Bandeca, Matheus C; Costa, Samuel O; Borges, Alvaro H; Tonetto, Mateus R; Tirintan, Fabio C; Keine, Kátia C; Kuga, Milton C

    2017-11-01

    The aim of this study was to evaluate the effects of bleaching gel using 35% hydrogen peroxide (HP), associated with red carmine pigment (RC), in the 3:1 or 1:1 ratio, on fracture resistance and dentin microhardness of endodontically treated teeth. A total of 40 lower incisors were endodontically treated and divided into four groups (n = 10), according to the bleaching protocol: G1 (HP3), 35% HP + RC (3:1); G2 (HP1), 35% HP + RC (1:1); G3 (positive), 38% HP; and G4 (negative), unbleached. Four dental bleaching sessions were performed. The dental crowns were restored after the last session and submitted to the fracture resistance test. Totally, 60 specimens from the endodontically treated lower incisor crowns were prepared to evaluate the effects on dentin microhardness. The analysis was measured (in Knoop) prior to and after the last dental bleaching session using similar bleaching protocols. G2 presented the lowest fracture resistance (p 0.05). No difference was observed in the reduction of dentin microhardness among the groups (p > 0.05). A 1:1 ratio (bleaching gel:pigment) caused a significant fracture resistance reduction in relation to the other protocols. No effect on the dentin microhardness reduction was observed. The pigment addition to the bleaching agent accelerates the bleaching chemical reaction. However, no studies have evaluated the ideal proportion to optimize tooth bleaching.

  2. Stopping-power and mass energy-absorption coefficient ratios for Solid Water

    International Nuclear Information System (INIS)

    Ho, A.K.; Paliwal, B.R.

    1986-01-01

    The AAPM Task Group 21 protocol provides tables of ratios of average restricted stopping powers and ratios of mean energy-absorption coefficients for different materials. These values were based on the work of Cunningham and Schulz. We have calculated these quantities for Solid Water (manufactured by RMI), using the same x-ray spectra and method as that used by Cunningham and Schulz. These values should be useful to people who are using Solid Water for high-energy photon calibration

  3. Samples and Sampling Protocols for Scientific Investigations | Joel ...

    African Journals Online (AJOL)

    ... from sampling, through sample preparation, calibration to final measurement and reporting. This paper, therefore offers useful information on practical guidance on sampling protocols in line with best practice and international standards. Keywords: Sampling, sampling protocols, chain of custody, analysis, documentation ...

  4. Quantitative chemical exchange saturation transfer (qCEST) MRI - omega plot analysis of RF-spillover-corrected inverse CEST ratio asymmetry for simultaneous determination of labile proton ratio and exchange rate.

    Science.gov (United States)

    Wu, Renhua; Xiao, Gang; Zhou, Iris Yuwen; Ran, Chongzhao; Sun, Phillip Zhe

    2015-03-01

    Chemical exchange saturation transfer (CEST) MRI is sensitive to labile proton concentration and exchange rate, thus allowing measurement of dilute CEST agent and microenvironmental properties. However, CEST measurement depends not only on the CEST agent properties but also on the experimental conditions. Quantitative CEST (qCEST) analysis has been proposed to address the limitation of the commonly used simplistic CEST-weighted calculation. Recent research has shown that the concomitant direct RF saturation (spillover) effect can be corrected using an inverse CEST ratio calculation. We postulated that a simplified qCEST analysis is feasible with omega plot analysis of the inverse CEST asymmetry calculation. Specifically, simulations showed that the numerically derived labile proton ratio and exchange rate were in good agreement with input values. In addition, the qCEST analysis was confirmed experimentally in a phantom with concurrent variation in CEST agent concentration and pH. Also, we demonstrated that the derived labile proton ratio increased linearly with creatine concentration (P analysis can simultaneously determine labile proton ratio and exchange rate in a relatively complex in vitro CEST system. Copyright © 2015 John Wiley & Sons, Ltd.

  5. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    Science.gov (United States)

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  6. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  7. New View of Ping-Pong Protocol Security

    International Nuclear Information System (INIS)

    Zawadzki Piotr

    2012-01-01

    The ping-pong protocol offers confidential transmission of classic information without a prior key agreement. It is believed that it is quasi secure in lossless quantum channels. Serious doubts related to the analysis paradigm which has been used so far are presented in the study. The security of the protocol is reconsidered. (general)

  8. [Use of sFlt-1/PlGF ratio in preeclampsia : a monocentric retrospective analysis].

    Science.gov (United States)

    Verbeurgt, L; Chantraine, F; De Marchin, J; Minon, J-M; Nisolle, M

    2017-09-01

    Soluble Fms-like tyrosine kinase 1 (sFlt-1) is an anti-angiogenic factor released in higher amounts in preeclampsia and implicated in endothelial dysfunction. sFlt-1/PlGF ratio is used in the prediction of preeclampsia. An sFlt-1/PlGF ratio inferior to 38 predicts the short-term absence of preeclampsia. A ratio ? 85 (early-onset PE) or ? 110 (late-onset of PE) could diagnose preeclampsia. In this study, sFlt-1/PlGF ratio has been measured in 183 patients. Sixty-seven preeclampsia have been diagnosed preeclamptic at delivery. The median sFlt-1/PlGF ratio was 100.3. The median ratio among women with preeclampsia (N=67) versus no preeclampsia (N=116) was 212.7 versus 35.4. In accordance with this analysis, an sFlt-1/PlGF ratio ? 38 has a sensibility of 95,5 % and a specificity of 73.3 %. The positive predictive value and the negative predictive value were 67.4 % and 96.6 %, respectively. These results suggest that sFlt-1/PlGF ratio is helpful in the diagnosis of preeclampsia.

  9. Identification of a research protocol to study orthodontic tooth movement

    Directory of Open Access Journals (Sweden)

    Annalisa Dichicco

    2014-06-01

    Full Text Available Aim: The orthodontic movement is associated with a process of tissue remodeling together with the release of several chemical mediators in periodontal tissues. Each mediator is a potential marker of tooth movement and expresses biological processes as: tissue inflammation and bone remodeling. Different amounts of every mediator are present in several tissues and fluids of the oral cavity. Therefore, there are different methods that allow sampling with several degrees of invasiveness. Chemical mediators are also substances of different molecular nature, and multiple kind of analysis methods allow detection. The purpose of this study was to draft the best research protocol for an optimal study on orthodontic movement efficiency. Methods: An analysis of the international literature have been made, to identify the gold standard of each aspect of the protocol: type of mediator, source and method of sampling and analysis method. Results: From the analysis of the international literature was created an original research protocol for the study and the assessment of the orthodontic movement, by using the biomarkers of the tooth movement. Conclusions: The protocol created is based on the choice of the gold standard of every aspect already analyzed in the literature and in existing protocols for the monitoring of orthodontic tooth movement through the markers of tooth movement. Clinical trials re required for the evaluation and validation of the protocol created.

  10. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  11. Numerical Analysis of Film Cooling at High Blowing Ratio

    Science.gov (United States)

    El-Gabry, Lamyaa; Heidmann, James; Ameri, Ali

    2009-01-01

    Computational Fluid Dynamics is used in the analysis of a film cooling jet in crossflow. Predictions of film effectiveness are compared with experimental results for a circular jet at blowing ratios ranging from 0.5 to 2.0. Film effectiveness is a surface quantity which alone is insufficient in understanding the source and finding a remedy for shortcomings of the numerical model. Therefore, in addition, comparisons are made to flow field measurements of temperature along the jet centerline. These comparisons show that the CFD model is accurately predicting the extent and trajectory of the film cooling jet; however, there is a lack of agreement in the near-wall region downstream of the film hole. The effects of main stream turbulence conditions, boundary layer thickness, turbulence modeling, and numerical artificial dissipation are evaluated and found to have an insufficient impact in the wake region of separated films (i.e. cannot account for the discrepancy between measured and predicted centerline fluid temperatures). Analyses of low and moderate blowing ratio cases are carried out and results are in good agreement with data.

  12. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  13. A Hybrid Analysis for Security Protocols with State

    Science.gov (United States)

    2014-07-16

    http://www.mitre.org/publications/ technical-papers/completeness-of-cpsa. [19] Simon Meier, Cas Cremers , and David Basin. Efficient construction of...7] Cas Cremers and Sjouke Mauw. Operational semantics and verification of security protocols. Springer, 2012. [8] Anupam Datta, Ante Derek, John C

  14. Using concurrent think-aloud and protocol analysis to explore student nurses' social learning information communication technology knowledge and skill development.

    Science.gov (United States)

    Todhunter, Fern

    2015-06-01

    Observations obtained through concurrent think-aloud and protocol analysis offer new understanding about the influence of social learning on student nurses' acquisition of Information and Communication Technology (ICT) knowledge and skills. The software used provides a permanent record of the underpinning study method, events and analyses. The emerging themes reflect the dimensions of social engagement, and the characteristics of positive and negative reactions to ICT. The evidence shows that given the right conditions, stronger learners will support and guide their peers. To explore the use of concurrent think-aloud and protocol analysis as a method to examine how student nurses approach ICT. To identify the benefits and challenges of using observational technology to capture learning behaviours. To show the influence of small group arrangement and student interactions on their ICT knowledge and skills development. Previous studies examining social interaction between students show how they work together and respond to interactive problem solving. Social interaction has been shown to enhance skills in both ICT and collaborative decision making. Structured observational analysis using concurrent think-aloud and protocol analysis. Students displayed varying degrees of pastoral support and emotional need, leadership, reflection, suggestion and experimentation skills. Encouraging student nurses to work in small mixed ability groups can be conducive for social and ICT skill and knowledge development. Observational software gives a permanent record of the proceedings. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  16. Quantitative assessment of in-solution digestion efficiency identifies optimal protocols for unbiased protein analysis

    DEFF Research Database (Denmark)

    Leon, Ileana R; Schwämmle, Veit; Jensen, Ole N

    2013-01-01

    a combination of qualitative and quantitative LC-MS/MS methods and statistical data analysis. In contrast to previous studies we employed both standard qualitative as well as data-independent quantitative workflows to systematically assess trypsin digestion efficiency and bias using mitochondrial protein...... conditions (buffer, RapiGest, deoxycholate, urea), and two methods for removal of detergents prior to analysis of peptides (acid precipitation or phase separation with ethyl acetate). Our data-independent quantitative LC-MS/MS workflow quantified over 3700 distinct peptides with 96% completeness between all...... protocols and replicates, with an average 40% protein sequence coverage and an average of 11 peptides identified per protein. Systematic quantitative and statistical analysis of physicochemical parameters demonstrated that deoxycholate-assisted in-solution digestion combined with phase transfer allows...

  17. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  18. Statistical analysis of COMPTEL maximum likelihood-ratio distributions: evidence for a signal from previously undetected AGN

    International Nuclear Information System (INIS)

    Williams, O. R.; Bennett, K.; Much, R.; Schoenfelder, V.; Blom, J. J.; Ryan, J.

    1997-01-01

    The maximum likelihood-ratio method is frequently used in COMPTEL analysis to determine the significance of a point source at a given location. In this paper we do not consider whether the likelihood-ratio at a particular location indicates a detection, but rather whether distributions of likelihood-ratios derived from many locations depart from that expected for source free data. We have constructed distributions of likelihood-ratios by reading values from standard COMPTEL maximum-likelihood ratio maps at positions corresponding to the locations of different categories of AGN. Distributions derived from the locations of Seyfert galaxies are indistinguishable, according to a Kolmogorov-Smirnov test, from those obtained from ''random'' locations, but differ slightly from those obtained from the locations of flat spectrum radio loud quasars, OVVs, and BL Lac objects. This difference is not due to known COMPTEL sources, since regions near these sources are excluded from the analysis. We suggest that it might arise from a number of sources with fluxes below the COMPTEL detection threshold

  19. Comprehensive protocol of traceability during IVF: the result of a multicentre failure mode and effect analysis.

    Science.gov (United States)

    Rienzi, L; Bariani, F; Dalla Zorza, M; Albani, E; Benini, F; Chamayou, S; Minasi, M G; Parmegiani, L; Restelli, L; Vizziello, G; Costa, A Nanni

    2017-08-01

    Can traceability of gametes and embryos be ensured during IVF? The use of a simple and comprehensive traceability system that includes the most susceptible phases during the IVF process minimizes the risk of mismatches. Mismatches in IVF are very rare but unfortunately possible with dramatic consequences for both patients and health care professionals. Traceability is thus a fundamental aspect of the treatment. A clear process of patient and cell identification involving witnessing protocols has to be in place in every unit. To identify potential failures in the traceability process and to develop strategies to mitigate the risk of mismatches, previously failure mode and effects analysis (FMEA) has been used effectively. The FMEA approach is however a subjective analysis, strictly related to specific protocols and thus the results are not always widely applicable. To reduce subjectivity and to obtain a widespread comprehensive protocol of traceability, a multicentre centrally coordinated FMEA was performed. Seven representative Italian centres (three public and four private) were selected. The study had a duration of 21 months (from April 2015 to December 2016) and was centrally coordinated by a team of experts: a risk analysis specialist, an expert embryologist and a specialist in human factor. Principal investigators of each centre were first instructed about proactive risk assessment and FMEA methodology. A multidisciplinary team to perform the FMEA analysis was then formed in each centre. After mapping the traceability process, each team identified the possible causes of mistakes in their protocol. A risk priority number (RPN) for each identified potential failure mode was calculated. The results of the FMEA analyses were centrally investigated and consistent corrective measures suggested. The teams performed new FMEA analyses after the recommended implementations. In each centre, this study involved: the laboratory director, the Quality Control & Quality

  20. Packet traffic features of IPv6 and IPv4 protocol traffic

    OpenAIRE

    ÇİFLİKLİ, Cebrail; GEZER, Ali; ÖZŞAHİN, Abdullah Tuncay

    2012-01-01

    Nowadays, the IPv6 protocol is in a transition phase in operational networks. The ratio of its traffic volume is increasing day by day. The many provided facilities for IPv6 connection increasethe total IPv6 traffic load. IPv6-over-IPv4 tunnels, pilot programsto provide IPv6 connections, IPv6/IPv4 dual stack operating systems,and free IPv6 tunnel brokers cause the IPv6 protocol to expand quickly. For efficient resource utilization, the characteristics of network traffic should be determ...

  1. Steroid isotopic standards for gas chromatography-combustion isotope ratio mass spectrometry (GCC-IRMS).

    Science.gov (United States)

    Zhang, Ying; Tobias, Herbert J; Brenna, J Thomas

    2009-03-01

    Carbon isotope ratio (CIR) analysis of urinary steroids using gas chromatography-combustion isotope ratio mass spectrometry (GCC-IRMS) is a recognized test to detect illicit doping with synthetic testosterone. There are currently no universally used steroid isotopic standards (SIS). We adapted a protocol to prepare isotopically uniform steroids for use as a calibrant in GCC-IRMS that can be analyzed under the same conditions as used for steroids extracted from urine. Two separate SIS containing a mixture of steroids were created and coded CU/USADA 33-1 and CU/USADA 34-1, containing acetates and native steroids, respectively. CU/USADA 33-1 contains 5alpha-androstan-3beta-ol acetate (5alpha-A-AC), 5alpha-androstan-3alpha-ol-17-one acetate (androsterone acetate, A-AC), 5beta-androstan-3alpha-ol-11, 17-dione acetate (11-ketoetiocholanolone acetate, 11k-AC) and 5alpha-cholestane (Cne). CU/USADA 34-1 contains 5beta-androstan-3alpha-ol-17-one (etiocholanolone, E), 5alpha-androstan-3alpha-ol-17-one (androsterone, A), and 5beta-pregnane-3alpha, 20alpha-diol (5betaP). Each mixture was prepared and dispensed into a set of about 100 ampoules using a protocol carefully designed to minimize isotopic fractionation and contamination. A natural gas reference material, NIST RM 8559, traceable to the international standard Vienna PeeDee Belemnite (VPDB) was used to calibrate the SIS. Absolute delta(13)C(VPDB) and Deltadelta(13)C(VPDB) values from randomly selected ampoules from both SIS indicate uniformity of steroid isotopic composition within measurement reproducibility, SD(delta(13)C)<0.2 per thousand. This procedure for creation of isotopic steroid mixtures results in consistent standards with isotope ratios traceable to the relevant international reference material.

  2. Successful implementation of a perioperative glycemic control protocol in cardiac surgery: barrier analysis and intervention using lean six sigma.

    Science.gov (United States)

    Martinez, Elizabeth A; Chavez-Valdez, Raul; Holt, Natalie F; Grogan, Kelly L; Khalifeh, Katherine W; Slater, Tammy; Winner, Laura E; Moyer, Jennifer; Lehmann, Christoph U

    2011-01-01

    Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU) in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period.

  3. Successful Implementation of a Perioperative Glycemic Control Protocol in Cardiac Surgery: Barrier Analysis and Intervention Using Lean Six Sigma

    Science.gov (United States)

    Martinez, Elizabeth A.; Chavez-Valdez, Raul; Holt, Natalie F.; Grogan, Kelly L.; Khalifeh, Katherine W.; Slater, Tammy; Winner, Laura E.; Moyer, Jennifer; Lehmann, Christoph U.

    2011-01-01

    Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU) in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period. PMID:22091218

  4. Successful Implementation of a Perioperative Glycemic Control Protocol in Cardiac Surgery: Barrier Analysis and Intervention Using Lean Six Sigma

    Directory of Open Access Journals (Sweden)

    Elizabeth A. Martinez

    2011-01-01

    Full Text Available Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period.

  5. Neutron activation analysis of calcium/phosphorus ratio in rib bone of healthy humans

    International Nuclear Information System (INIS)

    Tzaphlidou, Margaret; Zaichick, Vladimir

    2002-01-01

    The Ca/P ratio was estimated in intact rib bone samples from healthy humans, 37 women and 45 men, aged from 15 to 55 years using instrumental neutron activation analysis. No statistically significant differences (p>0.05) age- or sex-related differences in the Ca/P ratio were observed. The mean value (M±SD) for the investigated parameter for the whole group studied, 2.33±0.34, was within a very wide range of published data and close to the median value

  6. Regional analysis of the magnetization transfer ratio of the brain in mild Alzheimer disease and amnestic mild cognitive impairment.

    Science.gov (United States)

    Mascalchi, M; Ginestroni, A; Bessi, V; Toschi, N; Padiglioni, S; Ciulli, S; Tessa, C; Giannelli, M; Bracco, L; Diciotti, S

    2013-01-01

    Manually drawn VOI-based analysis shows a decrease in magnetization transfer ratio in the hippocampus of patients with Alzheimer disease. We investigated with whole-brain voxelwise analysis the regional changes of the magnetization transfer ratio in patients with mild Alzheimer disease and patients with amnestic mild cognitive impairment. Twenty patients with mild Alzheimer disease, 27 patients with amnestic mild cognitive impairment, and 30 healthy elderly control subjects were examined with high-resolution T1WI and 3-mm-thick magnetization transfer images. Whole-brain voxelwise analysis of magnetization transfer ratio maps was performed by use of Statistical Parametric Mapping 8 software and was supplemented by the analysis of the magnetization transfer ratio in FreeSurfer parcellation-derived VOIs. Voxelwise analysis showed 2 clusters of significantly decreased magnetization transfer ratio in the left hippocampus and amygdala and in the left posterior mesial temporal cortex (fusiform gyrus) of patients with Alzheimer disease as compared with control subjects but no difference between patients with amnestic mild cognitive impairment and either patients with Alzheimer disease or control subjects. VOI analysis showed that the magnetization transfer ratio in the hippocampus and amygdala was significantly lower (bilaterally) in patients with Alzheimer disease when compared with control subjects (ANOVA with Bonferroni correction, at P ratio values in the hippocampus and amygdala in patients with amnestic mild cognitive impairment were between those of healthy control subjects and those of patients with mild Alzheimer disease. Support vector machine-based classification demonstrated improved classification performance after inclusion of magnetization transfer ratio-related features, especially between patients with Alzheimer disease versus healthy subjects. Bilateral but asymmetric decrease of magnetization transfer ratio reflecting microstructural changes of the

  7. Effect of tranexamic acid on coagulation and fibrinolysis in women with postpartum haemorrhage (WOMAN-ETAC): protocol and statistical analysis plan for a randomized controlled trial.

    Science.gov (United States)

    Shakur, Haleema; Fawole, Bukola; Kuti, Modupe; Olayemi, Oladapo; Bello, Adenike; Ogunbode, Olayinka; Kotila, Taiwo; Aimakhu, Chris O; Huque, Sumaya; Gregg, Meghann; Roberts, Ian

    2016-12-16

    Background : Postpartum haemorrhage (PPH) is a leading cause of maternal death. Tranexamic acid has the potential to reduce bleeding and a large randomized controlled trial of its effect on maternal health outcomes in women with PPH (The WOMAN trial) is ongoing. We will examine the effect of tranexamic acid on fibrinolysis and coagulation in a subset of WOMAN trial participants. Methods . Adult women with clinically diagnosed primary PPH after vaginal or caesarean delivery are eligible for inclusion in the WOMAN trial. In a sub-group of trial participants, blood samples will be collected at baseline and 30 minutes after the first dose of tranexamic acid or matching placebo.  Our primary objective is to evaluate the effect of tranexamic acid on fibrinolysis. Fibrinolysis will be assessed by measuring D-dimers and by rotational thromboelastometry (ROTEM). Secondary outcomes are international normalized ratio (INR), prothrombin time (PT), activated partial thromboplastin time (APTT), fibrinogen, haemoglobin and platelets. We aim to include about 180 women from the University College Hospital, Ibadan in Nigeria. Discussion:  This sub-study of WOMAN trial participants should provide information on the mechanism of action of tranexamic acid in women with postpartum haemorrhage. We present the trial protocol and statistical analysis plan. The trial protocol was registered prior to the start of patient recruitment. The statistical analysis plan was completed before un-blinding. Trial registration: The trial was registered: ClinicalTrials.gov, Identifier NCT00872469 https://clinicaltrials.gov/ct2/show/NCT00872469; ISRCTN registry, Identifier ISRCTN76912190 http://www.isrctn.com/ISRCTN76912190 (Registration date: 22/03/2012).

  8. Corporate prediction models, ratios or regression analysis?

    NARCIS (Netherlands)

    Bijnen, E.J.; Wijn, M.F.C.M.

    1994-01-01

    The models developed in the literature with respect to the prediction of a company s failure are based on ratios. It has been shown before that these models should be rejected on theoretical grounds. Our study of industrial companies in the Netherlands shows that the ratios which are used in

  9. A Concise Protocol for the Validation of Language ENvironment Analysis (LENA) Conversational Turn Counts in Vietnamese

    Science.gov (United States)

    Ganek, Hillary V.; Eriks-Brophy, Alice

    2018-01-01

    The aim of this study was to present a protocol for the validation of the Language ENvironment Analysis (LENA) System's conversational turn count (CTC) for Vietnamese speakers. Ten families of children aged between 22 and 42 months, recruited near Ho Chi Minh City, participated in this project. Each child wore the LENA audio recorder for a full…

  10. Control of size and aspect ratio in hydroquinone-based synthesis of gold nanorods

    Energy Technology Data Exchange (ETDEWEB)

    Morasso, Carlo, E-mail: cmorasso@dongnocchi.it; Picciolini, Silvia; Schiumarini, Domitilla [Fondazione Don Carlo Gnocchi ONLUS, Laboratory of Nanomedicine and Clinical Biophotonics (LABION) (Italy); Mehn, Dora; Ojea-Jiménez, Isaac [European Commission Joint Research Centre, Institute for Health and Consumer Protection (IHCP) (Italy); Zanchetta, Giuliano [Universitá degli Studi di Milano, Dipartimento di Biotecnologie Mediche e Medicina Traslazionale (Italy); Vanna, Renzo; Bedoni, Marzia [Fondazione Don Carlo Gnocchi ONLUS, Laboratory of Nanomedicine and Clinical Biophotonics (LABION) (Italy); Prosperi, Davide [Università degli Studi di Milano Bicocca, NanoBioLab, Dipartimento di Biotecnologie e Bioscienze (Italy); Gramatica, Furio [Fondazione Don Carlo Gnocchi ONLUS, Laboratory of Nanomedicine and Clinical Biophotonics (LABION) (Italy)

    2015-08-15

    In this article, we describe how it is possible to tune the size and the aspect ratio of gold nanorods obtained using a highly efficient protocol based on the use of hydroquinone as a reducing agent by varying the amounts of CTAB and silver ions present in the “seed-growth” solution. Our approach not only allows us to prepare nanorods with a four times increased Au{sup 3+} reduction yield, when compared with the commonly used protocol based on ascorbic acid, but also allows a remarkable reduction of 50–60 % of the amount of CTAB needed. In fact, according to our findings, the concentration of CTAB present in the seed-growth solution do not linearly influence the final aspect ratio of the obtained nanorods, and an optimal concentration range between 30 and 50 mM has been identified as the one that is able to generate particles with more elongated shapes. On the optimized protocol, the effect of the concentration of Ag{sup +} ions in the seed-growth solution and the stability of the obtained particles has also been investigated.

  11. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  12. PENGARUH PERUBAHAN RETURN ON ASSETS, PERUBAHAN DEBT TO EQUITY RATIO DAN PERUBAHAN CASH RATIO TERHADAP PERUBAHAN DIVIDEND PAYOUT RATIO

    Directory of Open Access Journals (Sweden)

    Yuli Soesetio

    2008-02-01

    Full Text Available Dividend Payout Ratio used to calculate all of revenue that will be accepted by stockholders as cash dividend, usually explained as percentage. This research was conducted to know several factors that affected change of Dividend Payout Ratio and to know the significance level and the correlation between dependent and independent variable. Analysis instrument used was parametric statistic. Based on the result of statistic test,  The Change of Return on Asset (X1, The Change of Debt to Equity Ratio (X2,  were able to explain dependent variable of the change Dividend Payout Ratio, and The Change of CashRatio can’t explain dependent variable of the change Dividend Payout Ratio

  13. Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P 2015 statement

    Directory of Open Access Journals (Sweden)

    Mireia Estarli

    2016-02-01

    Full Text Available Systematic reviews should build on a protocol that describes the rationale, hypothesis, and planned methods of the review; few reviews report whether a protocol exists. Detailed, well-described protocols can facilitate the understanding and appraisal of the review methods, as well as the detection of modifications to methods and selective reporting in completed reviews. We describe the development of a reporting guideline, the Preferred Reporting Items for Systematic reviews and Meta-Analyses for Protocols 2015 (PRISMA-P 2015. PRISMA-P consists of a 17-item checklist intended to facilitate the preparation and reporting of a robust protocol for the systematic review. Funders and those commissioning reviews might consider mandating the use of the checklist to facilitate the submission of relevant protocol information in funding applications. Similarly, peer reviewers and editors can use the guidance to gauge the completeness and transparency of a systematic review protocol submitted for publication in a journal or other medium. Translation with permission of the authors. The original authors have not revised and verified the Spanish translation, and they do not necessarily endorse it.

  14. Insect Venom Immunotherapy: Analysis of the Safety and Tolerance of 3 Buildup Protocols Frequently Used in Spain.

    Science.gov (United States)

    Gutiérrez Fernández, D; Moreno-Ancillo, A; Fernández Meléndez, S; Domínguez-Noche, C; Gálvez Ruiz, P; Alfaya Arias, T; Carballada González, F; Alonso Llamazares, A; Marques Amat, L; Vega Castro, A; Antolín Amérigo, D; Cruz Granados, S; Ruiz León, B; Sánchez Morillas, L; Fernández Sánchez, J; Soriano Gomis, V; Borja Segade, J; Dalmau Duch, G; Guspi Bori, R; Miranda Páez, A

    2016-01-01

    Hymenoptera venom immunotherapy (VIT) is an effective treatment but not one devoid of risk, as both local and systemic adverse reactions may occur, especially in the initial phases. We compared the tolerance to 3 VIT buildup protocols and analyzed risk factors associated with adverse reactions during this phase. We enrolled 165 patients divided into 3 groups based on the buildup protocol used (3, 4, and 9 weeks). The severity of systemic reactions was evaluated according to the World Allergy Organization model. Results were analyzed using exploratory descriptive statistics, and variables were compared using analysis of variance. Adverse reactions were recorded in 53 patients (32%) (43 local and 10 systemic). Local reactions were immediate in 27 patients (63%) and delayed in 16 (37%). The severity of the local reaction was slight/moderate in 15 patients and severe in 13. Systemic reactions were grade 1-2. No significant association was found between the treatment modality and the onset of local or systemic adverse reactions or the type of local reaction. We only found a statistically significant association between severity of the local reaction and female gender. As for the risk factors associated with systemic reactions during the buildup phase, we found no significant differences in values depending on the protocol used or the insect responsible. The buildup protocols compared proved to be safe and did not differ significantly from one another. In the population studied, patients undergoing the 9-week schedule presented no systemic reactions. Therefore, this protocol can be considered the safest approach.

  15. Establishing a protocol for element determination in human nail clippings by neutron activation analysis

    International Nuclear Information System (INIS)

    Sanches, Thalita Pinheiro; Saiki, Mitiko

    2011-01-01

    Human nail samples have been analyzed to evaluate occupational exposure, nutritional status and to diagnose certain diseases. However, sampling and washing protocols for nail analyses vary from study to study not allowing comparisons between studies. One of the difficulties in analyzing nail samples is to eliminate only surface contamination without removing elements of interest in this tissue. In the present study, a protocol was defined in order to obtain reliable results of element concentrations in human nail clippings. Nail clippings collected from all 10 fingers or toes were previously pre cleaned using an ethyl alcohol solution to eliminate microbes. Then, the clippings were cut in small pieces and submitted to different reagents for washing by shaking. Neutron activation analysis (NAA) was applied for nail samples analysis which consisted of irradiating aliquots of samples together with synthetic elemental standards in the IEA-R1 nuclear research reactor followed by gamma ray spectrometry. Comparisons made between the results obtained for nails submitted to different reagents for cleaning indicated that the procedure using acetone and Triton X100 solution is more effective than that of nitric acid solution. Analyses in triplicates of a nail sample indicated results with relative standard deviations lower than 15% for most of elements, showing the homogeneity of the prepared sample. Qualitative analyses of different nail polishes showed that the presence of elements determined in the present study is negligible in these products. Quality control of the analytical results indicated that the applied NAA procedure is adequate for human nail analysis. (author)

  16. A two-hop based adaptive routing protocol for real-time wireless sensor networks.

    Science.gov (United States)

    Rachamalla, Sandhya; Kancherla, Anitha Sheela

    2016-01-01

    One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.

  17. Recent advances in hopanoids analysis: Quantification protocols overview, main research targets and selected problems of complex data exploration.

    Science.gov (United States)

    Zarzycki, Paweł K; Portka, Joanna K

    2015-09-01

    Pentacyclic triterpenoids, particularly hopanoids, are organism-specific compounds and are generally considered as useful biomarkers that allow fingerprinting and classification of biological, environmental and geological samples. Simultaneous quantification of various hopanoids together with battery of related non-polar and low-molecular mass compounds may provide principal information for geochemical and environmental research focusing on both modern and ancient investigations. Target compounds can be derived from microbial biomass, water columns, sediments, coals, crude fossils or rocks. This create number of analytical problems due to different composition of the analytical matrix and interfering compounds and therefore, proper optimization of quantification protocols for such biomarkers is still the challenge. In this work we summarizing typical analytical protocols that were recently applied for quantification of hopanoids like compounds from different samples. Main steps including components of interest extraction, pre-purification, fractionation, derivatization and quantification involving gas (1D and 2D) as well as liquid separation techniques (liquid-liquid extraction, solid-phase extraction, planar and low resolution column chromatography, high-performance liquid chromatography) are described and discussed from practical point of view, mainly based on the experimental papers that were published within last two years, where significant increase in hopanoids research was noticed. The second aim of this review is to describe the latest research trends concerning determination of hopanoids and related low-molecular mass lipids analyzed in various samples including sediments, rocks, coals, crude oils and plant fossils as well as stromatolites and microbial biomass cultivated under different conditions. It has been found that majority of the most recent papers are based on uni- or bivariate approach for complex data analysis. Data interpretation involves

  18. Analysis of CBRP for UDP and TCP Traffic-Classes to measure throughput in MANETs

    Directory of Open Access Journals (Sweden)

    Hardeep Singh Rayait

    2013-01-01

    Full Text Available In this paper, we analyse the throughput of both TCP and UDP traffic classes for cluster based routing protocol for mobile ad hoc network. It uses clustering structure to improve throughput , decrease average end-to-end delay and improve the average packet delivery ratio. We simulate our routing protocol for nodes running the IEEE802.11 MAC for analysis of throughput for both UDP and TCP traffic classes. The application layer protocol used for UDP is CBR and for TCP is FTP.

  19. 15N/14N isotopic ratio and statistical analysis: an efficient way of linking seized Ecstasy tablets

    International Nuclear Information System (INIS)

    Palhol, Fabien; Lamoureux, Catherine; Chabrillat, Martine; Naulet, Norbert

    2004-01-01

    In this study, the 15 N/ 14 N isotopic ratios of 106 samples of 3,4-methylenedioxymethamphetamine (MDMA) extracted from Ecstasy tablets are presented. These ratios, measured using gas chromatography-combustion-isotope ratio mass spectrometry (GC-C-IRMS), show a large discrimination between samples with a range of δ 15 N values between -17 and +19%o, depending on the precursors and the method used in clandestine laboratories. Thus, δ 15 N values can be used in a statistical analysis carried out in order to link Ecstasy tablets prepared with the same precursors and synthetic pathway. The similarity index obtained after principal component analysis and hierarchical cluster analysis appears to be an efficient way to group tablets seized in different places

  20. Split bolus technique in polytrauma: a prospective study on scan protocols for trauma analysis

    NARCIS (Netherlands)

    Beenen, Ludo F. M.; Sierink, Joanne C.; Kolkman, Saskia; Nio, C. Yung; Saltzherr, Teun Peter; Dijkgraaf, Marcel G. W.; Goslings, J. Carel

    2015-01-01

    For the evaluation of severely injured trauma patients a variety of total body computed tomography (CT) scanning protocols exist. Frequently multiple pass protocols are used. A split bolus contrast protocol can reduce the number of passes through the body, and thereby radiation exposure, in this

  1. [Paternal exposure to occupational electromagnetic radiation and sex ratio of the offspring: a meta-analysis].

    Science.gov (United States)

    Tong, Shu-Hui; Liu, Yi-Ting; Liu, Yang

    2013-02-01

    To investigate the association between paternal exposure to occupational electromagnetic radiation and the sex ratio of the offspring. We searched various databases, including PubMed, Embase, Cochrane Library, OVID, Bioscience Information Service (BIOSIS), China National Knowledge Infrastructure, VIP Database for Chinese Technical Periodicals and Wanfang Database, for the literature relevant to the association of paternal exposure to occupational electromagnetic radiation with the sex ratio of the offspring. We conducted a meta-analysis on their correlation using Stata 11.0. There was no statistically significant difference in the sex ratio between the offspring with paternal exposure to occupational electromagnetic radiation and those without (pooled OR = 1.00 [95% CI: 0.95 -1.05], P = 0.875). Subgroup analysis of both case-control and cohort studies revealed no significant difference (pooled OR = 1.03 [95% CI: 0.99 -1.08], P = 0.104 and pooled OR = 0.98 [95% CI: 0.99 -1.08], P = 0.186, respectively). Paternal exposure to occupational electromagnetic radiation is not correlated with the sex ratio of the offspring.

  2. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation. Revised

    Science.gov (United States)

    Fargion, Giulietta S.; Mueller, James L.

    2000-01-01

    The document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparison and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. This document supersedes the earlier version (Mueller and Austin 1995) published as Volume 25 in the SeaWiFS Technical Report Series. This document marks a significant departure from, and improvement on, theformat and content of Mueller and Austin (1995). The authorship of the protocols has been greatly broadened to include experts specializing in some key areas. New chapters have been added to provide detailed and comprehensive protocols for stability monitoring of radiometers using portable sources, abovewater measurements of remote-sensing reflectance, spectral absorption measurements for discrete water samples, HPLC pigment analysis and fluorometric pigment analysis. Protocols were included in Mueller and Austin (1995) for each of these areas, but the new treatment makes significant advances in each topic area. There are also new chapters prescribing protocols for calibration of sun photometers and sky radiance sensors, sun photometer and sky radiance measurements and analysis, and data archival. These topic areas were barely mentioned in Mueller and Austin (1995).

  3. Analysis of Large-Strain Extrusion Machining with Different Chip Compression Ratios

    Directory of Open Access Journals (Sweden)

    Wen Jun Deng

    2012-01-01

    Full Text Available Large-Strain Extrusion Machining (LSEM is a novel-introduced process for deforming materials to very high plastic strains to produce ultra-fine nanostructured materials. Before the technique can be exploited, it is important to understand the deformation behavior of the workpiece and its relationship to the machining parameters and friction conditions. This paper reports finite-element method (FEM analysis of the LSEM process to understand the evolution of temperature field, effective strain, and strain rate under different chip compression ratios. The cutting and thrust forces are also analyzed with respect to time. The results show that LSEM can produce very high strains by changing in the value of chip compression ratio, thereby enabling the production of nanostructured materials. The shape of the chip produced by LSEM can also be geometrically well constrained.

  4. Establishment of a protocol for the gene expression analysis of laser microdissected rat kidney samples with affymetrix genechips

    International Nuclear Information System (INIS)

    Stemmer, Kerstin; Ellinger-Ziegelbauer, Heidrun; Lotz, Kerstin; Ahr, Hans-J.; Dietrich, Daniel R.

    2006-01-01

    Laser microdissection in conjunction with microarray technology allows selective isolation and analysis of specific cell populations, e.g., preneoplastic renal lesions. To date, only limited information is available on sample preparation and preservation techniques that result in both optimal histomorphological preservation of sections and high-quality RNA for microarray analysis. Furthermore, amplification of minute amounts of RNA from microdissected renal samples allowing analysis with genechips has only scantily been addressed to date. The objective of this study was therefore to establish a reliable and reproducible protocol for laser microdissection in conjunction with microarray technology using kidney tissue from Eker rats p.o. treated for 7 days and 6 months with 10 and 1 mg Aristolochic acid/kg bw, respectively. Kidney tissues were preserved in RNAlater or snap frozen. Cryosections were cut and stained with either H and E or cresyl violet for subsequent morphological and RNA quality assessment and laser microdissection. RNA quality was comparable in snap frozen and RNAlater-preserved samples, however, the histomorphological preservation of renal sections was much better following cryopreservation. Moreover, the different staining techniques in combination with sample processing time at room temperature can have an influence on RNA quality. Different RNA amplification protocols were shown to have an impact on gene expression profiles as demonstrated with Affymetrix Rat Genome 230 2 .0 arrays. Considering all the parameters analyzed in this study, a protocol for RNA isolation from laser microdissected samples with subsequent Affymetrix chip hybridization was established that was also successfully applied to preneoplastic lesions laser microdissected from Aristolochic acid-treated rats

  5. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  6. Colloid normalizes resuscitation ratio in pediatric burns.

    Science.gov (United States)

    Faraklas, Iris; Lam, Uyen; Cochran, Amalia; Stoddard, Gregory; Saffle, Jeffrey

    2011-01-01

    Fluid resuscitation of burned children is challenging because of their small size and intolerance to over- or underresuscitation. Our American Burn Association-verified regional burn center has used colloid "rescue" as part of our pediatric resuscitation protocol. With Institutional Review Board approval, the authors reviewed children with ≥15% TBSA burns admitted from January 1, 2004, to May 1, 2009. Resuscitation was based on the Parkland formula, which was adjusted to maintain urine output. Patients requiring progressive increases in crystalloid were placed on a colloid protocol. Results were expressed as an hourly resuscitation ratio (I/O ratio) of fluid infusion (ml/kg/%TBSA/hr) to urine output (ml/kg/hr). We reviewed 53 patients; 29 completed resuscitation using crystalloid alone (lactated Ringer's solution [LR]), and 24 received colloid supplementation albumin (ALB). Groups were comparable in age, gender, weight, and time from injury to admission. ALB patients had more inhalation injuries and larger total and full-thickness burns. LR patients maintained a median I/O of 0.17 (range, 0.08-0.31), whereas ALB patients demonstrated escalating ratios until the institution of albumin produced a precipitous return of I/O comparable with that of the LR group. Hospital stay was lower for LR patients than ALB patients (0.59 vs 1.06 days/%TBSA, P = .033). Twelve patients required extremity or torso escharotomy, but this did not differ between groups. There were no decompressive laparotomies. The median resuscitation volume for ALB group was greater than LR group (9.7 vs 6.2 ml/kg/%TBSA, P = .004). Measuring hourly I/O is a helpful means of evaluating fluid demands during burn shock resuscitation. The addition of colloid restores normal I/O in pediatric patients.

  7. Analysis on burnup step effect for evaluating reactor criticality and fuel breeding ratio

    International Nuclear Information System (INIS)

    Saputra, Geby; Purnama, Aditya Rizki; Permana, Sidik; Suzuki, Mitsutoshi

    2014-01-01

    Criticality condition of the reactors is one of the important factors for evaluating reactor operation and nuclear fuel breeding ratio is another factor to show nuclear fuel sustainability. This study analyzes the effect of burnup steps and cycle operation step for evaluating the criticality condition of the reactor as well as the performance of nuclear fuel breeding or breeding ratio (BR). Burnup step is performed based on a day step analysis which is varied from 10 days up to 800 days and for cycle operation from 1 cycle up to 8 cycles reactor operations. In addition, calculation efficiency based on the variation of computer processors to run the analysis in term of time (time efficiency in the calculation) have been also investigated. Optimization method for reactor design analysis which is used a large fast breeder reactor type as a reference case was performed by adopting an established reactor design code of JOINT-FR. The results show a criticality condition becomes higher for smaller burnup step (day) and for breeding ratio becomes less for smaller burnup step (day). Some nuclides contribute to make better criticality when smaller burnup step due to individul nuclide half-live. Calculation time for different burnup step shows a correlation with the time consuming requirement for more details step calculation, although the consuming time is not directly equivalent with the how many time the burnup time step is divided

  8. Magnetic resonance imaging protocols for examination of the neurocranium at 3 T.

    Science.gov (United States)

    Schwindt, W; Kugel, H; Bachmann, R; Kloska, S; Allkemper, T; Maintz, D; Pfleiderer, B; Tombach, B; Heindel, W

    2003-09-01

    The increasing availability of high-field (3 T) MR scanners requires adapting and optimizing clinical imaging protocols to exploit the theoretically higher signal-to-noise ratio (SNR) of the higher field strength. Our aim was to establish reliable and stable protocols meeting the clinical demands for imaging the neurocranium at 3 T. Two hundred patients with a broad range of indications received an examination of the neurocranium with an appropriate assortment of imaging techniques at 3 T. Several imaging parameters were optimized. Keeping scan times comparable to those at 1.5 T we increased spatial resolution. Contrast-enhanced and non-enhanced T1-weighted imaging was best applying gradient-echo and inversion recovery (rather than spin-echo) techniques, respectively. For fluid-attenuated inversion recovery (FLAIR) imaging a TE of 120 ms yielded optimum contrast-to-noise ratio (CNR). High-resolution isotropic 3D data sets were acquired within reasonable scan times. Some artifacts were pronounced, but generally imaging profited from the higher SNR. We present a set of optimized examination protocols for neuroimaging at 3 T, which proved to be reliable in a clinical routine setting.

  9. Magnetic resonance imaging protocols for examination of the neurocranium at 3 T

    Energy Technology Data Exchange (ETDEWEB)

    Schwindt, W.; Kugel, H.; Bachmann, R.; Kloska, S.; Allkemper, T.; Maintz, D.; Pfleiderer, B.; Tombach, B.; Heindel, W. [Institut fuer Klinische Radiologie, Universitaetsklinikum Muenster, Albert-Schweitzer-Strasse 33, 48129, Muenster (Germany)

    2003-09-01

    The increasing availability of high-field (3 T) MR scanners requires adapting and optimizing clinical imaging protocols to exploit the theoretically higher signal-to-noise ratio (SNR) of the higher field strength. Our aim was to establish reliable and stable protocols meeting the clinical demands for imaging the neurocranium at 3 T. Two hundred patients with a broad range of indications received an examination of the neurocranium with an appropriate assortment of imaging techniques at 3 T. Several imaging parameters were optimized. Keeping scan times comparable to those at 1.5 T we increased spatial resolution. Contrast-enhanced and non-enhanced T1-weighted imaging was best applying gradient-echo and inversion recovery (rather than spin-echo) techniques, respectively. For fluid-attenuated inversion recovery (FLAIR) imaging a TE of 120 ms yielded optimum contrast-to-noise ratio (CNR). High-resolution isotropic 3D data sets were acquired within reasonable scan times. Some artifacts were pronounced, but generally imaging profited from the higher SNR. We present a set of optimized examination protocols for neuroimaging at 3 T, which proved to be reliable in a clinical routine setting. (orig.)

  10. Magnetic resonance imaging protocols for examination of the neurocranium at 3 T

    International Nuclear Information System (INIS)

    Schwindt, W.; Kugel, H.; Bachmann, R.; Kloska, S.; Allkemper, T.; Maintz, D.; Pfleiderer, B.; Tombach, B.; Heindel, W.

    2003-01-01

    The increasing availability of high-field (3 T) MR scanners requires adapting and optimizing clinical imaging protocols to exploit the theoretically higher signal-to-noise ratio (SNR) of the higher field strength. Our aim was to establish reliable and stable protocols meeting the clinical demands for imaging the neurocranium at 3 T. Two hundred patients with a broad range of indications received an examination of the neurocranium with an appropriate assortment of imaging techniques at 3 T. Several imaging parameters were optimized. Keeping scan times comparable to those at 1.5 T we increased spatial resolution. Contrast-enhanced and non-enhanced T1-weighted imaging was best applying gradient-echo and inversion recovery (rather than spin-echo) techniques, respectively. For fluid-attenuated inversion recovery (FLAIR) imaging a TE of 120 ms yielded optimum contrast-to-noise ratio (CNR). High-resolution isotropic 3D data sets were acquired within reasonable scan times. Some artifacts were pronounced, but generally imaging profited from the higher SNR. We present a set of optimized examination protocols for neuroimaging at 3 T, which proved to be reliable in a clinical routine setting. (orig.)

  11. Influence of Anterior Cruciate Ligament Tear on Thigh Muscle Strength and Hamstring-to-Quadriceps Ratio: A Meta-Analysis

    Science.gov (United States)

    Ahn, Sung-Eun; Park, Min-Ji; Lee, Dae-Hee

    2016-01-01

    Theoretical compensation after anterior cruciate ligament (ACL) tear could cause quadriceps weakness and hamstring activation, preventing anterior tibial subluxation and affecting the expected hamstring-to-quadriceps ratio. Although quadriceps weakness often occurs after ACL tears, it remains unclear whether hamstring strength and hamstring-to-quadriceps ratio increase in ACL deficient knees. This meta-analysis compared the isokinetic muscle strength of quadriceps and hamstring muscles, and the hamstring-to-quadriceps ratio, of the injured and injured limbs of patients with ACL tears. This meta-analysis included all studies comparing isokinetic thigh muscle strengths and hamstring-to-quadriceps ratio in the injured and uninjured legs of patients with ACL tear, without or before surgery. Thirteen studies were included in the meta-analysis. Quadriceps and hamstring strengths were 22.3 N∙m (95% CI: 15.2 to 29.3 N∙m; Phamstring-to-quadriceps ratio was 4% greater in ACL deficient than in uninjured limbs (95% CI: 1.7% to 6.3%; Phamstring muscles of patients with ACL tear, with the decrease in quadriceps strength being 3-fold greater. These uneven reductions slightly increase the hamstring-to-quadriceps ratio in ACL deficient knees. PMID:26745808

  12. Ultralow dose dentomaxillofacial CT imaging and iterative reconstruction techniques: variability of Hounsfield units and contrast-to-noise ratio

    Science.gov (United States)

    Bischel, Alexander; Stratis, Andreas; Kakar, Apoorv; Bosmans, Hilde; Jacobs, Reinhilde; Gassner, Eva-Maria; Puelacher, Wolfgang; Pauwels, Ruben

    2016-01-01

    Objective: The aim of this study was to evaluate whether application of ultralow dose protocols and iterative reconstruction technology (IRT) influence quantitative Hounsfield units (HUs) and contrast-to-noise ratio (CNR) in dentomaxillofacial CT imaging. Methods: A phantom with inserts of five types of materials was scanned using protocols for (a) a clinical reference for navigated surgery (CT dose index volume 36.58 mGy), (b) low-dose sinus imaging (18.28 mGy) and (c) four ultralow dose imaging (4.14, 2.63, 0.99 and 0.53 mGy). All images were reconstructed using: (i) filtered back projection (FBP); (ii) IRT: adaptive statistical iterative reconstruction-50 (ASIR-50), ASIR-100 and model-based iterative reconstruction (MBIR); and (iii) standard (std) and bone kernel. Mean HU, CNR and average HU error after recalibration were determined. Each combination of protocols was compared using Friedman analysis of variance, followed by Dunn's multiple comparison test. Results: Pearson's sample correlation coefficients were all >0.99. Ultralow dose protocols using FBP showed errors of up to 273 HU. Std kernels had less HU variability than bone kernels. MBIR reduced the error value for the lowest dose protocol to 138 HU and retained the highest relative CNR. ASIR could not demonstrate significant advantages over FBP. Conclusions: Considering a potential dose reduction as low as 1.5% of a std protocol, ultralow dose protocols and IRT should be further tested for clinical dentomaxillofacial CT imaging. Advances in knowledge: HU as a surrogate for bone density may vary significantly in CT ultralow dose imaging. However, use of std kernels and MBIR technology reduce HU error values and may retain the highest CNR. PMID:26859336

  13. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  14. [Quantitative Analysis of Heavy Metals in Water with LIBS Based on Signal-to-Background Ratio].

    Science.gov (United States)

    Hu, Li; Zhao, Nan-jing; Liu, Wen-qing; Fang, Li; Zhang, Da-hai; Wang, Yin; Meng, De Shuo; Yu, Yang; Ma, Ming-jun

    2015-07-01

    There are many influence factors in the precision and accuracy of the quantitative analysis with LIBS technology. According to approximately the same characteristics trend of background spectrum and characteristic spectrum along with the change of temperature through in-depth analysis, signal-to-background ratio (S/B) measurement and regression analysis could compensate the spectral line intensity changes caused by system parameters such as laser power, spectral efficiency of receiving. Because the measurement dates were limited and nonlinear, we used support vector machine (SVM) for regression algorithm. The experimental results showed that the method could improve the stability and the accuracy of quantitative analysis of LIBS, and the relative standard deviation and average relative error of test set respectively were 4.7% and 9.5%. Data fitting method based on signal-to-background ratio(S/B) is Less susceptible to matrix elements and background spectrum etc, and provides data processing reference for real-time online LIBS quantitative analysis technology.

  15. Likelihood ratio meta-analysis: New motivation and approach for an old method.

    Science.gov (United States)

    Dormuth, Colin R; Filion, Kristian B; Platt, Robert W

    2016-03-01

    A 95% confidence interval (CI) in an updated meta-analysis may not have the expected 95% coverage. If a meta-analysis is simply updated with additional data, then the resulting 95% CI will be wrong because it will not have accounted for the fact that the earlier meta-analysis failed or succeeded to exclude the null. This situation can be avoided by using the likelihood ratio (LR) as a measure of evidence that does not depend on type-1 error. We show how an LR-based approach, first advanced by Goodman, can be used in a meta-analysis to pool data from separate studies to quantitatively assess where the total evidence points. The method works by estimating the log-likelihood ratio (LogLR) function from each study. Those functions are then summed to obtain a combined function, which is then used to retrieve the total effect estimate, and a corresponding 'intrinsic' confidence interval. Using as illustrations the CAPRIE trial of clopidogrel versus aspirin in the prevention of ischemic events, and our own meta-analysis of higher potency statins and the risk of acute kidney injury, we show that the LR-based method yields the same point estimate as the traditional analysis, but with an intrinsic confidence interval that is appropriately wider than the traditional 95% CI. The LR-based method can be used to conduct both fixed effect and random effects meta-analyses, it can be applied to old and new meta-analyses alike, and results can be presented in a format that is familiar to a meta-analytic audience. Copyright © 2016 Elsevier Inc. All rights reserved.

  16. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Directory of Open Access Journals (Sweden)

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  17. Development of a Ground Test and Analysis Protocol for NASA's NextSTEP Phase 2 Habitation Concepts

    Science.gov (United States)

    Gernhardt, Michael L.; Beaton, Kara H.; Chappell, Steven P.; Bekdash, Omar S.; Abercromby, Andrew F. J.

    2018-01-01

    The NASA Next Space Technologies for Exploration Partnerships (NextSTEP) program is a public-private partnership model that seeks commercial development of deep space exploration capabilities to support human spaceflight missions around and beyond cislunar space. NASA first issued the Phase 1 NextSTEP Broad Agency Announcement to U.S. industries in 2014, which called for innovative cislunar habitation concepts that leveraged commercialization plans for low-Earth orbit. These habitats will be part of the Deep Space Gateway (DSG), the cislunar space station planned by NASA for construction in the 2020s. In 2016, Phase 2 of the NextSTEP program selected five commercial partners to develop ground prototypes. A team of NASA research engineers and subject matter experts (SMEs) have been tasked with developing the ground-test protocol that will serve as the primary means by which these Phase 2 prototypes will be evaluated. Since 2008, this core test team has successfully conducted multiple spaceflight analog mission evaluations utilizing a consistent set of operational tools, methods, and metrics to enable the iterative development, testing, analysis, and validation of evolving exploration architectures, operations concepts, and vehicle designs. The purpose of implementing a similar evaluation process for the Phase 2 Habitation Concepts is to consistently evaluate different commercial partner ground prototypes to provide data-driven, actionable recommendations for Phase 3. This paper describes the process by which the ground test protocol was developed and the objectives, methods, and metrics by which the NextSTEP Phase 2 Habitation Concepts will be rigorously and systematically evaluated. The protocol has been developed using both a top-down and bottom-up approach. Top-down development began with the Human Exploration and Operations Mission Directorate (HEOMD) exploration objectives and ISS Exploration Capability Study Team (IECST) candidate flight objectives. Strategic

  18. Effectiveness of a healthy lifestyle intervention for low back pain and osteoarthritis of the knee: protocol and statistical analysis plan for two randomised controlled trials

    Directory of Open Access Journals (Sweden)

    Kate M. O’Brien

    Full Text Available ABSTRACT Background These trials are the first randomised controlled trials of telephone-based weight management and healthy lifestyle interventions for low back pain and knee osteoarthritis. This article describes the protocol and statistical analysis plan. Method These trials are parallel randomised controlled trials that investigate and compare the effect of a telephone-based weight management and healthy lifestyle intervention for improving pain intensity in overweight or obese patients with low back pain or knee osteoarthritis. The analysis plan was finalised prior to initiation of analyses. All data collected as part of the trial were reviewed, without stratification by group, and classified by baseline characteristics, process of care and trial outcomes. Trial outcomes were classified as primary and secondary outcomes. Appropriate descriptive statistics and statistical testing of between-group differences, where relevant, have been planned and described. Conclusions A protocol for standard analyses was developed for the results of two randomised controlled trials. This protocol describes the data, and the pre-determined statistical tests of relevant outcome measures. The plan demonstrates transparent and verifiable use of the data collected. This a priori protocol will be followed to ensure rigorous standards of data analysis are strictly adhered to.

  19. Effectiveness of a healthy lifestyle intervention for low back pain and osteoarthritis of the knee: protocol and statistical analysis plan for two randomised controlled trials

    Science.gov (United States)

    O’Brien, Kate M.; Williams, Amanda; Wiggers, John; Wolfenden, Luke; Yoong, Serene; Campbell, Elizabeth; Kamper, Steven J.; McAuley, James; Attia, John; Oldmeadow, Chris; Williams, Christopher M.

    2016-01-01

    ABSTRACT Background These trials are the first randomised controlled trials of telephone-based weight management and healthy lifestyle interventions for low back pain and knee osteoarthritis. This article describes the protocol and statistical analysis plan. Method These trials are parallel randomised controlled trials that investigate and compare the effect of a telephone-based weight management and healthy lifestyle intervention for improving pain intensity in overweight or obese patients with low back pain or knee osteoarthritis. The analysis plan was finalised prior to initiation of analyses. All data collected as part of the trial were reviewed, without stratification by group, and classified by baseline characteristics, process of care and trial outcomes. Trial outcomes were classified as primary and secondary outcomes. Appropriate descriptive statistics and statistical testing of between-group differences, where relevant, have been planned and described. Conclusions A protocol for standard analyses was developed for the results of two randomised controlled trials. This protocol describes the data, and the pre-determined statistical tests of relevant outcome measures. The plan demonstrates transparent and verifiable use of the data collected. This a priori protocol will be followed to ensure rigorous standards of data analysis are strictly adhered to. PMID:27683839

  20. Analysis of the moderating ratio in BWR fuels

    International Nuclear Information System (INIS)

    Gomez, A.; Xolocostli, V.; Alonso, G.

    2001-01-01

    In all different light water nuclear reactors is very important the fuel assembly design. It has to be designed to achieve safety and efficiency performance in an economical way. The moderating ratio plays a very important role because an adequate election can provide an optimal energy production making the fuel assembly more efficient. This work analyze the moderation ratio as a function of the fuel assembly enrichment and ifs burnup, based on this study the optimal moderation ratio are obtained. Furthermore, based on numerical relations some simulation schemes are proposed to describe the behavior of the infinite multiplication factor as a function of the moderating ratio for a given fuel assembly enrichment at zero burnup. (Author)

  1. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  2. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  3. Time Series Analysis of Monte Carlo Fission Sources - I: Dominance Ratio Computation

    International Nuclear Information System (INIS)

    Ueki, Taro; Brown, Forrest B.; Parsons, D. Kent; Warsa, James S.

    2004-01-01

    In the nuclear engineering community, the error propagation of the Monte Carlo fission source distribution through cycles is known to be a linear Markov process when the number of histories per cycle is sufficiently large. In the statistics community, linear Markov processes with linear observation functions are known to have an autoregressive moving average (ARMA) representation of orders p and p - 1. Therefore, one can perform ARMA fitting of the binned Monte Carlo fission source in order to compute physical and statistical quantities relevant to nuclear criticality analysis. In this work, the ARMA fitting of a binary Monte Carlo fission source has been successfully developed as a method to compute the dominance ratio, i.e., the ratio of the second-largest to the largest eigenvalues. The method is free of binning mesh refinement and does not require the alteration of the basic source iteration cycle algorithm. Numerical results are presented for problems with one-group isotropic, two-group linearly anisotropic, and continuous-energy cross sections. Also, a strategy for the analysis of eigenmodes higher than the second-largest eigenvalue is demonstrated numerically

  4. Two-step estimation in ratio-of-mediator-probability weighted causal mediation analysis.

    Science.gov (United States)

    Bein, Edward; Deutsch, Jonah; Hong, Guanglei; Porter, Kristin E; Qin, Xu; Yang, Cheng

    2018-04-15

    This study investigates appropriate estimation of estimator variability in the context of causal mediation analysis that employs propensity score-based weighting. Such an analysis decomposes the total effect of a treatment on the outcome into an indirect effect transmitted through a focal mediator and a direct effect bypassing the mediator. Ratio-of-mediator-probability weighting estimates these causal effects by adjusting for the confounding impact of a large number of pretreatment covariates through propensity score-based weighting. In step 1, a propensity score model is estimated. In step 2, the causal effects of interest are estimated using weights derived from the prior step's regression coefficient estimates. Statistical inferences obtained from this 2-step estimation procedure are potentially problematic if the estimated standard errors of the causal effect estimates do not reflect the sampling uncertainty in the estimation of the weights. This study extends to ratio-of-mediator-probability weighting analysis a solution to the 2-step estimation problem by stacking the score functions from both steps. We derive the asymptotic variance-covariance matrix for the indirect effect and direct effect 2-step estimators, provide simulation results, and illustrate with an application study. Our simulation results indicate that the sampling uncertainty in the estimated weights should not be ignored. The standard error estimation using the stacking procedure offers a viable alternative to bootstrap standard error estimation. We discuss broad implications of this approach for causal analysis involving propensity score-based weighting. Copyright © 2018 John Wiley & Sons, Ltd.

  5. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  6. Atlas-based analysis of cardiac shape and function: correction of regional shape bias due to imaging protocol for population studies.

    Science.gov (United States)

    Medrano-Gracia, Pau; Cowan, Brett R; Bluemke, David A; Finn, J Paul; Kadish, Alan H; Lee, Daniel C; Lima, Joao A C; Suinesiaputra, Avan; Young, Alistair A

    2013-09-13

    Cardiovascular imaging studies generate a wealth of data which is typically used only for individual study endpoints. By pooling data from multiple sources, quantitative comparisons can be made of regional wall motion abnormalities between different cohorts, enabling reuse of valuable data. Atlas-based analysis provides precise quantification of shape and motion differences between disease groups and normal subjects. However, subtle shape differences may arise due to differences in imaging protocol between studies. A mathematical model describing regional wall motion and shape was used to establish a coordinate system registered to the cardiac anatomy. The atlas was applied to data contributed to the Cardiac Atlas Project from two independent studies which used different imaging protocols: steady state free precession (SSFP) and gradient recalled echo (GRE) cardiovascular magnetic resonance (CMR). Shape bias due to imaging protocol was corrected using an atlas-based transformation which was generated from a set of 46 volunteers who were imaged with both protocols. Shape bias between GRE and SSFP was regionally variable, and was effectively removed using the atlas-based transformation. Global mass and volume bias was also corrected by this method. Regional shape differences between cohorts were more statistically significant after removing regional artifacts due to imaging protocol bias. Bias arising from imaging protocol can be both global and regional in nature, and is effectively corrected using an atlas-based transformation, enabling direct comparison of regional wall motion abnormalities between cohorts acquired in separate studies.

  7. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  8. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  9. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  10. The Measurement of Fuel-Air Ratio by Analysis for the Oxidized Exhaust Gas

    Science.gov (United States)

    Gerrish, Harold C.; Meem, J. Lawrence, Jr.

    1943-01-01

    An investigation was made to determine a method of measuring fuel-air ratio that could be used for test purposes in flight and for checking conventional equipment in the laboratory. Two single-cylinder test engines equipped with typical commercial engine cylinders were used. The fuel-air ratio of the mixture delivered to the engines was determined by direct measurement of the quantity of air and of fuel supplied and also by analysis of the oxidized exhaust gas and of the normal exhaust gas. Five fuels were used: gasoline that complied with Army-Navy fuel Specification No. AN-VV-F-781 and four mixtures of this gasoline with toluene, benzene, and xylene. The method of determining the fuel-air ratio described in this report involves the measurement of the carbon-dioxide content of the oxidized exhaust gas and the use of graphs for the presented equation. This method is considered useful in aircraft, in the field, or in the laboratory for a range of fuel-air ratios from 0.047 to 0.124.

  11. The Measurement of Fuel-air Ratio by Analysis of the Oxidized Exhaust Gas

    Science.gov (United States)

    Memm, J. Lawrence, Jr.

    1943-01-01

    An investigation was made to determine a method of measuring fuel-air ratio that could be used for test purposes in flight and for checking conventional equipment in the laboratory. Two single-cylinder test engines equipped with typical commercial engine cylinders were used. The fuel-air ratio of the mixture delivered to the engines was determined by direct measurement of the quantity of air and of fuel supplied and also by analysis of the oxidized exhaust gas and of the normal exhaust gas. Five fuels were used: gasoline that complied with Army-Navy Fuel Specification, No. AN-VV-F-781 and four mixtures of this gasoline with toluene, benzene, and xylene. The method of determining the fuel-air ratio described in this report involves the measurement of the carbon-dioxide content of the oxidized exhaust gas and the use of graphs or the presented equation. This method is considered useful in aircraft, in the field, or in the laboratory for a range of fuel-air ratios from 0.047 to 0.124

  12. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  13. Traceability of synthetic drugs by position-specific deuterium isotope ratio analysis

    Energy Technology Data Exchange (ETDEWEB)

    Brenna, Elisabetta [Dipartimento di Chimica, Materiali e di Ingegneria Chimica del Politecnico di Milano and Istituto CNR per la Chimica del Riconoscimento Molecolare, Via Mancinelli 7, Milan I-20131 (Italy)], E-mail: elisabetta.brenna@polimi.it; Fronza, Giovanni [Dipartimento di Chimica, Materiali e di Ingegneria Chimica del Politecnico di Milano (Italy) and Instituto CNR per la Chimica del Riconoscimento Molecolare, Via Mancinelli 7, Milan I-20131 (Italy)], E-mail: giovanni.fronza@polimi.it; Fuganti, Claudio [Dipartimento di Chimica, Materiali e di Ingegneria Chimica del Politecnico di Milano (Italy) and Istituto CNR per la Chimica del Riconoscimento Molecolare, Via Mancinelli 7, Milan I-20131 (Italy)

    2007-10-10

    Samples of fluoxetine of different origin were submitted to natural abundance {sup 2}H NMR spectroscopy. The deuterium content at the various sites of the molecule was found to depend on its synthetic history. Hints on the synthetic procedure can be obtained by comparison with standard compounds, whose synthesis is known. These preliminary results give an idea of the potential of site-specific isotope ratio analysis in the fight against patent infringement and drug counterfeiting.

  14. Traceability of synthetic drugs by position-specific deuterium isotope ratio analysis

    International Nuclear Information System (INIS)

    Brenna, Elisabetta; Fronza, Giovanni; Fuganti, Claudio

    2007-01-01

    Samples of fluoxetine of different origin were submitted to natural abundance 2 H NMR spectroscopy. The deuterium content at the various sites of the molecule was found to depend on its synthetic history. Hints on the synthetic procedure can be obtained by comparison with standard compounds, whose synthesis is known. These preliminary results give an idea of the potential of site-specific isotope ratio analysis in the fight against patent infringement and drug counterfeiting

  15. Study protocol for examining job strain as a risk factor for severe unipolar depression in an individual participant meta-analysis of 14 European cohorts

    DEFF Research Database (Denmark)

    Madsen, Ida E H; Hannerz, Harald; Nyberg, Solja T

    2013-01-01

    scales that do not necessarily correspond to clinically diagnosed depression. In addition, a meta-analysis from 2008 indicated publication bias in the field. METHODS: This study protocol describes the planned design and analyses of an individual participant data meta-analysis, to examine whether job...... using random effects meta-analysis. DISCUSSION: The planned analyses will help clarify whether job strain is associated with an increased risk of clinically diagnosed unipolar depression. As the analysis is based on pre-planned study protocols and an individual participant data meta-analysis, the pooled......BACKGROUND: Previous studies have shown that gainfully employed individuals with high work demands and low control at work (denoted "job strain") are at increased risk of common mental disorders, including depression. Most existing studies have, however, measured depression using self-rated symptom...

  16. Quantitative effects of composting state variables on C/N ratio through GA-aided multivariate analysis

    International Nuclear Information System (INIS)

    Sun Wei; Huang, Guo H.; Zeng Guangming; Qin Xiaosheng; Yu Hui

    2011-01-01

    It is widely known that variation of the C/N ratio is dependent on many state variables during composting processes. This study attempted to develop a genetic algorithm aided stepwise cluster analysis (GASCA) method to describe the nonlinear relationships between the selected state variables and the C/N ratio in food waste composting. The experimental data from six bench-scale composting reactors were used to demonstrate the applicability of GASCA. Within the GASCA framework, GA searched optimal sets of both specified state variables and SCA's internal parameters; SCA established statistical nonlinear relationships between state variables and the C/N ratio; to avoid unnecessary and time-consuming calculation, a proxy table was introduced to save around 70% computational efforts. The obtained GASCA cluster trees had smaller sizes and higher prediction accuracy than the conventional SCA trees. Based on the optimal GASCA tree, the effects of the GA-selected state variables on the C/N ratio were ranged in a descending order as: NH 4 + -N concentration > Moisture content > Ash Content > Mean Temperature > Mesophilic bacteria biomass. Such a rank implied that the variation of ammonium nitrogen concentration, the associated temperature and the moisture conditions, the total loss of both organic matters and available mineral constituents, and the mesophilic bacteria activity, were critical factors affecting the C/N ratio during the investigated food waste composting. This first application of GASCA to composting modelling indicated that more direct search algorithms could be coupled with SCA or other multivariate analysis methods to analyze complicated relationships during composting and many other environmental processes. - Research Highlights: → A genetic algorithm aided stepwise cluster analysis method in food waste composting. → Nonlinear relationships between the selected state variables and the C/N ratio. → Introduced proxy tables save around 70% computational

  17. Quantitative effects of composting state variables on C/N ratio through GA-aided multivariate analysis

    Energy Technology Data Exchange (ETDEWEB)

    Sun Wei [Faculty of Engineering and Applied Science, University of Regina, Regina, Saskatchewan, S4S 0A2 (Canada); Huang, Guo H., E-mail: huangg@iseis.org [Faculty of Engineering and Applied Science, University of Regina, Regina, Saskatchewan, S4S 0A2 (Canada); MOE Key Laboratory of Regional Energy Systems Optimization, Sino-Canada Energy and Environmental Research Academy, North China Electric Power University, Beijing, 102206 (China); Zeng Guangming [MOE Key Laboratory of Environmental Biology and Pollution Control, College of Environmental Science and Engineering, Hunan University, Changsha, Hunan, 410082 (China); Qin Xiaosheng [School of Civil and Environmental Engineering, Nanyang Technological University, 50 Nanyang Avenue, Singapore 639798 (Singapore); Yu Hui [Faculty of Engineering and Applied Science, University of Regina, Regina, Saskatchewan, S4S 0A2 (Canada)

    2011-03-01

    It is widely known that variation of the C/N ratio is dependent on many state variables during composting processes. This study attempted to develop a genetic algorithm aided stepwise cluster analysis (GASCA) method to describe the nonlinear relationships between the selected state variables and the C/N ratio in food waste composting. The experimental data from six bench-scale composting reactors were used to demonstrate the applicability of GASCA. Within the GASCA framework, GA searched optimal sets of both specified state variables and SCA's internal parameters; SCA established statistical nonlinear relationships between state variables and the C/N ratio; to avoid unnecessary and time-consuming calculation, a proxy table was introduced to save around 70% computational efforts. The obtained GASCA cluster trees had smaller sizes and higher prediction accuracy than the conventional SCA trees. Based on the optimal GASCA tree, the effects of the GA-selected state variables on the C/N ratio were ranged in a descending order as: NH{sub 4}{sup +}-N concentration > Moisture content > Ash Content > Mean Temperature > Mesophilic bacteria biomass. Such a rank implied that the variation of ammonium nitrogen concentration, the associated temperature and the moisture conditions, the total loss of both organic matters and available mineral constituents, and the mesophilic bacteria activity, were critical factors affecting the C/N ratio during the investigated food waste composting. This first application of GASCA to composting modelling indicated that more direct search algorithms could be coupled with SCA or other multivariate analysis methods to analyze complicated relationships during composting and many other environmental processes. - Research Highlights: {yields} A genetic algorithm aided stepwise cluster analysis method in food waste composting. {yields} Nonlinear relationships between the selected state variables and the C/N ratio. {yields} Introduced proxy tables

  18. EVALUATION OF N-RATIO IN SELECTING PATIENTS FOR ADJUVANT CHEMORADIOTHERAPY AFTER D2-GASTRECTOMY

    Directory of Open Access Journals (Sweden)

    Wilson Luiz da COSTA JUNIOR

    2013-12-01

    Full Text Available Context Whether adjuvant chemoradiotherapy may contribute to improve survival outcomes after D2-gastrectomy remains controvertial. Objective To explore the clinical utility of N-Ratio in selecting gastric cancer patients for adjuvant chemoradiotherapy after D2-gastrectomy. Methods A retrospective cohort study was carried out on gastric cancer patients who underwent D2-gastrectomy alone or D2-gastrectomy plus adjuvant chemoradiotherapy (INT-0116 protocol at the Hospital A. C. Camargo from September 1998 to December 2008. Statistical analysis were performed using multiple conventional methods, such as c-statistic, adjusted Cox's regression and stratified survival analysis. Results Our analysis involved 128 patients. According to c-statistic, the N-Ratio (i.e., as a continuous variable presented “area under ROC curve” (AUC of 0.713, while the number of metastatic nodes presented AUC of 0.705. After categorization, the cut-offs provide by Marchet et al. displayed the highest discriminating power – AUC value of 0.702. This N-Ratio categorization was confirmed as an independent predictor of survival using multivariate analyses. There also was a trend of better survival by adding of adjuvant chemoradiotherapy only for patients with milder degrees of lymphatic spread – 5-year survival of 23.1% vs 66.9%, respectively (HR = 0.426, 95% CI 0.150–1.202; P = 0.092. Conclusions This study confirms the N-Ratio as a tool to improve the lymph node metastasis staging in gastric cancer and suggests the cut-offs provided by Marchet et al. as the best way for its categorization after a D2-gastrectomy. In these settings, the N-Ratio appears a useful tool to select patients for adjuvant chemoradiotherapy, and the benefit of adding this type of adjuvancy to D2-gastrectomy is suggested to be limited to patients with milder degrees of lymphatic spread (i.e., NR2, 10%–25%.

  19. Interactive verification of Markov chains: Two distributed protocol case studies

    Directory of Open Access Journals (Sweden)

    Johannes Hölzl

    2012-12-01

    Full Text Available Probabilistic model checkers like PRISM only check probabilistic systems of a fixed size. To guarantee the desired properties for an arbitrary size, mathematical analysis is necessary. We show for two case studies how this can be done in the interactive proof assistant Isabelle/HOL. The first case study is a detailed description of how we verified properties of the ZeroConf protocol, a decentral address allocation protocol. The second case study shows the more involved verification of anonymity properties of the Crowds protocol, an anonymizing protocol.

  20. Optimal Scanning Protocols for Dual-Energy CT Angiography in Peripheral Arterial Stents: An in Vitro Phantom Study

    Directory of Open Access Journals (Sweden)

    Abdulrahman Almutairi

    2015-05-01

    Full Text Available Objective: To identify the optimal dual-energy computed tomography (DECT scanning protocol for peripheral arterial stents while achieving a low radiation dose, while still maintaining diagnostic image quality, as determined by an in vitro phantom study. Methods: Dual-energy scans in monochromatic spectral imaging mode were performed on a peripheral arterial phantom with use of three gemstone spectral imaging (GSI protocols, three pitch values, and four kiloelectron volts (keV ranges. A total of 15 stents of different sizes, materials, and designs were deployed in the phantom. Image noise, the signal-to-noise ratio (SNR, different levels of adaptive statistical iterative reconstruction (ASIR, and the four levels of monochromatic energy for DECT imaging of peripheral arterial stents were measured and compared to determine the optimal protocols. Results: A total of 36 scans with 180 datasets were reconstructed from a combination of different protocols. There was a significant reduction of image noise with a higher SNR from monochromatic energy images between 65 and 70 keV in all investigated preset GSI protocols (p < 0.05. In addition, significant effects were found from the main effect analysis for these factors: GSI, pitch, and keV (p = 0.001. In contrast, there was significant interaction on the unstented area between GSI and ASIR (p = 0.015 and a very high significant difference between keV and ASIR (p < 0.001. A radiation dose reduction of 50% was achieved. Conclusions: The optimal scanning protocol and energy level in the phantom study were GSI-48, pitch value 0.984, and 65 keV, which resulted in lower image noise and a lower radiation dose, but with acceptable diagnostic images.

  1. Influence of Anterior Cruciate Ligament Tear on Thigh Muscle Strength and Hamstring-to-Quadriceps Ratio: A Meta-Analysis.

    Science.gov (United States)

    Kim, Hyun-Jung; Lee, Jin-Hyuck; Ahn, Sung-Eun; Park, Min-Ji; Lee, Dae-Hee

    2016-01-01

    Theoretical compensation after anterior cruciate ligament (ACL) tear could cause quadriceps weakness and hamstring activation, preventing anterior tibial subluxation and affecting the expected hamstring-to-quadriceps ratio. Although quadriceps weakness often occurs after ACL tears, it remains unclear whether hamstring strength and hamstring-to-quadriceps ratio increase in ACL deficient knees. This meta-analysis compared the isokinetic muscle strength of quadriceps and hamstring muscles, and the hamstring-to-quadriceps ratio, of the injured and injured limbs of patients with ACL tears. This meta-analysis included all studies comparing isokinetic thigh muscle strengths and hamstring-to-quadriceps ratio in the injured and uninjured legs of patients with ACL tear, without or before surgery. Thirteen studies were included in the meta-analysis. Quadriceps and hamstring strengths were 22.3 N∙m (95% CI: 15.2 to 29.3 N∙m; Pratio was 4% greater in ACL deficient than in uninjured limbs (95% CI: 1.7% to 6.3%; Pratio in ACL deficient knees.

  2. Green Pharmaceutical Analysis of Drugs Coformulated with Highly Different Concentrations Using Spiking and Manipulation of Their Ratio Spectra.

    Science.gov (United States)

    Ayoub, Bassam M

    2017-07-01

    Introducing green analysis to pharmaceutical products is considered a significant approach to preserving the environment. This method can be an environmentally friendly alternative to the existing methods, accompanied by a validated automated procedure for the analysis of a drug with the lowest possible number of samples. Different simple spectrophotometric methods were developed for the simultaneous determination of empagliflozin (EG) and metformin (MT) by manipulating their ratio spectra in their application on a recently approved pharmaceutical combination, Synjardy tablets. A spiking technique was used to increase the concentration of EG in samples prepared from the tablets to allow for the simultaneous determination of EG with MT without prior separation. Validation parameters according to International Conference on Harmonization guidelines were acceptable over a concentration range of 2-12 μg/mL for both drugs using derivative ratio and ratio subtraction coupled with extended ratio subtraction. The optimized methods were compared using one-way analysis of variance and proved to be suitable as ecofriendly approaches for industrial QC laboratories.

  3. Comparison of urine iodine/creatinine ratio between patients following stringent and less stringent low iodine diet for radioiodine remnant ablation of thyroid cancer

    International Nuclear Information System (INIS)

    Roh, Jee Ho; Kim, Byung Il; Ha, Ji Su; Chang, Sei Joong; Shin, Hye Young; Choi, Joon Hyuk; Kim, Do Min; Kim, Chong Soon

    2006-01-01

    A low iodine diet (LID) for 1 ∼ 2 weeks is recommended for patients who undergoing radioiodine remnant ablation. However, the LID educations for patients are different among centers because there is no concrete recommendation for protocol of LID. In this investigation, we compared two representative types of LID protocols performed in several centers in Korea using urine iodine to creatinine tatio (urine I/Cr). From 2006, April to June, patients referred to our center for radioiodine remnant ablation of thyroid cancer from several local hospitals which had different LID protocols were included. We divided into two groups, stringent LID for 1 week and less stringent LID for 2 weeks, then measured their urine I/Cr ratio with spot urine when patients were admitted to the hospital. Total 27 patients were included in this investigation (M:F = 1:26; 13 in one-week stringent LID; 14 in two-week less stringent LID). Average of urine I/Cr ratio was 127.87 ± 78.52 μ g/g in stringent LID for 1 week, and 289.75 ± 188.24 μ g/g in less stringent LID for 2 weeks. It was significantly lower in stringent LID for 1 week group (ρ = 0.008). The number of patients whose urine I/Cr ratios were below 100 μ g/g was 6 of 13 in stringent LID for 1 week group, and 3 of 14 in less stringent LID for 2 weeks group. Stringent LID for 1 week resulted in better urinary I/Cr ratio in our investigation compared with the other protocol. However it still resulted in plenty of inadequate range of I/Cr ratio, so more stringent protocol such as stringent LID for 2 weeks is expected more desirable

  4. Difference and ratio plots

    DEFF Research Database (Denmark)

    Svendsen, Anders Jørgen; Holmskov, U; Bro, Peter

    1995-01-01

    and systemic lupus erythematosus from another previously published study (Macanovic, M. and Lachmann, P.J. (1979) Clin. Exp. Immunol. 38, 274) are also represented using ratio plots. Our observations indicate that analysis by regression analysis may often be misleading....... hitherto unnoted differences between controls and patients with either rheumatoid arthritis or systemic lupus erythematosus. For this we use simple, but unconventional, graphic representations of the data, based on difference plots and ratio plots. Differences between patients with Burkitt's lymphoma...

  5. Analysis of enhanced modal damping ratio in porous materials using an acoustic-structure interaction model

    DEFF Research Database (Denmark)

    Kook, Junghwan; Jensen, Jakob Søndergaard

    2014-01-01

    The aim of this paper is to investigate the enhancement of the damping ratio of a structure with embedded microbeam resonators in air-filled internal cavities. In this context, we discuss theoretical aspects in the framework of the effective modal damping ratio (MDR) and derive an approximate...... relation expressing how an increased damping due to the acoustic medium surrounding the microbeam affect the MDR of the macrobeam. We further analyze the effect of including dissipation of the acoustic medium by using finite element (FE) analysis with acoustic-structure interaction (ASI) using a simple...... phenomenological acoustic loss model. An eigenvalue analysis is carried out to demonstrate the improvement of the damping characteristic of the macrobeam with the resonating microbeam in the lossy air and the results are compared to a forced vibration analysis for a macrobeam with one or multiple embedded...

  6. The clinical use of the platelet/lymphocyte ratio and lymphocyte/monocyte ratio as prognostic predictors in colorectal cancer: a meta-analysis.

    Science.gov (United States)

    Guo, Ya-Huan; Sun, Hai-Feng; Zhang, Yan-Bing; Liao, Zi-Jun; Zhao, Lei; Cui, Jie; Wu, Tao; Lu, Jian-Rong; Nan, Ke-Jun; Wang, Shu-Hong

    2017-03-21

    Conflicting evidence exists regarding the effects of platelet/lymphocyte ratio (PLR) and lymphocyte/monocyte ratio(LMR) on the prognosis of colorectal cancer (CRC) patients. This study aimed to evaluate the roles of the PLR and LMR in predicting the prognosis of CRC patients via meta-analysis. Eligible studies were retrieved from the PubMed, Embase,andChina National Knowledge Infrastructure (CNKI) databases, supplemented by a manual search of references from retrieved articles. Pooled hazard ratios (HR) with 95% confidence intervals (95% CI) were calculated using the generic inverse variance and random-effect model to evaluate the association of PLR and LMR with prognostic variables in CRC, including overall survival (OS), cancer-specific survival (CSS) and disease-free survival (DFS). Thirty-three studies containing 15,404 patients met criteria for inclusion. Pooled analysis suggested that elevated PLR was associated with poorer OS (pooled HR = 1.57, 95% CI: 1.41 - 1.75, p< 0.00001, I2=26%) and DFS (pooled HR = 1.58, 95% CI: 1.31 - 1.92, p< 0.00001, I2=66%). Conversely, high LMR correlated with more favorable OS (pooled HR = 0.59, 95% CI: 0.50 - 0.68, p< 0.00001, I2=44%), CSS (pooled HR = 0.54, 95% CI: 0.40 - 0.72, p< 0.00001, I2=11%) and DFS (pooled HR = 0.82, 95% CI: 0.71- 0.94,p=0.005, I2=29%). Elevated PLR was associated with poor prognosis, while high LMR correlated with more favorable outcomes in CRC patients. Pretreatment PLR and LMR could serve as prognostic predictors in CRC patients.

  7. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    Science.gov (United States)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  8. Quantitative analysis of the myelin g-ratio from electron microscopy images of the macaque corpus callosum

    Directory of Open Access Journals (Sweden)

    Nikola Stikov

    2015-09-01

    Full Text Available We provide a detailed morphometric analysis of eight transmission electron micrographs (TEMs obtained from the corpus callosum of one cynomolgus macaque. The raw TEM images are included in the article, along with the distributions of the axon caliber and the myelin g-ratio in each image. The distributions are analyzed to determine the relationship between axon caliber and g-ratio, and compared against the aggregate metrics (myelin volume fraction, fiber volume fraction, and the aggregate g-ratio, as defined in the accompanying research article entitled ‘In vivo histology of the myelin g-ratio with magnetic resonance imaging’ (Stikov et al., NeuroImage, 2015.

  9. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  10. Diagnostic Performance of Bronchoalveolar Lavage Fluid CD4/CD8 Ratio for Sarcoidosis: A Meta-analysis.

    Science.gov (United States)

    Shen, Yongchun; Pang, Caishuang; Wu, Yanqiu; Li, Diandian; Wan, Chun; Liao, Zenglin; Yang, Ting; Chen, Lei; Wen, Fuqiang

    2016-06-01

    The usefulness of bronchoalveolar lavage fluid (BALF) CD4/CD8 ratio for diagnosing sarcoidosis has been reported in many studies with variable results. Therefore, we performed a meta-analysis to estimate the overall diagnostic accuracy of BALF CD4/CD8 ratio based on the bulk of published evidence. Studies published prior to June 2015 and indexed in PubMed, OVID, Web of Science, Scopus and other databases were evaluated for inclusion. Data on sensitivity, specificity, positive likelihood ratio (PLR), negative likelihood ratio (NLR), and diagnostic odds ratio (DOR) were pooled from included studies. Summary receiver operating characteristic (SROC) curves were used to summarize overall test performance. Deeks's funnel plot was used to detect publication bias. Sixteen publications with 1885 subjects met our inclusion criteria and were included in this meta-analysis. Summary estimates of the diagnostic performance of the BALF CD4/CD8 ratio were as follows: sensitivity, 0.70 (95%CI 0.64-0.75); specificity, 0.83 (95%CI 0.78-0.86); PLR, 4.04 (95%CI 3.13-5.20); NLR, 0.36 (95%CI 0.30-0.44); and DOR, 11.17 (95%CI 7.31-17.07). The area under the SROC curve was 0.84 (95%CI 0.81-0.87). There was no evidence of publication bias. Measuring the BALF CD4/CD8 ratio may assist in the diagnosis of sarcoidosis when interpreted in parallel with other diagnostic factors. Copyright © 2016 The Authors. Published by Elsevier B.V. All rights reserved.

  11. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  12. Energy-exergy analysis of compressor pressure ratio effects on thermodynamic performance of ammonia water combined cycle

    International Nuclear Information System (INIS)

    Mohtaram, Soheil; Chen, Wen; Zargar, T.; Lin, Ji

    2017-01-01

    Highlights: • Energy exergy analysis is conducted to find the effects of RP. • EES software is utilized to perform the detailed energy-exergy analyses. • Effects investigated through energy and exergy destruction, enthalpy, yields, etc. • Detailed results are reported showing the performance of gas and combined cycle. - Abstract: The purpose of this study is to investigate the effect of compressor pressure ratio (RP) on the thermodynamic performances of ammonia-water combined cycle through energy and exergy destruction, enthalpy temperature, yields, and flow velocity. The energy-exergy analysis is conducted on the ammonia water combined cycle and the Rankine cycle, respectively. Engineering Equation Solver (EES) software is utilized to perform the detailed analyses. Values and ratios regarding heat drop and exergy loss are presented in separate tables for different equipments. The results obtained by the energy-exergy analysis indicate that by increasing the pressure ratio compressor, exergy destruction of high-pressure compressors, intercooler, gas turbine and the special produced work of gas turbine cycle constantly increase and the exergy destruction of recuperator, in contrast, decreases continuously. In addition, the least amount of input fuel into the combined cycle is observed when the pressure ratio is no less than 7.5. Subsequently, the efficiency of the cycle in gas turbine and combined cycle is reduced because the fuel input into the combined cycle is increased.

  13. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  14. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  15. Performance Analysis of the Enhanced DSR Routing Protocol for the Short Time Disconnected MANET to the OPNET Modeler

    Directory of Open Access Journals (Sweden)

    PAPAJ Ján

    2013-05-01

    Full Text Available Disconnected mobile ad-hoc networks (MANET are very important areas of the research. In this article, the performance analysis of the enhanced dynamic source routing protocol (OPP_DSR is introduced. This modification enables the routing process in the case when there are no connections to other mobile nodes. It also will enable the routing mechanisms when the routes, selected by routing mechanisms, are disconnected for some time. Disconnection can be for a short time and standard routing protocol DSR cannot reflect on this situation.The main idea is based on opportunistic forwarding where the nodes not only forward data but it's stored in the cache during long time. The network parameters throughput, routing load and are analysed.

  16. Inverse odds ratio-weighted estimation for causal mediation analysis.

    Science.gov (United States)

    Tchetgen Tchetgen, Eric J

    2013-11-20

    An important scientific goal of studies in the health and social sciences is increasingly to determine to what extent the total effect of a point exposure is mediated by an intermediate variable on the causal pathway between the exposure and the outcome. A causal framework has recently been proposed for mediation analysis, which gives rise to new definitions, formal identification results and novel estimators of direct and indirect effects. In the present paper, the author describes a new inverse odds ratio-weighted approach to estimate so-called natural direct and indirect effects. The approach, which uses as a weight the inverse of an estimate of the odds ratio function relating the exposure and the mediator, is universal in that it can be used to decompose total effects in a number of regression models commonly used in practice. Specifically, the approach may be used for effect decomposition in generalized linear models with a nonlinear link function, and in a number of other commonly used models such as the Cox proportional hazards regression for a survival outcome. The approach is simple and can be implemented in standard software provided a weight can be specified for each observation. An additional advantage of the method is that it easily incorporates multiple mediators of a categorical, discrete or continuous nature. Copyright © 2013 John Wiley & Sons, Ltd.

  17. Liquidity Analysis Using Cash Flow Ratios as Compared to Traditional Ratios in the Pharmaceutical Sector in Jordan

    OpenAIRE

    Sulayman H. Atieh

    2014-01-01

    The purpose of this study is to examine the liquidity position of the Jordanian pharmaceutical sector using the traditional ratios as compared to the more recently developed cash flow ratios. The research involved the comparison between traditional ratios and cash flow ratios of the big seven companies of the pharmaceutical industry in Jordan over six years period (2007¨C2012). The companies were all from the same sector, and the data was obtained from the annual reports of these companies. T...

  18. Comparison: Mediation Solutions of WSMOLX and WebML/WebRatio

    Science.gov (United States)

    Zaremba, Maciej; Zaharia, Raluca; Turati, Andrea; Brambilla, Marco; Vitvar, Tomas; Ceri, Stefano

    In this chapter we compare the WSMO/WSML/WSMX andWebML/WebRatio approaches to the SWS-Challenge workshop mediation scenario in terms of the utilized underlying technologies and delivered solutions. In the mediation scenario one partner uses Roset-taNet to define its B2B protocol while the other one operates on a proprietary solution. Both teams shown how these partners could be semantically integrated.

  19. Transarterial chemoembolization of hepatocellular carcinoma in a rat model: the effect of additional injection of survivin siRNA to the treatment protocol

    International Nuclear Information System (INIS)

    Vogl, Thomas J.; Oppermann, Elsie; Qian, Jun; Imlau, Ulli; Tran, Andreas; Hamidavi, Yousef; Korkusuz, Huedayi; Bechstein, Wolf Otto; Nour-Eldin, Nour-Eldin Abdel-Rehim; Gruber-Rouh, Tatjana; Hammerstingl, Renate; Naguib, Nagy Naguib Naeem

    2016-01-01

    Transarterial chemoembolization is one of the most widely accepted interventional treatment options for treatment of hepatocellular carcinoma. Still there is a lack of a standard protocol regarding the injected chemotherapeutics. Survivin is an inhibitor of Apoptosis protein that functions to inhibit apoptosis, promote proliferation, and enhance invasion. Survivin is selectively up-regulated in many human tumors. Small interfering RNA (siRNA) can trigger an RNA interference response in mammalian cells and induce strong inhibition of specific gene expression including Survivin. The aim of the study is to assess the effectiveness of the additional injection of Survivin siRNA to the routine protocol of Transarterial Chemoembolization (TACE) for the treatment of hepatocellular carcinoma in a rat model. The study was performed on 20 male ACI rats. On day 0 a solid Morris Hepatoma 3924A was subcapsullary implanted in the liver. On day 12 MRI measurement of the initial tumor volume (V1) was performed. TACE was performed on day 13. The rats were divided into 2 groups; Group (A, n = 10) in which 0.1 mg mitomycin, 0.1 ml lipiodol and 5.0 mg degradable starch microspheres were injected in addition 2.5 nmol survivin siRNA were injected. The same agents were injected in Group (B,=10) without Survivin siRNA. MRI was repeated on day 25 to assess the tumor volume (V2). The tumor growth ratio (V2/V1) was calculated. Western blot and immunohistochemical analysis were performed. For group A the mean tumor growth ratio (V2/V1) was 1.1313 +/− 0.1381, and was 3.1911 +/− 0.1393 in group B. A statistically significant difference between both groups was observed regarding the inhibition of tumor growth (P < 0.0001) where Group A showed more inhibition compared to Group B. Similarly immunohistochemical analysis showed significantly lower (p < 0.002) VEGF staining in group A compared to group B. Western Blot analysis showed a similar difference in VEGF expression (P < 0.0001). The

  20. Teaching Integrity in Empirical Research: A Protocol for Documenting Data Management and Analysis

    Science.gov (United States)

    Ball, Richard; Medeiros, Norm

    2012-01-01

    This article describes a protocol the authors developed for teaching undergraduates to document their statistical analyses for empirical research projects so that their results are completely reproducible and verifiable. The protocol is guided by the principle that the documentation prepared to accompany an empirical research project should be…

  1. Prognostic significance of neutrophil-lymphocyte ratio in hepatocellular carcinoma: a meta-analysis

    International Nuclear Information System (INIS)

    Xiao, Wei-Kai; Chen, Dong; Li, Shao-Qiang; Fu, Shun-Jun; Peng, Bao-Gang; Liang, Li-Jian

    2014-01-01

    Neutrophil-lymphocyte ratio (NLR) has recently been reported as a predictor of Hepatocellular carcinoma (HCC). However, its prognostic value in HCC still remains controversial. In this study, we aimed to evaluate the association between NLR and clinical outcome of HCC patients by performing meta-analysis. A comprehensive literature search for relevant studies published up to August 2013 was performed by using PubMed, Ovid, the Cochrane Library and Web of Science databases. Meta-analysis was performed using hazard ratio (HR) or odds ratio (OR) and 95% confidence intervals (95% CIs) as effect measures. A total of 15 studies encompassing 3094 patients were included in this meta-analysis. Our pooled results showed that high NLR was associated with poor overall survival (OS) and disease free survival (DFS) in HCC initially treated by liver transplantation (HR = 3.42, 95% CI:2.41-4.85,P = 0.000; HR = 5.90, 95% CI:3.99-8.70,P = 0.000, respectively) and surgical resection (HR = 3.33, 95% CI:2.23-4.98, P = 0.000; HR = 2.10, 95% CI: 2.06–2.14, respectively). High NLR was also associated with poor OS in HCC treated by radiofrequency-ablation (HR = 1.28, 95%CI: 1.10-1.48, P = 0.000), TACE (HR = 2.52, 95% CI: 1.64-3.86, P = 0.000) and mixed treatment (HR = 1.85, 95% CI: 1.40-2.44, P = 0.000), respectively. In addition, high NLR was significantly correlated with the presence of vascular invasion (OR = 2.69, 95% CI: 2.01–3.59, P = 0.000), tumor multifocality (OR = 1.74, 95% CI: 1.30–2.34, P = 0.000) and higher incidence of AFP ≥ 400 ng/ml (OR = 1.46, 95% CI: 1.01–2.09, P = 0.04). Elevated NLR indicates a poor prognosis for patients with HCC. NLR may be a convenient, easily-obtained, low cost and reliable biomarker with prognostic potential for HCC

  2. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  3. A standardised protocol for texture feature analysis of endoscopic images in gynaecological cancer

    Directory of Open Access Journals (Sweden)

    Pattichis Marios S

    2007-11-01

    Full Text Available Abstract Background In the development of tissue classification methods, classifiers rely on significant differences between texture features extracted from normal and abnormal regions. Yet, significant differences can arise due to variations in the image acquisition method. For endoscopic imaging of the endometrium, we propose a standardized image acquisition protocol to eliminate significant statistical differences due to variations in: (i the distance from the tissue (panoramic vs close up, (ii difference in viewing angles and (iii color correction. Methods We investigate texture feature variability for a variety of targets encountered in clinical endoscopy. All images were captured at clinically optimum illumination and focus using 720 × 576 pixels and 24 bits color for: (i a variety of testing targets from a color palette with a known color distribution, (ii different viewing angles, (iv two different distances from a calf endometrial and from a chicken cavity. Also, human images from the endometrium were captured and analysed. For texture feature analysis, three different sets were considered: (i Statistical Features (SF, (ii Spatial Gray Level Dependence Matrices (SGLDM, and (iii Gray Level Difference Statistics (GLDS. All images were gamma corrected and the extracted texture feature values were compared against the texture feature values extracted from the uncorrected images. Statistical tests were applied to compare images from different viewing conditions so as to determine any significant differences. Results For the proposed acquisition procedure, results indicate that there is no significant difference in texture features between the panoramic and close up views and between angles. For a calibrated target image, gamma correction provided an acquired image that was a significantly better approximation to the original target image. In turn, this implies that the texture features extracted from the corrected images provided for better

  4. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  5. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    Science.gov (United States)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  6. Can target-to-pons ratio be used as a reliable method for the analysis of [11C]PIB brain scans?

    Science.gov (United States)

    Edison, P; Hinz, R; Ramlackhansingh, A; Thomas, J; Gelosa, G; Archer, H A; Turkheimer, F E; Brooks, D J

    2012-04-15

    (11)C]PIB is the most widely used PET imaging marker for amyloid in dementia studies. In the majority of studies the cerebellum has been used as a reference region. However, cerebellar amyloid may be present in genetic Alzheimer's (AD), cerebral amyloid angiopathy and prion diseases. Therefore, we investigated whether the pons could be used as an alternative reference region for the analysis of [(11)C]PIB binding in AD. The aims of the study were to: 1) Evaluate the pons as a reference region using arterial plasma input function and Logan graphical analysis of binding. 2) Assess the power of target-to-pons ratios to discriminate controls from AD subjects. 3) Determine the test-retest reliability in AD subjects. 4) Demonstrate the application of target-to-pons ratio in subjects with elevated cerebellar [(11)C]PIB binding. 12 sporadic AD subjects aged 65 ± 4.5 yrs with a mean MMSE 21.4 ± 4 and 10 age-matched control subjects had [(11)C]PIB PET with arterial blood sampling. Three additional subjects (two subjects with pre-symptomatic presenilin-1 mutation carriers and one probable familial AD) were also studied. Object maps were created by segmenting individual MRIs and spatially transforming the gray matter images into standard stereotaxic MNI space and then superimposing a probabilistic atlas. Cortical [(11)C]PIB binding was assessed with an ROI (region of interest) analysis. Parametric maps of the volume of distribution (V(T)) were generated with Logan analysis. Additionally, parametric maps of the 60-90 min target-to-cerebellar ratio (RATIO(CER)) and the 60-90 min target-to-pons ratio (RATIO(PONS)) were computed. All three approaches were able to differentiate AD from controls (p0.83); RATIO(CER) performed best closely followed by RATIO(PONS). The two subjects with presenilin-1 mutations and the probable familial AD case showed no significant differences in cortical binding using RATIO(CER), but the RATIO(PONS) approach revealed higher [(11)C]PIB binding in

  7. Analysis of quality control protocol implementation of equipment in radiotherapy services

    International Nuclear Information System (INIS)

    Calcina, Carmen S. Guzman; Lima, Luciana P. de; Rubo, Rodrigo A.; Ferraz, Eduardo; Almeida, Adelaide de

    2000-01-01

    Considering the importance of the Quality Assurance in the radiotherapy services, there was an interest to make tests' evaluation for a Quality Control for the cobalt equipment, linear accelerator and simulator as a classification and comparison. The work proposed is a suggestion that can serve as tool for medical physicists that are starting to work in the radiotherapy area and for the most experts. The discussions were made by the gathering of local tests and official protocols, resulting in a minimum protocol as a suggestion for a routine work, emphasizing the periodicity and level of tolerance of each one of the tests. (author)

  8. Protocol for sampling and analysis of bone specimens

    International Nuclear Information System (INIS)

    Aras, N.K.

    2000-01-01

    The iliac crest of hip bone was chosen as the most suitable sampling site for several reasons: Local variation in the elemental concentration along the iliac crest is minimal; Iliac crest biopsies are commonly taken clinically on patients; The cortical part of the sample is small (∼2 mm) and can be separated easily from the trabecular bone; The use of the trabecular part of the iliac crest for trace element analysis has the advantage of reflecting rapidly changes in the composition of bone due to external parameters, including medication. Biopsy studies, although in some ways more difficult than autopsy studies, because of the need to obtain the informed consents of the subjects, are potentially more useful than autopsy studies. Thereby many problems of postmortem migration of elements can be avoided and reliable dietary and other data can be collected simultaneously. Select the subjects among the patients undergoing orthopedic surgery due to any reason other than osteoporosis. Follow an established protocol to obtain bone biopsies. Patients undergoing synergy should fill in the 'Osteoporosis Project Questionnaire Form' including information on lifestyle variables, dietary intakes, the reason for surgery etc. If possible, measure the bone mineral density (BMD) prior to removal of the biopsy sample. However it may not possible to have BMD results on all the subjects because of difficulty of DEXA measurement after an accident

  9. Influence of Anterior Cruciate Ligament Tear on Thigh Muscle Strength and Hamstring-to-Quadriceps Ratio: A Meta-Analysis.

    Directory of Open Access Journals (Sweden)

    Hyun-Jung Kim

    Full Text Available Theoretical compensation after anterior cruciate ligament (ACL tear could cause quadriceps weakness and hamstring activation, preventing anterior tibial subluxation and affecting the expected hamstring-to-quadriceps ratio. Although quadriceps weakness often occurs after ACL tears, it remains unclear whether hamstring strength and hamstring-to-quadriceps ratio increase in ACL deficient knees. This meta-analysis compared the isokinetic muscle strength of quadriceps and hamstring muscles, and the hamstring-to-quadriceps ratio, of the injured and injured limbs of patients with ACL tears. This meta-analysis included all studies comparing isokinetic thigh muscle strengths and hamstring-to-quadriceps ratio in the injured and uninjured legs of patients with ACL tear, without or before surgery. Thirteen studies were included in the meta-analysis. Quadriceps and hamstring strengths were 22.3 N∙m (95% CI: 15.2 to 29.3 N∙m; P<0.001 and 7.4 N∙m (95% CI: 4.3 to 10.5 N∙m; P<0.001 lower, respectively, on the injured than on the uninjured side. The mean hamstring-to-quadriceps ratio was 4% greater in ACL deficient than in uninjured limbs (95% CI: 1.7% to 6.3%; P<0.001. Conclusively, Decreases were observed in both the quadriceps and hamstring muscles of patients with ACL tear, with the decrease in quadriceps strength being 3-fold greater. These uneven reductions slightly increase the hamstring-to-quadriceps ratio in ACL deficient knees.

  10. Comparison of Diffusion MRI Acquisition Protocols for the In Vivo Characterization of the Mouse Spinal Cord: Variability Analysis and Application to an Amyotrophic Lateral Sclerosis Model.

    Science.gov (United States)

    Figini, Matteo; Scotti, Alessandro; Marcuzzo, Stefania; Bonanno, Silvia; Padelli, Francesco; Moreno-Manzano, Victoria; García-Verdugo, José Manuel; Bernasconi, Pia; Mantegazza, Renato; Bruzzone, Maria Grazia; Zucca, Ileana

    2016-01-01

    Diffusion-weighted Magnetic Resonance Imaging (dMRI) has relevant applications in the microstructural characterization of the spinal cord, especially in neurodegenerative diseases. Animal models have a pivotal role in the study of such diseases; however, in vivo spinal dMRI of small animals entails additional challenges that require a systematical investigation of acquisition parameters. The purpose of this study is to compare three acquisition protocols and identify the scanning parameters allowing a robust estimation of the main diffusion quantities and a good sensitivity to neurodegeneration in the mouse spinal cord. For all the protocols, the signal-to-noise and contrast-to noise ratios and the mean value and variability of Diffusion Tensor metrics were evaluated in healthy controls. For the estimation of fractional anisotropy less variability was provided by protocols with more diffusion directions, for the estimation of mean, axial and radial diffusivity by protocols with fewer diffusion directions and higher diffusion weighting. Intermediate features (12 directions, b = 1200 s/mm2) provided the overall minimum inter- and intra-subject variability in most cases. In order to test the diagnostic sensitivity of the protocols, 7 G93A-SOD1 mice (model of amyotrophic lateral sclerosis) at 10 and 17 weeks of age were scanned and the derived diffusion parameters compared with those estimated in age-matched healthy animals. The protocols with an intermediate or high number of diffusion directions provided the best differentiation between the two groups at week 17, whereas only few local significant differences were highlighted at week 10. According to our results, a dMRI protocol with an intermediate number of diffusion gradient directions and a relatively high diffusion weighting is optimal for spinal cord imaging. Further work is needed to confirm these results and for a finer tuning of acquisition parameters. Nevertheless, our findings could be important for the

  11. Pengaruh Debt to Equty Ratio, Current Ratio , Net Profit Margin Terhadap Harga Saham dengan Price Earning Ratio Sebagai Variabel Pemoderasi pada Perusahaan Manufaktur yang Terdaftar di BEI Periode 2012-2014

    OpenAIRE

    Theresia, Paskah Lia

    2017-01-01

    This study conducted to analyze the effect of variable Debt to Equity Ratio (DER), Current Ratio (CR), Net Profit Margin (NPM) andPrice Earnings Ratio (PER) to the Stock Prices with Price Earnings Ratio (PER) as an moderating variable on companies listed on Indonesian Stock Exchange from 2012 - 2014.The samplingtechnique used is purposive sampling and number of samples used by 23 companies. The analysis technique used are Descriptive Statistic Analysis, Classical Assumption Test, Hypothesis T...

  12. Improvement The Transmission Efficiency For Wireless Packet Communication Systems Using Automatic Control for power And Time Slot Width Of Slotted Non persistent ISMA Protocol

    Directory of Open Access Journals (Sweden)

    Saad M. Hardan

    2013-05-01

    Full Text Available In packed communication systems which use a protocol, the protocol should perform the allocation of channels such that the transmission channel is used efficiently. Efficiency is usually measured in terms of channel throughput and the average transmission  delay. The Slotted Nonpersistent ISMA protocol is one of random access protocols used in packed communication systems. In this research a Slotted Nonpersistent ISMA protocol Model with automatic control for power and time slot is proposed. the suggested algorithm enable the base station(access point to control  the protocol time slot length and  transmission power in a dynamic way to control the normalized propagation delay d and to maintain all the uplink signals in the limit of captured power threshold (capture ratio in order to control the  throughput and the average transmission delay of the communication system by an automatic method. the computer simulation results  confirm the activity of the  proposed algorithm for increasing the  throughput and decreasing the average transmission delay by an accepted ratios.

  13. A Proof-checked Verification of a Real-Time Communication Protocol

    NARCIS (Netherlands)

    Polak, I.

    We present an analysis of a protocol developed by Philips to connect several components of an audio-system. The verification of the protocol is carried out using the timed I/O-automata model of Lynch and Vaandrager. The verification has been partially proof-checked with the interactive proof

  14. Deferred tax analysis and impact on firm's economic efficiency ratios

    Directory of Open Access Journals (Sweden)

    Hana Bohušová

    2005-01-01

    Full Text Available Category of deferred income tax is a complex topic including the whole accounting system and the income tax. Calculation method can be time-consuming and demanding a high quality system of analytical evidence and a system of valuation and demanding the high level of accountants' knowledge. The aim in the theoretical level was to analyze process of calculation and recording of deferred tax. Importance of recording of deferred tax and the impact on financial analysis ratios was analyzed. Fourteen business entities were examined. Deferred tax recording is a legal way to reduce retained earnings a to protect of its careless alocation.

  15. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  16. Characteristic vector analysis of inflection ratio spectra: New technique for analysis of ocean color data

    Science.gov (United States)

    Grew, G. W.

    1985-01-01

    Characteristic vector analysis applied to inflection ratio spectra is a new approach to analyzing spectral data. The technique applied to remote data collected with the multichannel ocean color sensor (MOCS), a passive sensor, simultaneously maps the distribution of two different phytopigments, chlorophyll alpha and phycoerythrin, the ocean. The data set presented is from a series of warm core ring missions conducted during 1982. The data compare favorably with a theoretical model and with data collected on the same mission by an active sensor, the airborne oceanographic lidar (AOL).

  17. Practical guidance for conducting mediation analysis with multiple mediators using inverse odds ratio weighting.

    Science.gov (United States)

    Nguyen, Quynh C; Osypuk, Theresa L; Schmidt, Nicole M; Glymour, M Maria; Tchetgen Tchetgen, Eric J

    2015-03-01

    Despite the recent flourishing of mediation analysis techniques, many modern approaches are difficult to implement or applicable to only a restricted range of regression models. This report provides practical guidance for implementing a new technique utilizing inverse odds ratio weighting (IORW) to estimate natural direct and indirect effects for mediation analyses. IORW takes advantage of the odds ratio's invariance property and condenses information on the odds ratio for the relationship between the exposure (treatment) and multiple mediators, conditional on covariates, by regressing exposure on mediators and covariates. The inverse of the covariate-adjusted exposure-mediator odds ratio association is used to weight the primary analytical regression of the outcome on treatment. The treatment coefficient in such a weighted regression estimates the natural direct effect of treatment on the outcome, and indirect effects are identified by subtracting direct effects from total effects. Weighting renders treatment and mediators independent, thereby deactivating indirect pathways of the mediators. This new mediation technique accommodates multiple discrete or continuous mediators. IORW is easily implemented and is appropriate for any standard regression model, including quantile regression and survival analysis. An empirical example is given using data from the Moving to Opportunity (1994-2002) experiment, testing whether neighborhood context mediated the effects of a housing voucher program on obesity. Relevant Stata code (StataCorp LP, College Station, Texas) is provided. © The Author 2015. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  18. Performance analysis of opportunistic nonregenerative relaying

    KAUST Repository

    Tourki, Kamel; Alouini, Mohamed-Slim; Qaraqe, Khalid A.; Yang, Hongchuan

    2013-01-01

    Opportunistic relaying in cooperative communication depends on careful relay selection. However, the traditional centralized method used for opportunistic amplify-and-forward protocols requires precise measurements of channel state information at the destination. In this paper, we adopt the max-min criterion as a relay selection framework for opportunistic amplify-and-forward cooperative communications, which was exhaustively used for the decode-and-forward protocol, and offer an accurate performance analysis based on exact statistics of the local signal-to-noise ratios of the best relay. Furthermore, we evaluate the asymptotical performance and deduce the diversity order of our proposed scheme. Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over Rayleigh fading channels, and we compare the max-min relay selection with their centralized channel state information-based and partial relay selection counterparts.

  19. A Novel Process Audit for Standardized Perioperative Handoff Protocols.

    Science.gov (United States)

    Pallekonda, Vinay; Scholl, Adam T; McKelvey, George M; Amhaz, Hassan; Essa, Deanna; Narreddy, Spurthy; Tan, Jens; Templonuevo, Mark; Ramirez, Sasha; Petrovic, Michelle A

    2017-11-01

    A perioperative handoff protocol provides a standardized delivery of communication during a handoff that occurs from the operating room to the postanestheisa care unit or ICU. The protocol's success is dependent, in part, on its continued proper use over time. A novel process audit was developed to help ensure that a perioperative handoff protocol is used accurately and appropriately over time. The Audit Observation Form is used for the Audit Phase of the process audit, while the Audit Averages Form is used for the Data Analysis Phase. Employing minimal resources and using quantitative methods, the process audit provides the necessary means to evaluate the proper execution of any perioperative handoff protocol. Copyright © 2017 The Joint Commission. Published by Elsevier Inc. All rights reserved.

  20. Evaluation of different protein extraction methods for banana (Musa spp.) root proteome analysis by two-dimensional electrophoresis.

    Science.gov (United States)

    Vaganan, M Mayil; Sarumathi, S; Nandakumar, A; Ravi, I; Mustaffa, M M

    2015-02-01

    Four protocols viz., the trichloroacetic acid-acetone (TCA), phenol-ammonium acetate (PAA), phenol/SDS-ammonium acetate (PSA) and trisbase-acetone (TBA) were evaluated with modifications for protein extraction from banana (Grand Naine) roots, considered as recalcitrant tissues for proteomic analysis. The two-dimensional electrophoresis (2-DE) separated proteins were compared based on protein yield, number of resolved proteins, sum of spot quantity, average spot intensity and proteins resolved in 4-7 pI range. The PAA protocol yielded more proteins (0.89 mg/g of tissues) and protein spots (584) in 2-DE gel than TCA and other protocols. Also, the PAA protocol was superior in terms of sum of total spot quantity and average spot intensity than TCA and other protocols, suggesting phenol as extractant and ammonium acetate as precipitant of proteins were the most suitable for banana rooteomics analysis by 2-DE. In addition, 1:3 ratios of root tissue to extraction buffer and overnight protein precipitation were most efficient to obtain maximum protein yield.

  1. {sup 15}N/{sup 14}N isotopic ratio and statistical analysis: an efficient way of linking seized Ecstasy tablets

    Energy Technology Data Exchange (ETDEWEB)

    Palhol, Fabien; Lamoureux, Catherine; Chabrillat, Martine; Naulet, Norbert

    2004-05-10

    In this study, the {sup 15}N/{sup 14}N isotopic ratios of 106 samples of 3,4-methylenedioxymethamphetamine (MDMA) extracted from Ecstasy tablets are presented. These ratios, measured using gas chromatography-combustion-isotope ratio mass spectrometry (GC-C-IRMS), show a large discrimination between samples with a range of {delta}{sup 15}N values between -17 and +19%o, depending on the precursors and the method used in clandestine laboratories. Thus, {delta}{sup 15}N values can be used in a statistical analysis carried out in order to link Ecstasy tablets prepared with the same precursors and synthetic pathway. The similarity index obtained after principal component analysis and hierarchical cluster analysis appears to be an efficient way to group tablets seized in different places.

  2. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  3. SU-F-207-16: CT Protocols Optimization Using Model Observer

    International Nuclear Information System (INIS)

    Tseng, H; Fan, J; Kupinski, M

    2015-01-01

    Purpose: To quantitatively evaluate the performance of different CT protocols using task-based measures of image quality. This work studies the task of size and the contrast estimation of different iodine concentration rods inserted in head- and body-sized phantoms using different imaging protocols. These protocols are designed to have the same dose level (CTDIvol) but using different X-ray tube voltage settings (kVp). Methods: Different concentrations of iodine objects inserted in a head size phantom and a body size phantom are imaged on a 64-slice commercial CT scanner. Scanning protocols with various tube voltages (80, 100, and 120 kVp) and current settings are selected, which output the same absorbed dose level (CTDIvol). Because the phantom design (size of the iodine objects, the air gap between the inserted objects and the phantom) is not ideal for a model observer study, the acquired CT images are used to generate simulation images with four different sizes and five different contracts iodine objects. For each type of the objects, 500 images (100 x 100 pixels) are generated for the observer study. The observer selected in this study is the channelized scanning linear observer which could be applied to estimate the size and the contrast. The figure of merit used is the correct estimation ratio. The mean and the variance are estimated by the shuffle method. Results: The results indicate that the protocols with 100 kVp tube voltage setting provides the best performance for iodine insert size and contrast estimation for both head and body phantom cases. Conclusion: This work presents a practical and robust quantitative approach using channelized scanning linear observer to study contrast and size estimation performance from different CT protocols. Different protocols at same CTDIvol setting could Result in different image quality performance. The relationship between the absorbed dose and the diagnostic image quality is not linear

  4. SU-F-207-16: CT Protocols Optimization Using Model Observer

    Energy Technology Data Exchange (ETDEWEB)

    Tseng, H [University of Arizona, Tucson, AZ (United States); Fan, J [CT Systems Engineering, GE Healthcare, Waukesha, Wisconsin (United States); Kupinski, M [Univ Arizona, Tucson, AZ (United States)

    2015-06-15

    Purpose: To quantitatively evaluate the performance of different CT protocols using task-based measures of image quality. This work studies the task of size and the contrast estimation of different iodine concentration rods inserted in head- and body-sized phantoms using different imaging protocols. These protocols are designed to have the same dose level (CTDIvol) but using different X-ray tube voltage settings (kVp). Methods: Different concentrations of iodine objects inserted in a head size phantom and a body size phantom are imaged on a 64-slice commercial CT scanner. Scanning protocols with various tube voltages (80, 100, and 120 kVp) and current settings are selected, which output the same absorbed dose level (CTDIvol). Because the phantom design (size of the iodine objects, the air gap between the inserted objects and the phantom) is not ideal for a model observer study, the acquired CT images are used to generate simulation images with four different sizes and five different contracts iodine objects. For each type of the objects, 500 images (100 x 100 pixels) are generated for the observer study. The observer selected in this study is the channelized scanning linear observer which could be applied to estimate the size and the contrast. The figure of merit used is the correct estimation ratio. The mean and the variance are estimated by the shuffle method. Results: The results indicate that the protocols with 100 kVp tube voltage setting provides the best performance for iodine insert size and contrast estimation for both head and body phantom cases. Conclusion: This work presents a practical and robust quantitative approach using channelized scanning linear observer to study contrast and size estimation performance from different CT protocols. Different protocols at same CTDIvol setting could Result in different image quality performance. The relationship between the absorbed dose and the diagnostic image quality is not linear.

  5. Improvement of burn pain management through routine pain monitoring and pain management protocol.

    Science.gov (United States)

    Yang, Hyeong Tae; Hur, Giyeun; Kwak, In-Suk; Yim, Haejun; Cho, Yong Suk; Kim, Dohern; Hur, Jun; Kim, Jong Hyun; Lee, Boung Chul; Seo, Cheong Hoon; Chun, Wook

    2013-06-01

    Pain management is an important aspect of burn management. We developed a routine pain monitoring system and pain management protocol for burn patients. The purpose of this study is to evaluate the effectiveness of our new pain management system. From May 2011 to November 2011, the prospective study was performed with 107 burn patients. We performed control group (n=58) data analysis and then developed the pain management protocol and monitoring system. Next, we applied our protocol to patients and performed protocol group (n=49) data analysis, and compared this to control group data. Data analysis was performed using the Numeric Rating Scale (NRS) of background pain and procedural pain, Clinician-Administered PTSD Scale (CAPS), Hamilton Depression Rating Scale (HDRS), State-Trait Anxiety Inventory Scale (STAIS), and Holmes and Rahe Stress Scale (HRSS). The NRS of background pain for the protocol group was significantly decreased compared to the control group (2.8±2.0 versus 3.9±1.9), and the NRS of procedural pain of the protocol group was significantly decreased compared to the control group (4.8±2.8 versus 3.7±2.5). CAPS and HDRS were decreased in the protocol group, but did not have statistical significance. STAIS and HRSS were decreased in the protocol group, but only the STAIS had statistical significance. Our new pain management system was effective in burn pain management. However, adequate pain management can only be accomplished by a continuous and thorough effort. Therefore, pain control protocol and pain monitoring systems need to be under constant revision and improvement using creative ideas and approaches. Copyright © 2012 Elsevier Ltd and ISBI. All rights reserved.

  6. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    is formalised in an extension of the LySa process calculus with blinding signatures. The analysis, which is fully automatic, pinpoints previously undiscovered flaws related to verifiability and accuracy and we suggest modifications of the protocol needed for validating these properties....

  7. Subgroup analyses in randomised controlled trials: cohort study on trial protocols and journal publications.

    Science.gov (United States)

    Kasenda, Benjamin; Schandelmaier, Stefan; Sun, Xin; von Elm, Erik; You, John; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Rosenthal, Rachel; Ebrahim, Shanil; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias

    2014-07-16

    To investigate the planning of subgroup analyses in protocols of randomised controlled trials and the agreement with corresponding full journal publications. Cohort of protocols of randomised controlled trial and subsequent full journal publications. Six research ethics committees in Switzerland, Germany, and Canada. 894 protocols of randomised controlled trial involving patients approved by participating research ethics committees between 2000 and 2003 and 515 subsequent full journal publications. Of 894 protocols of randomised controlled trials, 252 (28.2%) included one or more planned subgroup analyses. Of those, 17 (6.7%) provided a clear hypothesis for at least one subgroup analysis, 10 (4.0%) anticipated the direction of a subgroup effect, and 87 (34.5%) planned a statistical test for interaction. Industry sponsored trials more often planned subgroup analyses compared with investigator sponsored trials (195/551 (35.4%) v 57/343 (16.6%), P<0.001). Of 515 identified journal publications, 246 (47.8%) reported at least one subgroup analysis. In 81 (32.9%) of the 246 publications reporting subgroup analyses, authors stated that subgroup analyses were prespecified, but this was not supported by 28 (34.6%) corresponding protocols. In 86 publications, authors claimed a subgroup effect, but only 36 (41.9%) corresponding protocols reported a planned subgroup analysis. Subgroup analyses are insufficiently described in the protocols of randomised controlled trials submitted to research ethics committees, and investigators rarely specify the anticipated direction of subgroup effects. More than one third of statements in publications of randomised controlled trials about subgroup prespecification had no documentation in the corresponding protocols. Definitive judgments regarding credibility of claimed subgroup effects are not possible without access to protocols and analysis plans of randomised controlled trials. © The DISCO study group 2014.

  8. Monthly analysis of PM ratio characteristics and its relation to AOD.

    Science.gov (United States)

    Sorek-Hamer, Meytar; Broday, David M; Chatfield, Robert; Esswein, Robert; Stafoggia, Massimo; Lepeule, Johanna; Lyapustin, Alexei; Kloog, Itai

    2017-01-01

    Airborne particulate matter (PM) is derived from diverse sources-natural and anthropogenic. Climate change processes and remote sensing measurements are affected by the PM properties, which are often lumped into homogeneous size fractions that show spatiotemporal variation. Since different sources are attributed to different geographic locations and show specific spatial and temporal PM patterns, we explored the spatiotemporal characteristics of the PM 2.5 /PM 10 ratio in different areas. Furthermore, we examined the statistical relationships between AERONET aerosol optical depth (AOD) products, satellite-based AOD, and the PM ratio, as well as the specific PM size fractions. PM data from the northeastern United States, from San Joaquin Valley, CA, and from Italy, Israel, and France were analyzed, as well as the spatial and temporal co-measured AOD products obtained from the MultiAngle Implementation of Atmospheric Correction (MAIAC) algorithm. Our results suggest that when both the AERONET AOD and the AERONET fine-mode AOD are available, the AERONET AOD ratio can be a fair proxy for the ground PM ratio. Therefore, we recommend incorporating the fine-mode AERONET AOD in the calibration of MAIAC. Along with a relatively large variation in the observed PM ratio (especially in the northeastern United States), this shows the need to revisit MAIAC assumptions on aerosol microphysical properties, and perhaps their seasonal variability, which are used to generate the look-up tables and conduct aerosol retrievals. Our results call for further scrutiny of satellite-borne AOD, in particular its errors, limitations, and relation to the vertical aerosol profile and the particle size, shape, and composition distribution. This work is one step of the required analyses to gain better understanding of what the satellite-based AOD represents. The analysis results recommend incorporating the fine-mode AERONET AOD in MAIAC calibration. Specifically, they indicate the need to revisit

  9. Evaluation of the effectiveness of laser in situ keratomileusis and photorefractive keratectomy for myopia: a meta-analysis.

    Science.gov (United States)

    Yang, Xin-Jun; Yan, Hong-Tao; Nakahori, Yutaka

    2003-08-01

    To evaluate the effectiveness of laser in situ keratomileusis (LASIK) and photorefractive keratectomy (PRK) for correcting myopia. Study selection, data extraction, and quality assessment were performed by two of authors independently. Summary odds ratios and 95% confidence intervals were calculated by DerSimonian & Laird random-effects model and Mantel-Haenszel (fixed-effects) model. All calculations were based on an intention-to-treat and per protocol analysis. Five hundred and eighty eyes (476 patients) from 5 randomized controlled trials were included in this study. At > or = 6 months follow-up, by random-effects model, the pooled odds ratios (OR, for LASIK vs. PRK) of postoperative uncorrected visual acuity (UCVA) of 20/20 or better for all trials were 1.31 (95% CI=0.77-2.22) by per protocol analysis and 1.18 (95% CI=0.74-1.88) by intention-to-treat analysis. In the refractive outcome, the pooled OR of the postoperative spherical equivalent refraction within +/-0.5 diopter (D) of emmetropia did not show any statistical significance, for which the OR were 0.75 (95% CI=0.48-1.18) by per protocol analysis and 0.70 (95% CI=0.47-1.04) by intention-to-treat analysis. LASIK and PRK were found to be similarly effective for the correction of myopia from -1.5 to -15.0 D in a greater than 6 month follow-up.

  10. Tumor-stroma ratio(TSR) as a potential novel predictor of prognosis in digestive system cancers: A meta-analysis.

    Science.gov (United States)

    Zhang, Runjin; Song, Wei; Wang, Kai; Zou, Shubing

    2017-09-01

    The tumor-stroma ratio (TSR) has been reported as a prognosis predictor in multiple cancers. The aim of this meta-analysis was to investigate the potential value of TSR as a prognostic predictor of cancer in the digestive system. We searched PubMed, Embase, Elsevier and Web of Science. All studies exploring the association of TSR with overall survival (OS) or disease-free survival (DFS), and lymph node metastasis (LNM) were identified. In total, eight studies were eligible for analysis, and they included 1959 patients. Meta-analysis showed that the low TSR in the tumor could predict poor overall survival (OS) in multiple cancers (pooled Hazard Ratio [HR]: 2.15, 95%CI: 1.80-2.57, P<0.00001, fixed effects). For disease-free survival (DFS), low TSR was also a significant predictor (pooled Hazard Ratio [HR]: 2.31, 95%CI: 1.88-2.83, P<0.00001, fixed effects). In addition, low TSR was correlated with tumor stage. The tumor-stroma ratio (TSR) may potentially serve as a poor prognostic predictor for the metastasis and prognosis of cancer. Copyright © 2017. Published by Elsevier B.V.

  11. Masonry fireplace emissions test method: Repeatability and sensitivity to fueling protocol.

    Science.gov (United States)

    Stern, C H; Jaasma, D R; Champion, M R

    1993-03-01

    A test method for masonry fireplaces has been evaluated during testing on six masonry fireplace configurations. The method determines carbon monoxide and particulate matter emission rates (g/h) and factors (g/kg) and does not require weighing of the appliance to determine the timing of fuel loading.The intralaboratory repeatability of the test method has been determined from multiple tests on the six fireplaces. For the tested fireplaces, the ratio of the highest to lowest measured PM rate averaged 1.17 and in no case was greater than 1.32. The data suggest that some of the variation is due to differences in fuel properties.The influence of fueling protocol on emissions has also been studied. A modified fueling protocol, tested in large and small fireplaces, reduced CO and PM emission factors by roughly 40% and reduced CO and PM rates from 0 to 30%. For both of these fireplaces, emission rates were less sensitive to fueling protocol than emission factors.

  12. Targeted agents for patients with advanced/metastatic pancreatic cancer: A protocol for systematic review and network meta-analysis.

    Science.gov (United States)

    Di, Baoshan; Pan, Bei; Ge, Long; Ma, Jichun; Wu, Yiting; Guo, Tiankang

    2018-03-01

    Pancreatic cancer (PC) is a devastating malignant tumor. Although surgical resection may offer a good prognosis and prolong survival, approximately 80% patients with PC are always diagnosed as unresectable tumor. National Comprehensive Cancer Network's (NCCN) recommended gemcitabine-based chemotherapy as efficient treatment. While, according to recent studies, targeted agents might be a better available option for advanced or metastatic pancreatic cancer patients. The aim of this systematic review and network meta-analysis will be to examine the differences of different targeted interventions for advanced/metastatic PC patients. We will conduct this systematic review and network meta-analysis using Bayesian method and according to Preferred Reporting Items for Systematic review and Meta-Analysis Protocols (PRISMA-P) statement. To identify relevant studies, 6 electronic databases including PubMed, EMBASE, the Cochrane Central Register of Controlled Trials (CENTRAL), Web of science, CNKI (Chinese National Knowledge Infrastructure), and CBM (Chinese Biological Medical Database) will be searched. The risk of bias in included randomized controlled trials (RCTs) will be assessed using the Cochrane Handbook version 5.1.0. And we will use GRADE approach to assess the quality of evidence from network meta-analysis. Data will be analyzed using R 3.4.1 software. To the best of our knowledge, this systematic review and network meta-analysis will firstly use both direct and indirect evidence to compare the differences of different targeted agents and targeted agents plus chemotherapy for advanced/metastatic pancreatic cancer patients. This is a protocol of systematic review and meta-analysis, so the ethical approval and patient consent are not required. We will disseminate the results of this review by submitting to a peer-reviewed journal.

  13. Determination of isotopic ratios of osmium and ruthenium in meteorites by pretreatment and radiochemical neutron activation analysis

    International Nuclear Information System (INIS)

    Chinfang Chai; Yongzhong Liu; Xueying Mao

    1996-01-01

    The isotopic abundance ratios of 190 Os/ 184 Os and 96 Ru/ 102 Ru for the metal phases of the Jilin and Taonan stone meteorites were determined by pretreatment and radiochemical neutron activation analysis. All experimental factors affecting Os and Ru isotopic ratios were discussed, including sampling, standard, irradiation, separation and counting. The statistical errors of measurements for the 199 Os/ 184 Os ratio can be controlled within 1%. The experimental results indicate that the statistically significant anomalies of the 190 Os/ 184 Os and 96 Ru/ 102 Ru ratios have not been found relative to the terrestrial Os and Ru standards. (author). 6 refs., 1 fig., 5 tabs

  14. Investigating the burden of antibiotic resistance in ethnic minority groups in high-income countries: protocol for a systematic review and meta-analysis.

    Science.gov (United States)

    Lishman, Hannah; Aylin, Paul; Alividza, Vivian; Castro-Sanchez, Enrique; Chatterjee, Anuja; Mariano, Victor; Johnson, Alan P; Jeraj, Samir; Costelloe, Céire

    2017-12-11

    Antibiotic resistance (ABR) is an urgent problem globally, with overuse and misuse of antibiotics being one of the main drivers of antibiotic-resistant infections. There is increasing evidence that the burden of community-acquired infections such as urinary tract infections and bloodstream infections (both susceptible and resistant) may differ by ethnicity, although the reasons behind this relationship are not well defined. It has been demonstrated that socioeconomic status and ethnicity are often highly correlated with each other; however, it is not yet known whether accounting for deprivation completely explains any discrepancy seen in infection risk. There have currently been no systematic reviews summarising the evidence for the relationship between ethnicity and antibiotic resistance or prescribing. This protocol will outline how we will conduct this systematic literature review and meta-analysis investigating whether there is an association between patient ethnicity and (1) risk of antibiotic-resistant infections or (2) levels of antibiotic prescribing in high-income countries. We will search PubMed/MEDLINE, EMBASE, Global Health, Scopus and CINAHL using MESH terms where applicable. Two reviewers will conduct title/abstract screening, data extraction and quality assessment independently. The Critical Appraisal Skills Programme (CASP) checklist will be used for cohort and case-control studies, and the Cochrane collaboration's risk of bias tool will be used for randomised control trials, if they are included. Meta-analyses will be performed by calculating the minority ethnic group to majority ethnic group odds ratios or risk ratios for each study and presenting an overall pooled odds ratio for the two outcomes. The Grading of Recommendations, Assessments, Development and Evaluation (GRADE) approach will be used to assess the overall quality of the body of evidence. In this systematic review and meta-analysis, we will aim to collate the available evidence of

  15. Statistical analysis plan for the EuroHYP-1 trial

    DEFF Research Database (Denmark)

    Winkel, Per; Bath, Philip M; Gluud, Christian

    2017-01-01

    Score; (4) brain infarct size at 48 +/-24 hours; (5) EQ-5D-5 L score, and (6) WHODAS 2.0 score. Other outcomes are: the primary safety outcome serious adverse events; and the incremental cost-effectiveness, and cost utility ratios. The analysis sets include (1) the intention-to-treat population, and (2...... outcome), logistic regression (binary outcomes), general linear model (continuous outcomes), and the Poisson or negative binomial model (rate outcomes). DISCUSSION: Major adjustments compared with the original statistical analysis plan encompass: (1) adjustment of analyses by nationality; (2) power......) the per protocol population. The sample size is estimated to 800 patients (5% type 1 and 20% type 2 errors). All analyses are adjusted for the protocol-specified stratification variables (nationality of centre), and the minimisation variables. In the analysis, we use ordinal regression (the primary...

  16. HISTOPATHOLOGICAL AND CYTOLOGICAL ANALYSIS OF TRANSMISSIBLE VENEREAL TUMOR IN DOGS AFTER TWO TREATMENT PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Fabiana Aguena Sales Lapa

    2012-06-01

    Full Text Available The transmissible venereal tumor (TVT is a contagious neoplasm of round cells that frequently affect dogs. The treatment consists of chemotherapy being more effective the vincristine alone, however the resistance emergence to this agent due multidrug resistance of the P-glycoprotein (P-gp, a transporter protein encoded by the MDR1 gene, has been taking the association with other drugs. Recent studies demonstrated the antitumoral effect of the avermectins when associated to the vincristine in the treatment of some neoplasms. Therefore, the objective of the present study was to compare the effectiveness of standard treatment of TVT with vincristine only when compared to combined treatment with vincristine and ivermectin, evaluated through number of applications of the two protocols, histopathological and cytological analysis from 50 dogs diagnosed with TVT during the period of 2007 to 2010. The combined protocol significant reduced the number of applications and cytological and histopathological findings collaborate with the hypothesis that the combination of vincristine and ivermectin promotes faster healing than the use of vincristine alone. Combination treatment with vincristine and ivermectin could be in the future an excellent therapeutic alternative for the treatment of TVT for probably reducing the resistance to vincristine, simultaneously reducing the cost of TVT treatment and promoting a faster recovery of the dog.

  17. Quantitative effects of composting state variables on C/N ratio through GA-aided multivariate analysis.

    Science.gov (United States)

    Sun, Wei; Huang, Guo H; Zeng, Guangming; Qin, Xiaosheng; Yu, Hui

    2011-03-01

    It is widely known that variation of the C/N ratio is dependent on many state variables during composting processes. This study attempted to develop a genetic algorithm aided stepwise cluster analysis (GASCA) method to describe the nonlinear relationships between the selected state variables and the C/N ratio in food waste composting. The experimental data from six bench-scale composting reactors were used to demonstrate the applicability of GASCA. Within the GASCA framework, GA searched optimal sets of both specified state variables and SCA's internal parameters; SCA established statistical nonlinear relationships between state variables and the C/N ratio; to avoid unnecessary and time-consuming calculation, a proxy table was introduced to save around 70% computational efforts. The obtained GASCA cluster trees had smaller sizes and higher prediction accuracy than the conventional SCA trees. Based on the optimal GASCA tree, the effects of the GA-selected state variables on the C/N ratio were ranged in a descending order as: NH₄+-N concentration>Moisture content>Ash Content>Mean Temperature>Mesophilic bacteria biomass. Such a rank implied that the variation of ammonium nitrogen concentration, the associated temperature and the moisture conditions, the total loss of both organic matters and available mineral constituents, and the mesophilic bacteria activity, were critical factors affecting the C/N ratio during the investigated food waste composting. This first application of GASCA to composting modelling indicated that more direct search algorithms could be coupled with SCA or other multivariate analysis methods to analyze complicated relationships during composting and many other environmental processes. Copyright © 2010 Elsevier B.V. All rights reserved.

  18. Analysis of cash flow ratios: A study on CMC

    Directory of Open Access Journals (Sweden)

    Somnath Das

    2018-01-01

    Full Text Available Cash flow ratios help financial users get relevant information about financial resources for a given time. Cash flow ratios are now used more than the traditional ones because it is more effective and justified. Cash flow based ratios are especially surprising because they do not only play a significant role in the credit rating of evaluation, but also forecast the failure of a corporation. In this study, we perform an empirical investigation on a company named CMC. From the study, it is clear that the liquidity and solvency positions of the company were moderate whereas the company maintained low profitability. On the other hand, the efficiency and sufficiency ratios of the study give us a new look on financial judgement.

  19. Privacy-Preserving Meter Report Protocol of Isolated Smart Grid Devices

    Directory of Open Access Journals (Sweden)

    Zhiwei Wang

    2017-01-01

    Full Text Available Smart grid aims to improve the reliability, efficiency, and security of the traditional grid, which allows two-way transmission and efficiency-driven response. However, a main concern of this new technique is that the fine-grained metering data may leak the personal privacy information of the customers. Thus, the data aggregation mechanism for privacy protection is required for the meter report protocol in smart grid. In this paper, we propose an efficient privacy-preserving meter report protocol for the isolated smart grid devices. Our protocol consists of an encryption scheme with additively homomorphic property and a linearly homomorphic signature scheme, where the linearly homomorphic signature scheme is suitable for privacy-preserving data aggregation. We also provide security analysis of our protocol in the context of some typical attacks in smart grid. The implementation of our protocol on the Intel Edison platform shows that our protocol is efficient enough for the physical constrained devices, like smart meters.

  20. Three-Stage Quantum Cryptography Protocol under Collective-Rotation Noise

    Directory of Open Access Journals (Sweden)

    Linsen Wu

    2015-05-01

    Full Text Available Information security is increasingly important as society migrates to the information age. Classical cryptography widely used nowadays is based on computational complexity, which means that it assumes that solving some particular mathematical problems is hard on a classical computer. With the development of supercomputers and, potentially, quantum computers, classical cryptography has more and more potential risks. Quantum cryptography provides a solution which is based on the Heisenberg uncertainty principle and no-cloning theorem. While BB84-based quantum protocols are only secure when a single photon is used in communication, the three-stage quantum protocol is multi-photon tolerant. However, existing analyses assume perfect noiseless channels. In this paper, a multi-photon analysis is performed for the three-stage quantum protocol under the collective-rotation noise model. The analysis provides insights into the impact of the noise level on a three-stage quantum cryptography system.

  1. Specimen preparation, imaging, and analysis protocols for knife-edge scanning microscopy.

    Science.gov (United States)

    Choe, Yoonsuck; Mayerich, David; Kwon, Jaerock; Miller, Daniel E; Sung, Chul; Chung, Ji Ryang; Huffman, Todd; Keyser, John; Abbott, Louise C

    2011-12-09

    Major advances in high-throughput, high-resolution, 3D microscopy techniques have enabled the acquisition of large volumes of neuroanatomical data at submicrometer resolution. One of the first such instruments producing whole-brain-scale data is the Knife-Edge Scanning Microscope (KESM), developed and hosted in the authors' lab. KESM has been used to section and image whole mouse brains at submicrometer resolution, revealing the intricate details of the neuronal networks (Golgi), vascular networks (India ink), and cell body distribution (Nissl). The use of KESM is not restricted to the mouse nor the brain. We have successfully imaged the octopus brain, mouse lung, and rat brain. We are currently working on whole zebra fish embryos. Data like these can greatly contribute to connectomics research; to microcirculation and hemodynamic research; and to stereology research by providing an exact ground-truth. In this article, we will describe the pipeline, including specimen preparation (fixing, staining, and embedding), KESM configuration and setup, sectioning and imaging with the KESM, image processing, data preparation, and data visualization and analysis. The emphasis will be on specimen preparation and visualization/analysis of obtained KESM data. We expect the detailed protocol presented in this article to help broaden the access to KESM and increase its utilization.

  2. Comparison of MANET Routing Protocols in Different Traffic and Mobility Models

    Directory of Open Access Journals (Sweden)

    J. Baraković

    2010-06-01

    Full Text Available Routing protocol election in MANET (Mobile Ad Hoc Network is a great challenge, because of its frequent topology changes and routing overhead. This paper compares performances of three routing protocols: Destination Sequenced Distance Vector (DSDV, Ad Hoc Ondemand Distance Vector (AODV and Dynamic Source Routing (DSR, based on results analysis obtained using simulations with different load and mobility scenarios performed with Network Simulator version 2 (NS-2. In low load and low mobility scenarios routing protocols perform in a similar manner. However, with mobility and load increasing DSR outperforms AODV and DSDV protocols.

  3. A software defined RTU multi-protocol automatic adaptation data transmission method

    Science.gov (United States)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  4. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  5. Propensity score analysis of recurrence for neutrophil-to-lymphocyte ratio in colorectal cancer.

    Science.gov (United States)

    Balde, Alpha I; Fang, Suzhen; He, Linyun; Cai, Zhai; Han, Shuai; Wang, Weiwei; Li, Zhou; Kang, Liang

    2017-11-01

    The perioperative serum neutrophil-to-lymphocyte ratio (NLR) has been proposed to predict adverse prognosis in colorectal cancer (CRC). However, its interpretation remains unclear. The present study aimed to clarify the prognostic value of NLR in predicting survival among CRC patients. A single-centre, retrospective, propensity score-matched study of adenocarcinoma patients who underwent D3 lymphadenectomy via laparoscopic or open surgery between 2010 and 2016 was conducted. A cutoff of 3.5 was used based on the receiver operating characteristic curve. To overcome selection biases, we performed a 1:1 match using six covariates. The high-preoperative NLR group had a higher recurrence rate than the low group (P analysis showed that increased NLR (P analysis showed that N2 (hazard ratio [HR], 2.492; P = 0.008) was an adverse prognostic factor for RFS. Univariate analysis for overall survival (OS) revealed that high perioperative NLR (P = 0.001), N1 (P = 0.01), N2 (P analysis showed that M1 (HR, 3.973; P < 0.001) and N2 (HR, 2.381; P = 0.013) were highly adverse factors for OS. Clinical assessments performed during a 21.14 (±16.20)-mo follow-up revealed that OS (P = 0.001) and RFS (P < 0.001) were worse in the high-perioperative group than in the low group between the matched groups. An elevated preoperative NLR is a strong predictor of worse RFS and OS in CRC patients. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. A Multipath Routing Protocol Based on Bloom Filter for Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Junwei Jin

    2016-01-01

    Full Text Available On-demand multipath routing in a wireless ad hoc network is effective in achieving load balancing over the network and in improving the degree of resilience to mobility. In this paper, the salvage capable opportunistic node-disjoint multipath routing (SNMR protocol is proposed, which forms multiple routes for data transmission and supports packet salvaging with minimum overhead. The proposed mechanism constructs a primary path and a node-disjoint backup path together with alternative paths for the intermediate nodes in the primary path. It can be achieved by considering the reverse route back to the source stored in the route cache and the primary path information compressed by a Bloom filter. Our protocol presents higher capability in packet salvaging and lower overhead in forming multiple routes. Simulation results show that SNMR outperforms the compared protocols in terms of packet delivery ratio, normalized routing load, and throughput.

  7. Word Class Ratios and Genres in Written Japanese: Revisiting the Modifier Verb Ratio

    Directory of Open Access Journals (Sweden)

    Bor HODOŠČEK

    2011-10-01

    Full Text Available This paper explores the variability of genres in the Balanced Corpus of Contemporary Written Japanese using the modifier-verb ratio proposed by Kabashima and Jukaku (1965. Using bagplots to quantifying the relation between noun and modifier-verb ratios, as well as some summary statistics obtain from them, we attempt to classify genres according to Kabashima and Jugaku (1965. Our initial analysis confirms previous research results, while at the same time uncovering some contradictions in the ratios of the genre of magazines.

  8. Analysis of the Implementation of Standardized Clinical Protocol «Diabetes Mellitus Type 2» by Quality Indicators in Institutions of Kyiv Region

    Directory of Open Access Journals (Sweden)

    V.I. Tkachenko

    2014-10-01

    Full Text Available In Ukraine, a standardized clinical protocol (SCP to provide medical care in diabetes mellitus type 2 (order of the Ministry of Healthcare of Ukraine dated 21.12.2012 № 1118, which identifies 4 quality indicators, is being implemented. The objective of research — to analyze the implementation of SCP based on monitoring of quality indicators in the institutions of the Kyiv region. Materials and Methods. Technique for assessing the quality of diabetes care, one element of which is the monitoring of quality indicators specified in SCP, has been developed and applied. Collection and analysis of information was carried out by forms of primary records № 025/030 and 030/o, forms of statistical reporting № 12 and 20. Statistical analysis was performed using Excel 2007, SPSS. Results. Today, primary health care institutions in Kyiv region developed local protocols that confirms the implementation of the first quality indicator, in accordance with the desired level of the indicator value by SCP. The second indicator — the percentage of patients who were defined the level of glycated hemoglobin in the reporting period amounted to 12.2 %, which is higher than in 2012 (8.84 %, but remains low. The third quality indicator — the percentage of patients who were admitted to hospital for diabetes mellitus and its complications during the reporting period amounted to 15.01 %, while in 2012 it stood at 8.66 %. For comparison, this figure in 2007 was 9.37 %. Conclusions. The quality of care at an early stage of implementation is not enough, partly due to the lack of awareness by physicians of major provisions of the protocol, lack of equipment, the need of payment by a patient for medical services specified in the protocol, lack of doctors’ understanding of the characteristics of different types of medical and technological documents and difficulties in the development and implementation of local protocols, particularly. The obtained results are

  9. A Practice-Based Evaluation of Distress Screening Protocol Adherence and Medical Service Utilization.

    Science.gov (United States)

    Zebrack, Brad; Kayser, Karen; Bybee, Deborah; Padgett, Lynne; Sundstrom, Laura; Jobin, Chad; Oktay, Julianne

    2017-07-01

    Background: This study examined the extent to which cancer programs demonstrated adherence to their own prescribed screening protocol, and whether adherence to that protocol was associated with medical service utilization. The hypothesis is that higher rates of service utilization are associated with lower rates of adherence to screening protocols. Methods: Oncology social workers at Commission on Cancer-accredited cancer programs reviewed electronic health records (EHRs) in their respective cancer programs during a 2-month period in 2014. Rates of overall adherence to a prescribed distress screening protocol were calculated based on documentation in the EHR that screening adherence and an appropriate clinical response had occurred. We examined documentation of emergency department (ED) use and hospitalization within 2 months after the screening visit. Results: Review of 8,409 EHRs across 55 cancer centers indicated that the overall adherence rate to screening protocols was 62.7%. The highest rates of adherence were observed in Community Cancer Programs (76.3%) and the lowest rates were in NCI-designated Cancer Centers (43.3%). Rates of medical service utilization were significantly higher than expected when overall protocol adherence was lacking. After controlling for patient and institutional characteristics, risk ratios for ED use (0.82) and hospitalization (0.81) suggest that when overall protocol adherence was documented, 18% to 19% fewer patients used these medical services. Conclusions: The observed associations between a mandated psychosocial care protocol and medical service utilization suggest opportunities for operational efficiencies and costs savings. Further investigations of protocol integrity, as well as the clinical care models by which psychosocial care is delivered, are warranted. Copyright © 2017 by the National Comprehensive Cancer Network.

  10. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  11. Screening Protocol for Early Identification of Brazilian Children at Risk for Dyslexia

    Directory of Open Access Journals (Sweden)

    Giseli D. Germano

    2017-10-01

    Full Text Available Early identification of students at risk of dyslexia has been an educational challenge in the past years. This research had two main goals. First, we aimed to develop a screening protocol for early identification of Brazilian children at risk for dyslexia; second, we aimed to identify the predictive variables of this protocol using Principal Component Analysis. The major step involved in developing this protocol was the selection of variables, which were chosen based on the literature review and linguistic criteria. The screening protocol was composed of seven cognitive-linguistic skills: Letter naming; Phonological Awareness (which comprises the following subtests: Rhyme production, Rhyme identification, Syllabic segmentation, Production of words from a given phoneme, Phonemic Synthesis, and Phonemic analysis; Phonological Working memory, Rapid naming Speed; Silent reading; Reading of words and non-words; and Auditory Comprehension of sentences from pictures. A total of 149 children, aged from 6 years to 6 and 11, of both genders who were enrolled in the 1st grade of elementary public schools were submitted to the screening protocol. Principal Component Analysis revealed four factors, accounting for 64.45% of the variance of the Protocol variables: first factor (“pre-reading”, second factor (“decoding”, third factor (“Reading”, and fourth factor “Auditory processing.” The factors found corroborate those reported in the National and International literature and have been described as early signs of dyslexia and reading problems.

  12. Prognostic significance of neutrophil-to-lymphocyte ratio in biliary tract cancers: a systematic review and meta-analysis.

    Science.gov (United States)

    Tang, Haowen; Lu, Wenping; Li, Bingmin; Li, Chonghui; Xu, Yinzhe; Dong, Jiahong

    2017-05-30

    Inflammation was considered to perform crucial roles in the development and metastasis of malignancies. A heightened neutrophil-lymphocyte ratio has been described to be associated with detrimental survivals in different malignancies. Debate remains over the impact of heightened neutrophil-lymphocyte ratio on survivals in biliary tract cancer. The review evaluated the prognostic value of neutrophil-lymphocyte ratio in biliary tract cancer. MEDLINE, the Cochrane Library, EMBASE, and the Chinese SinoMed were systematically searched for relevant articles. Associations between neutrophil-lymphocyte ratio and long-term outcomes were expressed as the hazard ratios and 95% confidence intervals. The odds ratio was utilized to assess the association between neutrophil-lymphocyte ratio and clinicopathological parameters. Fourteen studies consisting of 3217 patients were analyzed: 1278 (39.73%) in the high pretreatment neutrophil-lymphocyte ratio group and 1939 (60.27%) in the low pretreatment neutrophil-lymphocyte ratio one. The results proved that heightened pretreatment neutrophil-lymphocyte ratio was significantly associated with detrimental overall survival and relapse free survival for biliary tract cancer patients. In addition, elevated neutrophil-lymphocyte ratio was positively correlated with higher carbohydrate antigen 19-9 levels, advanced TNM staging and greater lymph node involvement. This meta-analysis marked that an increased pretreatment neutrophil-lymphocyte ratio was significantly linked with detrimental long-term outcomes and clinicopathological parameters for patients with biliary tract cancer.

  13. Modelling and Analysis of a Collision Avoidance Protocol using SPIN and UPPAAL

    DEFF Research Database (Denmark)

    Skou, Arne; Larsen, Kim Guldstrand; Jensen, Henrik Ejersbo

    1997-01-01

    , the modelling of the media becomes ackward due to the lack of broadcast communication in the PROMELA language. On the other hand we find it easy to model the timed aspects using the UPPAAL tool. Especially, the notion of committed locations supports the modelling of broadcast communication. However......This paper compares the tools SPIN and UPPAAL by modelling and verifying a Collision Avoidance Protocol for an Ethernet-like medium. We find that SPIN is well suited for modelling the untimed aspects of the protocol processes and for expressing the relevant (untimed) properties. However...

  14. Distributed Role Selection With ANC and TDBC Protocols in Two-Way Relaying Systems

    KAUST Repository

    Ding, Haiyang; da Costa, Daniel Benevides; Alouini, Mohamed-Slim; Ge, Jianhua; Gong, Feng-Kui

    2015-01-01

    and the scaling law of the system outage behavior at high signal-to-noise ratio (SNR) is characterized, which manifests that d-ROSE can enhance the system diversity gain to one-order higher relative to the ANC and TDBC protocols. It is also shown that d-ROSE can

  15. Verification of the safety communication protocol in train control system using colored Petri net

    International Nuclear Information System (INIS)

    Chen Lijie; Tang Tao; Zhao Xianqiong; Schnieder, Eckehard

    2012-01-01

    This paper deals with formal and simulation-based verification of the safety communication protocol in ETCS (European Train Control System). The safety communication protocol controls the establishment of safety connection between train and trackside. Because of its graphical user interface and modeling flexibility upon the changes in the system conditions, this paper proposes a composition Colored Petri Net (CPN) representation for both the logic and the timed model. The logic of the protocol is proved to be safe by means of state space analysis: the dead markings are correct; there are no dead transitions; being fair. Further analysis results have been obtained using formal and simulation-based verification approach. The timed models for the open transmit system and the application process are created for the purpose of performance analysis of the safety communication protocol. The models describe the procedure of data transmission and processing, and also provide relevant timed and stochastic factors, as well as time delay and lost packet, which may influence the time for establishment of safety connection of the protocol. Time for establishment of safety connection of the protocol in normal state is verified by formal verification, and then time for establishment of safety connection with different probability of lost packet is simulated. After verification it is found that the time for establishment of safety connection of the safety communication protocol satisfies the safety requirements.

  16. Cost-utility analysis of immune tolerance induction therapy versus on-demand treatment with recombinant factor VII for hemophilia A with high titer inhibitors in Iran

    Directory of Open Access Journals (Sweden)

    Rasekh HR

    2011-11-01

    Full Text Available Hamid Reza Rasekh1, Ali Imani1, Mehran Karimi2, Mina Golestani11Shahid Beheshti University of Medical Sciences, Department of Pharmaceutical Management and Pharmacoeconomics, School of Pharmacy, Tehran, 2University of Shiraz Medical Sciences, Hematology Research Center, Shiraz, IranBackground: In developing countries, the treatment of hemophilia patients with inhibitors is presently the most challenging and serious issue in hemophilia management, direct costs of clotting factor concentrates accounting for >98% of the highest economic burden absorbed for the health care of patients in this setting. In the setting of chronic diseases, cost-utility analysis, which takes into account the beneficial effects of a given treatment/health care intervention in terms of health-related quality of life, is likely to be the most appropriate approach.Objective: The aim of this study was to assess the incremental cost-effectiveness ratios of immune tolerance induction (ITI therapy with plasma-derived factor VIII concentrates versus on-demand treatment with recombinant-activated FVIIa (rFVIIa in hemophilia A with high titer inhibitors from an Iranian Ministry of Health perspective.Methods: This study was based on the study of Knight et al, which evaluated the cost-effectiveness ratios of different treatments for hemophilia A with high-responding inhibitors. To adapt Knight et al's results to the Iranian context, a few clinical parameters were varied, and cost data were replaced with the corresponding Iranian estimates of resource use. The time horizon of the analysis was 10 years. One-way sensitivity analyses were performed, varying the cost of the clotting factor, the drug dose, and the administration frequency, to test the robustness of the analysis.Results: Comparison of the incremental cost-effectiveness ratios between the three ITI protocols and the on-demand regimen with rFVIIa shows that all three ITI protocols dominate the on-demand regimen with r

  17. Advanced CUBIC protocols for whole-brain and whole-body clearing and imaging.

    Science.gov (United States)

    Susaki, Etsuo A; Tainaka, Kazuki; Perrin, Dimitri; Yukinaga, Hiroko; Kuno, Akihiro; Ueda, Hiroki R

    2015-11-01

    Here we describe a protocol for advanced CUBIC (Clear, Unobstructed Brain/Body Imaging Cocktails and Computational analysis). The CUBIC protocol enables simple and efficient organ clearing, rapid imaging by light-sheet microscopy and quantitative imaging analysis of multiple samples. The organ or body is cleared by immersion for 1-14 d, with the exact time required dependent on the sample type and the experimental purposes. A single imaging set can be completed in 30-60 min. Image processing and analysis can take whole-brain neural activities at single-cell resolution using Arc-dVenus transgenic (Tg) mice. CUBIC informatics calculated the Venus signal subtraction, comparing different brains at a whole-organ scale. These protocols provide a platform for organism-level systems biology by comprehensively detecting cells in a whole organ or body.

  18. Identifying Malignant Pleural Effusion by A Cancer Ratio (Serum LDH: Pleural Fluid ADA Ratio).

    Science.gov (United States)

    Verma, Akash; Abisheganaden, John; Light, R W

    2016-02-01

    We studied the diagnostic potential of serum lactate dehydrogenase (LDH) in malignant pleural effusion. Retrospective analysis of patients hospitalized with exudative pleural effusion in 2013. Serum LDH and serum LDH: pleural fluid ADA ratio was significantly higher in cancer patients presenting with exudative pleural effusion. In multivariate logistic regression analysis, pleural fluid ADA was negatively correlated 0.62 (0.45-0.85, p = 0.003) with malignancy, whereas serum LDH 1.02 (1.0-1.03, p = 0.004) and serum LDH: pleural fluid ADA ratio 0.94 (0.99-1.0, p = 0.04) was correlated positively with malignant pleural effusion. For serum LDH: pleural fluid ADA ratio, a cut-off level of >20 showed sensitivity, specificity of 0.98 (95 % CI 0.92-0.99) and 0.94 (95 % CI 0.83-0.98), respectively. The positive likelihood ratio was 32.6 (95 % CI 10.7-99.6), while the negative likelihood ratio at this cut-off was 0.03 (95 % CI 0.01-0.15). Higher serum LDH and serum LDH: pleural fluid ADA ratio in patients presenting with exudative pleural effusion can distinguish between malignant and non-malignant effusion on the first day of hospitalization. The cut-off level for serum LDH: pleural fluid ADA ratio of >20 is highly predictive of malignancy in patients with exudative pleural effusion (whether lymphocytic or neutrophilic) with high sensitivity and specificity.

  19. Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    2017-01-01

    Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.

  20. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  1. Goal-Directed Fluid Resuscitation Protocol Based on Arterial Waveform Analysis of Major Burn Patients in a Mass Burn Casualty.

    Science.gov (United States)

    Chiao, Hao-Yu; Chou, Chang-Yi; Tzeng, Yuan-Sheng; Wang, Chih-Hsin; Chen, Shyi-Gen; Dai, Niann-Tzyy

    2018-02-01

    Adequate fluid titration during the initial resuscitation period of major burn patients is crucial. This study aimed to evaluate the feasibility and efficacy of a goal-directed fluid resuscitation protocol that used hourly urine output plus the arterial waveform analysis FloTrac (Edwards LifeSciences, Irvine, Calif) system for major burns to avoid fluid overload. We conducted a retrospective cohort study of 43 major burn patients at the Tri-Service General Hospital after the Formosa Fun Coast Dust Explosion on June 27, 2015. Because of the limited capacity of intensive care units (ICUs), 23 intubated patients were transferred from the burn wards or emergency department to the ICU within 24 hours. Fluid administration was adjusted to achieve a urine output of 30 to 50 mL/h, cardiac index greater than 2.5 L/min/m, and stroke volume variation (SVV) less than 12%. The hourly crystalloid fluid infusion rate was titrated based on SVV and hourly urine output. Of the 23 critically burned patients admitted to the ICU, 13 patients who followed the goal-directed fluid resuscitation protocol within 12 hours postburn were included in the analysis. The mean age (years) was 21.8, and the mean total body surface area (TBSA) burned (%) was 68.0. The mean Revised Baux score was 106.8. All patients sustained inhalation injury. The fluid volumes administered to patients in the first 24 hours and the second 24 hours (mL/kg/% total body surface area) were 3.62 ± 1.23 and 2.89 ± 0.79, respectively. The urine outputs in the first 24 hours and the second 24 hours (mL/kg/h) were 1.13 ± 0.66 and 1.53 ± 0.87, respectively. All patients achieved the established goals within 32 hours postburn. In-hospital mortality rate was 0%. The SVV-based goal-directed fluid resuscitation protocol leads to less unnecessary fluid administration during the early resuscitation phase. Clinicians can efficaciously manage the dynamic body fluid changes in major burn patients under the guidance of the protocol.

  2. Measurement of mercury isotopic ratio in stone meteorites by neutron activation analysis

    International Nuclear Information System (INIS)

    Thakur, A.N.

    1997-01-01

    196 Hg and 202 Hg isotopes have been measured by neutron activation analysis in samples of twelve stone meteorites. Hg is extracted from an irradiated sample by stepwise heating. The mercury concentrations vary from 0.07 to 33 ppm. While most of the samples give 196 Hg/ 202 Hg ratios similar to terrestrial value within error limits, in some cases large anomalies are observed. A number of control experiments have been devised, that show the absence of experimental artifacts, during sample preparation, neutron irradiation, chemical separation and counting stages. Several anomalous and normal Hg distillate have been re-irradiated as Hg-diethyl-dithio-carbamate complex to eliminate the influence of neutron self shielding and interfering reactions from matrix elements. The isotopic ratio patterns persist in the distillates too proving that any artifacts during meteorite irradiation and measurement are essentially absent. Both positive and negative anomalies are observed: however, the negative anomalies are much more frequent and abundant. In an extreme case of fine grained magnetic particles of Ambapur Nagla the 196 Hg is apparently absent in the Hg released at 100 deg C. A 2σ 196 Hg/ 202 Hg value is only 6% relative to the monitor. This experiment shows the robustness of neutron activation analysis and suggest some constrains on the formation history of stone meteorites. (author)

  3. Mean-field framework for performance evaluation of push–pull gossip protocols

    NARCIS (Netherlands)

    Bakhshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  4. Mean-field framework for performance evaluation of push-pull gossip protocols

    NARCIS (Netherlands)

    Bakhshi, R.; Cloth, L.; Fokkink, W.J.; Haverkort, B.

    2011-01-01

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  5. The Rejuvenating Effect in Hot Asphalt Recycling by Mortar Transfer Ratio and Image Analysis.

    Science.gov (United States)

    Wang, Fusong; Wang, Zipeng; Li, Chao; Xiao, Yue; Wu, Shaopeng; Pan, Pan

    2017-05-24

    Using a rejuvenator to improve the performance of asphalt pavement is an effective and economic way of hot asphalt recycling. This research analyzes the rejuvenating effect on aged asphalt by means of a Mortar Transfer Ratio (MTR) test, which concerns the ratio of asphalt mortar that moves from recycled aggregates (RAP aggregates) to fresh added aggregates when aged asphalt is treated with a regenerating agent and comes into contact with fresh aggregates. The proposed MTR test analyzes the regeneration in terms of the softening degree on aged asphalt when the rejuvenator is applied. The covered area ratio is studied with an image analyzing tool to understand the possibility of mortar transferring from RAP aggregates to fresh aggregates. Additionally, a micro-crack closure test is conducted and observed through a microscope. The repairing ability and diffusion characteristics of micro-cracks can therefore be analyzed. The test results demonstrate that the proposed mortar transfer ratio is a feasible way to evaluate rejuvenator diffusion during hot recycling. The mortar transfer ratio and uncovered area ratio on fresh aggregates are compatible, and can be used to quantify the contribution of the rejuvenator. Within a certain temperature range, the diffusing effect of the rejuvenator is better when the diffusing temperature is higher. The diffusion time of the rejuvenator is optimum when diffusion occurs for 4-8 h. When the rejuvenator is properly applied, the rough and cracking surface can be repaired, resulting in better covered aggregates. The micro-closure analysis visually indicates that rejuvenators can be used to repair the RAP aggregates during hot recycling.

  6. Beta-binomial model for meta-analysis of odds ratios.

    Science.gov (United States)

    Bakbergenuly, Ilyas; Kulinskaya, Elena

    2017-05-20

    In meta-analysis of odds ratios (ORs), heterogeneity between the studies is usually modelled via the additive random effects model (REM). An alternative, multiplicative REM for ORs uses overdispersion. The multiplicative factor in this overdispersion model (ODM) can be interpreted as an intra-class correlation (ICC) parameter. This model naturally arises when the probabilities of an event in one or both arms of a comparative study are themselves beta-distributed, resulting in beta-binomial distributions. We propose two new estimators of the ICC for meta-analysis in this setting. One is based on the inverted Breslow-Day test, and the other on the improved gamma approximation by Kulinskaya and Dollinger (2015, p. 26) to the distribution of Cochran's Q. The performance of these and several other estimators of ICC on bias and coverage is studied by simulation. Additionally, the Mantel-Haenszel approach to estimation of ORs is extended to the beta-binomial model, and we study performance of various ICC estimators when used in the Mantel-Haenszel or the inverse-variance method to combine ORs in meta-analysis. The results of the simulations show that the improved gamma-based estimator of ICC is superior for small sample sizes, and the Breslow-Day-based estimator is the best for n⩾100. The Mantel-Haenszel-based estimator of OR is very biased and is not recommended. The inverse-variance approach is also somewhat biased for ORs≠1, but this bias is not very large in practical settings. Developed methods and R programs, provided in the Web Appendix, make the beta-binomial model a feasible alternative to the standard REM for meta-analysis of ORs. © 2017 The Authors. Statistics in Medicine Published by John Wiley & Sons Ltd. © 2017 The Authors. Statistics in Medicine Published by John Wiley & Sons Ltd.

  7. Distributed Role Selection With ANC and TDBC Protocols in Two-Way Relaying Systems

    KAUST Repository

    Ding, Haiyang

    2015-09-28

    This paper advocates a distributed role selection strategy to coordinate two-way relaying transmissions among three cooperative nodes. For such, the local channel state information comparison and decision feedback mechanism are merged into classical analog network coding (ANC) and time division broadcast (TDBC) protocols such that the cooperative role of each node can be designated in a distributed fashion. We refer to this distributed role selection rule as d-ROSE. In both ANC-based and TDBC-based two-way relaying scenarios, strict proof for the equivalence of d-ROSE and optimal ROSE is given, which indicates that albeit the different form, their final role decision is essentially the same. Outage analysis for the d-ROSE strategy is carried out and the scaling law of the system outage behavior at high signal-to-noise ratio (SNR) is characterized, which manifests that d-ROSE can enhance the system diversity gain to one-order higher relative to the ANC and TDBC protocols. It is also shown that d-ROSE can reduce the signaling overhead upto 60% to perform the outage-optimal role selection. Finally, the impacts of node placement on the outage performance as well as the average signaling overhead of d-ROSE are numerically evaluated and some useful conclusions are drawn. © 2015 IEEE.

  8. Security analysis of the “Ping–Pong” quantum communication protocol in the presence of collective-rotation noise

    International Nuclear Information System (INIS)

    Li, Jian; Li, Lingyun; Jin, Haifei; Li, Ruifan

    2013-01-01

    Environmental noise is inevitable in non-isolated systems. It is, therefore, necessary to analyze the security of the “Ping–Pong” protocol in a noisy environment. An excellent model for collective-rotation noise is introduced, and information theoretical methods are applied to analyze the security of this protocol. If noise level ε is lower than 11%, an eavesdropper can gain some, but not all, information freely without being detected. Otherwise, the protocol becomes insecure. We conclude that the use of ‘Ping–Pong’ protocol as a quantum secure direct communication (QSDC) protocol is quasi-secure, as declared by the original author when ε⩽11%.

  9. Security analysis of the “Ping–Pong” quantum communication protocol in the presence of collective-rotation noise

    Energy Technology Data Exchange (ETDEWEB)

    Li, Jian; Li, Lingyun, E-mail: lilingyun@bupt.edu.cn; Jin, Haifei; Li, Ruifan

    2013-11-22

    Environmental noise is inevitable in non-isolated systems. It is, therefore, necessary to analyze the security of the “Ping–Pong” protocol in a noisy environment. An excellent model for collective-rotation noise is introduced, and information theoretical methods are applied to analyze the security of this protocol. If noise level ε is lower than 11%, an eavesdropper can gain some, but not all, information freely without being detected. Otherwise, the protocol becomes insecure. We conclude that the use of ‘Ping–Pong’ protocol as a quantum secure direct communication (QSDC) protocol is quasi-secure, as declared by the original author when ε⩽11%.

  10. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  11. Fault-Tolerant Consensus of Multi-Agent System With Distributed Adaptive Protocol.

    Science.gov (United States)

    Chen, Shun; Ho, Daniel W C; Li, Lulu; Liu, Ming

    2015-10-01

    In this paper, fault-tolerant consensus in multi-agent system using distributed adaptive protocol is investigated. Firstly, distributed adaptive online updating strategies for some parameters are proposed based on local information of the network structure. Then, under the online updating parameters, a distributed adaptive protocol is developed to compensate the fault effects and the uncertainty effects in the leaderless multi-agent system. Based on the local state information of neighboring agents, a distributed updating protocol gain is developed which leads to a fully distributed continuous adaptive fault-tolerant consensus protocol design for the leaderless multi-agent system. Furthermore, a distributed fault-tolerant leader-follower consensus protocol for multi-agent system is constructed by the proposed adaptive method. Finally, a simulation example is given to illustrate the effectiveness of the theoretical analysis.

  12. Effect modification of FADS2 polymorphisms on the association between breastfeeding and intelligence: protocol for a collaborative meta-analysis.

    Science.gov (United States)

    Hartwig, Fernando Pires; Davies, Neil Martin; Horta, Bernardo Lessa; Victora, Cesar Gomes; Davey Smith, George

    2016-06-15

    Evidence from observational studies and randomised controlled trials suggests that breastfeeding is positively associated with IQ, possibly because breast milk is a source of long-chain polyunsaturated fatty acids. Different studies have detected gene-breastfeeding interactions involving FADS2 variants and intelligence. However, findings are inconsistent regarding the direction of such effect modification. To clarify how FADS2 and breastfeeding interact in their association with IQ, we are conducting a consortium-based meta-analysis of independent studies. Results produced by each individual study using standardised analysis scripts and harmonised data will be used. breastfeeding, IQ and either rs174575 or rs1535 polymorphisms available; and being of European ancestry. twin studies; only poorly imputed genetic data available; or unavailability of proper ethics approval. Studies will be invited based on being known to have at least some of the required data, or suggested by participating studies as potentially eligible. This inclusive approach will favour achieving a larger sample size and be less prone to publication bias. Improving current understanding of FADS2-breastfeeding interaction may provide important biological insights regarding the importance of long-chain polyunsaturated fatty acids for the breastfeeding-IQ association. This meta-analysis will help to improve such knowledge by replicating earlier studies, conducting additional analysis and evaluating different sources of heterogeneity. Publishing this protocol will minimise the possibility of bias due to post hoc changes to the analysis protocol. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  13. Modelling the protocol stack in NCS with deterministic and stochastic petri net

    Science.gov (United States)

    Hui, Chen; Chunjie, Zhou; Weifeng, Zhu

    2011-06-01

    Protocol stack is the basis of the networked control systems (NCS). Full or partial reconfiguration of protocol stack offers both optimised communication service and system performance. Nowadays, field testing is unrealistic to determine the performance of reconfigurable protocol stack; and the Petri net formal description technique offers the best combination of intuitive representation, tool support and analytical capabilities. Traditionally, separation between the different layers of the OSI model has been a common practice. Nevertheless, such a layered modelling analysis framework of protocol stack leads to the lack of global optimisation for protocol reconfiguration. In this article, we proposed a general modelling analysis framework for NCS based on the cross-layer concept, which is to establish an efficiency system scheduling model through abstracting the time constraint, the task interrelation, the processor and the bus sub-models from upper and lower layers (application, data link and physical layer). Cross-layer design can help to overcome the inadequacy of global optimisation based on information sharing between protocol layers. To illustrate the framework, we take controller area network (CAN) as a case study. The simulation results of deterministic and stochastic Petri-net (DSPN) model can help us adjust the message scheduling scheme and obtain better system performance.

  14. Is there a social gradient of sarcopenia? A meta-analysis and systematic review protocol.

    Science.gov (United States)

    Green, Darci; Duque, Gustavo; Fredman, Nick; Rizvi, Aoun; Brennan-Olsen, Sharon Lee

    2018-01-13

    Sarcopenia (or loss of muscle mass and function) is a relatively new area within the field of musculoskeletal research and medicine. Investigating whether there is a social gradient, including occupation type and income level, of sarcopenia, as observed for other diseases, will contribute significantly to the limited evidence base for this disease. This new information may inform the prevention and management of sarcopenia and widen the evidence base to support existing and future health campaigns. We will conduct a systematic search of the databases PubMed, Ovid, CINAHL, Scopus and EMBASE to identify articles that investigate associations between social determinants of health and sarcopenia in adults aged 50 years and older. Eligibility of the selected studies will be determined by two independent reviewers. The methodological quality of eligible studies will be assessed according to predetermined criteria. Established statistical methods to identify and control for heterogeneity will be used, and where appropriate, we will conduct a meta-analysis. In the event that heterogeneity prevents numerical synthesis, a best evidence analysis will be employed. This systematic review protocol adheres to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols reporting guidelines and will be registered with the International Prospective Register of Systematic Reviews (PROSPERO). This systematic review will use published data, thus ethical permissions will not be required. In addition to peer-reviewed publication, our results will be presented at (inter)national conferences relevant to the field of sarcopenia, ageing and/or musculoskeletal health and disseminated both electronically and in print. CRD42017072253. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  15. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Yo-Hsuan Chuang

    2018-04-01

    Full Text Available Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs. Within this kind of Internet of Things (IoT environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  16. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Science.gov (United States)

    Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-01-01

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168

  17. A Lightweight Continuous Authentication Protocol for the Internet of Things.

    Science.gov (United States)

    Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-04-05

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  18. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  19. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  20. Ratio of geometric means to analyze continuous outcomes in meta-analysis: comparison to mean differences and ratio of arithmetic means using empiric data and simulation.

    Science.gov (United States)

    Friedrich, Jan O; Adhikari, Neill K J; Beyene, Joseph

    2012-07-30

    Meta-analyses pooling continuous outcomes can use mean differences (MD), standardized MD (MD in pooled standard deviation units, SMD), or ratio of arithmetic means (RoM). Recently, ratio of geometric means using ad hoc (RoGM (ad hoc) ) or Taylor series (RoGM (Taylor) ) methods for estimating variances have been proposed as alternative effect measures for skewed continuous data. Skewed data are suggested for summary measures of clinical parameters restricted to positive values which have large coefficients of variation (CV). Our objective was to compare performance characteristics of RoGM (ad hoc) and RoGM (Taylor) to MD, SMD, and RoM. We used empiric data from systematic reviews reporting continuous outcomes and selected from each the meta-analysis with the most and at least 5 trials (Cochrane Database [2008, Issue 1]). We supplemented this with simulations conducted with representative parameters. Pooled results were calculated using each effect measure. Of the reviews, 232/5053 met the inclusion criteria. Empiric data and simulation showed that RoGM (ad hoc) exhibits more extreme treatment effects and greater heterogeneity than all other effect measures. Compared with MD, SMD, and RoM, RoGM (Taylor) exhibits similar treatment effects, more heterogeneity when CV ≤0.7, and less heterogeneity when CV > 0.7. In conclusion, RoGM (Taylor) may be considered for pooling continuous outcomes in meta-analysis when data are skewed, but RoGM (ad hoc) should not be used. However, clinicians' lack of familiarity with geometric means combined with acceptable performance characteristics of RoM in most situations suggests that RoM may be the preferable ratio method for pooling continuous outcomes in meta-analysis. Copyright © 2012 John Wiley & Sons, Ltd.

  1. Hubungan Analisis Ratio Keuangan dengan Kesehatan Perusahaan

    Directory of Open Access Journals (Sweden)

    Soekarso Soekarso

    2009-09-01

    Full Text Available In the business world, companies develop a vision and mission to improve welfare in the future. The work program the company is to achieve productivity and profitability. Finance in the company is one of the strategic functions that includes wealth management and transformation of added value (added value and also the control of corporate health. The financial statements such as balance sheet (balance sheet, profit and loss statement (income statement, and financial ratio (financial ratios, reflects the company's performance and health. Financial ratio analysis relates to the health of the company through a ratio of effectiveness, efficiency, productivity, profitability, liquidity, and solvability. Analysis shows that whenever actual value of financial ratios is above standard it means the company is healthy, and when the actual value of financial ratios is below the standard, it reversely means that companies are not healthy.

  2. Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks

    DEFF Research Database (Denmark)

    Zenner, Erik

    In order to save bandwidth and thus battery power, sensor network measurements are sometimes aggregated en-route while being reported back to the querying server. Authentication of the measurements then becomes a challenge if message integrity is important for the application. At ESAS 2007, the End......-by-Hop protocol for securing in-network aggregation for sensor nodes was presented. The solution was claimed to be secure and efficient and to provide the possibility of trading off bandwidth against computation time on the server. In this paper, we disprove these claims. We describe several attacks against...... the proposed solution and point out shortcomings in the original complexity analysis. In particular, we show that the proposed solution is inferior to a naive solution without in-network aggregation both in security and in efficiency....

  3. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  4. Influence of a multidisciplinary protocol on nutritional status at diagnosis in amyotrophic lateral sclerosis.

    Science.gov (United States)

    López-Gómez, Juan José; Torres-Torres, Beatriz; Gómez-Hoyos, Emilia; Fernández-Buey, Nieves; Ortolá-Buigues, Ana; Castro-Lozano, Ángeles; Arenillas-Lara, Juan F; De Luis-Román, Daniel A

    2018-04-01

    The aim of this study were to understand the influence of a multidisciplinary care protocol in amyotrophic lateral sclerosis (ALS) on the change in the delay of remission to the nutrition specialist and the initial nutritional status. A cohort study was performed in 43 patients with ALS who were referred to the Nutrition Unit between April 2015 and April 2017. Anthropometric parameters and diagnostic times were collected, and the nutritional status was studied through subjective global assessment (SGA). Patients who were included before (control cohort [NoP]) and after (protocol cohort [P]) a multidisciplinary protocol were compared. The mean age of the participants was 66.79 y (10.86 y). Of the patients, 62.8% belonged to the protocol cohort. Patients who started the protocol had a lower delay in initial assessment by a nutrition specialist (P:2 [1-6] mo/NoP:12 [10-29] mo; P = 0.03). When the nutritional status was analyzed according to the SGA, more patients who did not initiate protocol were in the state of severe malnutrition (C) (P 22.2% versus NoP 60%; P = 0.01). Entry into the protocol was an independent protective factor of the presence of severe malnutrition at the beginning of the nutritional follow-up (odds ratio, 0.20; 95% confidence interval, 0.03-0.73; P = 0.02). The implementation of a multidisciplinary protocol in ALS allowed patients to present a lower percentage of severe malnutrition in an initial assessment by the nutrition specialist. This protocol is a protective factor for the presence of malnutrition at the beginning of support. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. Study protocol for the Cities Changing Diabetes programme

    DEFF Research Database (Denmark)

    Napier, A David; Nolan, John J; Bagger, Malene

    2017-01-01

    and management are improving, complications remain common, and diabetes is among the leading causes of vision loss, amputation, neuropathy and renal and cardiovascular disease worldwide. We present a research protocol for exploring the drivers of type 2 diabetes and its complications in urban settings through...... the Cities Changing Diabetes (CCD) partnership programme. METHODS AND ANALYSIS: A global study protocol is implemented in eight collaborating CCD partner cities. In each city, academic institutions, municipal representatives and local stakeholders collaborate to set research priorities and plan...... Assessment explores the urban context in vulnerability to type 2 diabetes and identifies social factors and cultural determinants relevant to health, well-being and diabetes. ETHICS AND DISSEMINATION: The protocol steers the collection of primary and secondary data across the study sites. Research ethics...

  6. Quantitative and qualitative comparison of MR imaging of the temporomandibular joint at 1.5 and 3.0 T using an optimized high-resolution protocol.

    Science.gov (United States)

    Manoliu, Andrei; Spinner, Georg; Wyss, Michael; Erni, Stefan; Ettlin, Dominik A; Nanz, Daniel; Ulbrich, Erika J; Gallo, Luigi M; Andreisek, Gustav

    2016-01-01

    To quantitatively and qualitatively compare MRI of the temporomandibular joint (TMJ) using an optimized high-resolution protocol at 3.0 T and a clinical standard protocol at 1.5 T. A phantom and 12 asymptomatic volunteers were MR imaged using a 2-channel surface coil (standard TMJ coil) at 1.5 and 3.0 T (Philips Achieva and Philips Ingenia, respectively; Philips Healthcare, Best, Netherlands). Imaging protocol consisted of coronal and oblique sagittal proton density-weighted turbo spin echo sequences. For quantitative evaluation, a spherical phantom was imaged. Signal-to-noise ratio (SNR) maps were calculated on a voxelwise basis. For qualitative evaluation, all volunteers underwent MRI of the TMJ with the jaw in closed position. Two readers independently assessed visibility and delineation of anatomical structures of the TMJ and overall image quality on a 5-point Likert scale. Quantitative and qualitative measurements were compared between field strengths. The quantitative analysis showed similar SNR for the high-resolution protocol at 3.0 T compared with the clinical protocol at 1.5 T. The qualitative analysis showed significantly better visibility and delineation of clinically relevant anatomical structures of the TMJ, including the TMJ disc and pterygoid muscle as well as better overall image quality at 3.0 T than at 1.5 T. The presented results indicate that expected gains in SNR at 3.0 T can be used to increase the spatial resolution when imaging the TMJ, which translates into increased visibility and delineation of anatomical structures of the TMJ. Therefore, imaging at 3.0 T should be preferred over 1.5 T for imaging the TMJ.

  7. Validation of a ramp running protocol for determination of the true VO2max in mice

    Directory of Open Access Journals (Sweden)

    Mohamed Ayachi

    2016-08-01

    Full Text Available In the field of comparative physiology, it remains to be established whether the concept of VO2max is valid in the mouse and, if so, how this value can be accurately determined. In humans, VO2max is generally considered to correspond to the plateau observed when VO2 no longer rises with an increase in workload. In contrast, the concept of VO2peak tends to be used in murine studies. The objectives of the present study were to determine whether (i a continuous ramp protocol yielded a higher VO2peak than a stepwise, incremental protocol, and (ii the VO2peak measured in the ramp protocol corresponded to VO2max. The three protocols (based on intensity-controlled treadmill running until exhaustion with eight female FVB/N mice were performed in random order: (a an incremental protocol that begins at 10 m.min-1 speed and increases by 3 m.min-1 every 3 min. (b a ramp protocol with slow acceleration (3 m.min-2, and (c a ramp protocol with fast acceleration (12 m.min-2. Each protocol was performed with two slopes (0° and 25°. Hence, each mouse performed six exercise tests. We found that the value of VO2peak was protocol-dependent (p 8 mmol.l-1 and a respiratory exchange ratio >1. The total duration of the 3 m.min-2 0° ramp protocol was shorter than that of the incremental protocol. Taken as a whole, our results suggest that VO2max in the mouse is best determined by applying a ramp exercise protocol with slow acceleration and no treadmill slope.

  8. Regional sensitivity analysis using revised mean and variance ratio functions

    International Nuclear Information System (INIS)

    Wei, Pengfei; Lu, Zhenzhou; Ruan, Wenbin; Song, Jingwen

    2014-01-01

    The variance ratio function, derived from the contribution to sample variance (CSV) plot, is a regional sensitivity index for studying how much the output deviates from the original mean of model output when the distribution range of one input is reduced and to measure the contribution of different distribution ranges of each input to the variance of model output. In this paper, the revised mean and variance ratio functions are developed for quantifying the actual change of the model output mean and variance, respectively, when one reduces the range of one input. The connection between the revised variance ratio function and the original one is derived and discussed. It is shown that compared with the classical variance ratio function, the revised one is more suitable to the evaluation of model output variance due to reduced ranges of model inputs. A Monte Carlo procedure, which needs only a set of samples for implementing it, is developed for efficiently computing the revised mean and variance ratio functions. The revised mean and variance ratio functions are compared with the classical ones by using the Ishigami function. At last, they are applied to a planar 10-bar structure

  9. The Association of Digit Ratio (2D : 4D) with Cancer: A Systematic Review and Meta-Analysis.

    Science.gov (United States)

    Bunevicius, Adomas

    2018-01-01

    Intrauterine sex hormone environment as indicated by the second to the fourth digit ratio (2D : 4D) can be associated with cancer risk. This systematic review and meta-analysis aimed to evaluate the association of 2D : 4D with cancer diagnosis, malignancy, and age at presentation. Studies that evaluated the association of 2D : 4D with cancer risk were collected from Pubmed/MEDLINE and Clarivate Analytics databases. Nineteen studies were included in the qualitative analysis. The 2D : 4D ratio was studied in prostate cancer, breast cancer, testicular cancer, gastric cancer, oral cancer, brain tumors, and cervical intraepithelial neoplasia. Low 2D : 4D was associated with prostate cancer, gastric cancer, and brain tumors, while high 2D : 4D, with breast cancer risk and cervical dysplasia. The 2D : 4D ratio was not associated with prostate, breast, and gastric cancer stage. Greater 2D : 4D ratio was associated with younger presentation of breast cancer and brain tumors. The meta-analyses demonstrated that testicular cancer was not associated with right-hand 2D : 4D ratio ( p = 0.74) and gastric cancer was not associated with right-hand ( p = 0.15) and left-hand ( p = 0.95) 2D : 4D ratio. Sex hormone environment during early development is associated with cancer risk later in life. Further studies exploring the link between intrauterine hormone environment and cancer risk are encouraged.

  10. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    Directory of Open Access Journals (Sweden)

    Jamal N. Al-Karaki

    2011-04-01

    Full Text Available The new characteristics of Wireless Multimedia Sensor Network (WMSN and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  11. Shortened protocol in practical [11C]SA4503-PET studies for sigma1 receptor quantification

    International Nuclear Information System (INIS)

    Sakata, Muneyuki; Kimura, Yuichi; Ishikawa, Masatomo; Oda, Keiichi; Ishii, Kenji; Ishiwata, Kiichi; Naganawa, Mika; Hashimoto, Kenji; Chihara, Kunihiro

    2008-01-01

    In practical positron emission tomography (PET) diagnosis, a shortened protocol is preferred for patients with brain disorders. In this study, the applicability of a shortened protocol as an alternative to the 90-min PET scan with [ 11 C]SA4503 for quantitative sigma 1 receptor measurement was investigated. Tissue time-activity curves of 288 regions of interest in the brain from 32 [ 11 C]SA4503-PET scans of 16 healthy subjects prior to and following administration of a selective serotonin reuptake inhibitor (fluvoxamine or paroxetine) were applied to two algorithms of quantitative analysis; binding potential (BP) was derived from compartmental analysis based on nonlinear estimation, and total distribution volume (tDV) was derived from Logan plot analysis. As a result, although both BP and tDV tended to be underestimated by the shortened method, the estimates from the shortened protocol had good linear relationships with those of the full-length protocol. In conclusion, if approximately 10% differences in the estimated results are acceptable for a specific purpose, then a 60-min measurement protocol is capable of providing reliable results. (author)

  12. The Operation of the Joint Protocol: Theoretical and Practical Implications Revisited

    International Nuclear Information System (INIS)

    Horbach, N.

    2008-01-01

    Convention and the 1963 Vienna Convention), is even more urgent in respect of its operation under the revised nuclear liability treaties. Any interpretation making the operation of the Joint Protocol ineffective, distorted or even obsolete as to its main object and purpose, would warrant critical analysis as to its benefits it in practice would provide for its Contracting Parties, considering to join any of the revised treaties. This paper aims to provide an analysis of the legal complications involved in respect of the operation of the Joint Protocol, especially in its interrelation with the revised nuclear liability treaties.(author)

  13. Constructing Benchmark Databases and Protocols for Medical Image Analysis: Diabetic Retinopathy

    Directory of Open Access Journals (Sweden)

    Tomi Kauppi

    2013-01-01

    Full Text Available We address the performance evaluation practices for developing medical image analysis methods, in particular, how to establish and share databases of medical images with verified ground truth and solid evaluation protocols. Such databases support the development of better algorithms, execution of profound method comparisons, and, consequently, technology transfer from research laboratories to clinical practice. For this purpose, we propose a framework consisting of reusable methods and tools for the laborious task of constructing a benchmark database. We provide a software tool for medical image annotation helping to collect class label, spatial span, and expert's confidence on lesions and a method to appropriately combine the manual segmentations from multiple experts. The tool and all necessary functionality for method evaluation are provided as public software packages. As a case study, we utilized the framework and tools to establish the DiaRetDB1 V2.1 database for benchmarking diabetic retinopathy detection algorithms. The database contains a set of retinal images, ground truth based on information from multiple experts, and a baseline algorithm for the detection of retinopathy lesions.

  14. Estimation of Leakage Ratio Using Principal Component Analysis and Artificial Neural Network in Water Distribution Systems

    Directory of Open Access Journals (Sweden)

    Dongwoo Jang

    2018-03-01

    Full Text Available Leaks in a water distribution network (WDS constitute losses of water supply caused by pipeline failure, operational loss, and physical factors. This has raised the need for studies on the factors affecting the leakage ratio and estimation of leakage volume in a water supply system. In this study, principal component analysis (PCA and artificial neural network (ANN were used to estimate the volume of water leakage in a WDS. For the study, six main effective parameters were selected and standardized data obtained through the Z-score method. The PCA-ANN model was devised and the leakage ratio was estimated. An accuracy assessment was performed to compare the measured leakage ratio to that of the simulated model. The results showed that the PCA-ANN method was more accurate for estimating the leakage ratio than a single ANN simulation. In addition, the estimation results differed according to the number of neurons in the ANN model’s hidden layers. In this study, an ANN with multiple hidden layers was found to be the best method for estimating the leakage ratio with 12–12 neurons. This suggested approaches to improve the accuracy of leakage ratio estimation, as well as a scientific approach toward the sustainable management of water distribution systems.

  15. A quality analysis of clinical anaesthesia study protocols from the Chinese clinical trials registry according to the SPIRIT statement.

    Science.gov (United States)

    Yang, Lei; Chen, Shouming; Yang, Di; Li, Jiajin; Wu, Taixiang; Zuo, Yunxia

    2018-05-15

    To learn about the overall quality of clinical anaesthesia study protocols from the Chinese Clinical Trials Registry and to discuss the way to improve study protocol quality. We defined completeness of each sub-item in SPIRIT as N/A (not applicable) or with a score of 0, 1, or 2. For each protocol, we calculated the proportion of adequately reported items (score = 2 and N/A) and unreported items (score = 0). Protocol quality was determined according to the proportion of reported items, with values >50% indicating high quality. Protocol quality was determined according to the proportion of reported items. For each sub-item in SPIRIT, we calculated the adequately reported rate (percentage of all protocols with score 2 and NA on one sub-item) as well as the unreported rate (percentage of all protocols with score 0 on one sub-item). Total 126 study protocols were available for assessment. Among these, 88.1% were assessed as being of low quality. By comparison, the percentage of low-quality protocols was 88.9% after the publication of the SPIRIT statement. Among the 51 SPIRIT sub-items, 18 sub-items had an unreported rate above 90% while 16 had a higher adequately reported rate than an unreported rate. The overall quality of clinical anaesthesia study protocols registered in the ChiCTR was poor. A mandatory protocol upload and self-check based on the SPIRIT statement during the trial registration process may improve protocol quality in the future.

  16. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  17. Taxonomy and Analysis of IP Micro-Mobility Protocols in Single and Simultaneous Movements Scenarios

    Directory of Open Access Journals (Sweden)

    G. De Marco

    2007-01-01

    Full Text Available The micro-mobility is an important aspect in mobile communications, where the applications are anywhere and used anytime. One of the problems of micro-mobility is the hand-off latency. In this paper, we analyse two solutions for IP micro-mobility by means of a general taxonomy. The first one is based on the Stream Control Transmission Protocol (SCTP, which allows the dynamic address configuration of an association. The second one is based on the Session Initiation Protocol (SIP, which is the most popular protocol for multimedia communications over IP networks. We show that for the SCTP solution, there is room for further optimisations of the hand-off latency by adding slight changes to the protocol. However, as full end-to-end solution, SCTP is not able to handle simultaneous movement of hosts, whose probability in general cannot be neglected. On the other hand, the SIP can handle both single and simultaneous movements cases, although the hand-off latency can increase with respect to the SCTP solution. We show that for a correct and fast hand-off, the SIP server should be statefull.

  18. A secure distributed logistic regression protocol for the detection of rare adverse drug events.

    Science.gov (United States)

    El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat

    2013-05-01

    There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through

  19. DEVELOPMENTS IN THE USE OF THE HAMSTRING/QUADRICEPS RATIO FOR THE ASSESSMENT OF MUSCLE BALANCE

    Directory of Open Access Journals (Sweden)

    Gerard Garbutt

    2002-09-01

    Full Text Available Isokinetic moment ratios of the hamstrings (H and quadriceps (Q muscle groups, and their implication in muscle imbalance, have been investigated for more than three decades. The conventional concentric H/Q ratio with its normative value of 0.6 has been at the forefront of the discussion. This does not account for the joint angle at which moment occurs and the type of muscle action involved. Advances towards more functional analyses have occurred such that previous protocols are being re-examined raising questions about their ability to demonstrate a relationship between thigh muscle imbalance and increased incidence or risk of knee injury. This article addresses the function of the hamstring-quadriceps ratio in the interpretation of this relationship using the ratios Hecc/Qcon (ratio of eccentric hamstring strength to concentric quadriceps strength, representative of isolated knee extension and Hcon/Qecc (ratio of concentric hamstring strength to eccentric quadriceps strength, representative of isolated knee flexion.

  20. Spot protein-creatinine ratio and spot albumin-creatinine ratio in the assessment of pre-eclampsia: a diagnostic accuracy study with decision-analytic model-based economic evaluation and acceptability analysis.

    Science.gov (United States)

    Waugh, Jason; Hooper, Richard; Lamb, Edmund; Robson, Stephen; Shennan, Andrew; Milne, Fiona; Price, Christopher; Thangaratinam, Shakila; Berdunov, Vladislav; Bingham, Jenn

    2017-10-01

    diagnosis of severe PE, which is defined as treatment with magnesium sulphate or with severe PE protocol; adverse perinatal outcome; one or more of perinatal or infant mortality, bronchopulmonary dysplasia, necrotising enterocolitis or grade III/IV intraventricular haemorrhage; and economic cost and outcomes. Health service data on service use and costs followed published economic models. In total, 959 women were available for primary analysis and 417 of them had severe PE. The diagnostic accuracy of the four assays on spot urine samples against the reference standards was similar. The three SPCR tests had sensitivities in excess of 90% at prespecified thresholds, with poor specificities and negative likelihood ratios of ≥ 0.1. The SACR test had a significantly higher sensitivity of 99% (confidence interval 98% to 100%) and lower specificity. Receiver operating characteristic (ROC) curves were similar (area under ROC curve between 0.87 and 0.89); the area under the central laboratory's SACR curve was significantly higher ( p  = 0.004). The central laboratory's SACR test was the most cost-effective option, generating an additional 0.03 quality-adjusted life-years at an additional cost of £45.07 compared with the local laboratory's SPCR test. The probabilistic analysis showed it to have a 100% probability of being cost-effective at the standard willingness-to-pay threshold recommended by NICE. Implementation of NICE guidelines has led to an increased intervention rate in the study population that affected recruitment rates and led to revised sample size calculations. Evidence from this clinical study does not support the recommendation of 24-hour urine sample collection in hypertensive pregnant women. The SACR test had better diagnostic performance when predicting severe pre-eclampsia. All four tests could potentially be used as rule-out tests for the NICE definition of severe PE. Testing SACR at a threshold of 8 mg/mmol should be studied as a 'rule-out' test of

  1. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  2. Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool

    OpenAIRE

    Hazem A Elbaz

    2015-01-01

    The mostly cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that sound well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we...

  3. Determination of the Geographical Origin of All Commercial Hake Species by Stable Isotope Ratio (SIR) Analysis.

    Science.gov (United States)

    Carrera, Mónica; Gallardo, José M

    2017-02-08

    The determination of the geographical origin of food products is relevant to comply with the legal regulations of traceability, to avoid food fraud, and to guarantee food quality and safety to the consumers. For these reasons, stable isotope ratio (SIR) analysis using an isotope ratio mass spectrometry (IRMS) instrument is one of the most useful techniques for evaluating food traceability and authenticity. The present study was aimed to determine, for the first time, the geographical origin for all commercial fish species belonging to the Merlucciidae family using SIR analysis of carbon (δ 13 C) and nitrogen (δ 15 N). The specific results enabled their clear classification according to the FAO (Food and Agriculture Organization of the United Nations) fishing areas, latitude, and geographical origin in the following six different clusters: European, North African, South African, North American, South American, and Australian hake species.

  4. [Analyzing consumer preference by using the latest semantic model for verbal protocol].

    Science.gov (United States)

    Tamari, Yuki; Takemura, Kazuhisa

    2012-02-01

    This paper examines consumers' preferences for competing brands by using a preference model of verbal protocols. Participants were 150 university students, who reported their opinions and feelings about McDonalds and Mos Burger (competing hamburger restaurants in Japan). Their verbal protocols were analyzed by using the singular value decomposition method, and the latent decision frames were estimated. The verbal protocols having a large value in the decision frames could be interpreted as showing attributes that consumers emphasize. Based on the estimated decision frames, we predicted consumers' preferences using the logistic regression analysis method. The results indicate that the decision frames projected from the verbal protocol data explained consumers' preferences effectively.

  5. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  6. Neutrophil-to-Lymphocyte Ratio and Platelet-to-Lymphocyte Ratio as Novel Markers for Diagnosis of Sudden Sensorineural Hearing Loss: A Systematic Review and Meta-analysis

    Directory of Open Access Journals (Sweden)

    Mohammad Amin Bahrami

    2016-04-01

    Full Text Available Background: Sudden sensorineural hearing loss (SSNHL is a common otologic disease characterized by a loss of hearing greater than 30 dB in three consecutive frequen­cies which occurs in less than 72 hours. Objective: To investigate the role of neutrophil-to-lymphocyte ratio (NLR and platelet-to-lymphocyte ratio (PLR on sudden sensorineural hearing loss (SSNHL. Search strategy: A PubMed, Science Direct, Scopus, OVID, EMBASE and Google Scholar search (date last searched April 2016 without any time, language and location restriction was done. Inclusion criteria: All case-control studies, which have been investigated the relationship of NLR and PLR with the occurrence of SSNHL were included in our meta-analysis. Results: A total of 5 case-control studies were included in the study. All 5 studies have been reported NLR of patients and control groups (611 patients and 804 controls. Our analysis showed that the mean NLR of patients is 1.12 (0.82-1.43 unit higher than that of controls with 95% CI which is statistically significant. Also, 3 studies have been reported PLR of patients and control groups (512 patients and 705 controls. Our analysis showed that the mean PLR of patients is 0.57 (0.08-1.05 unit higher than that of controls with 95% CI which is statistically significant too. Conclusions: This meta-analysis confirmed the relationship of NLR and PLR with SSNHL. Therefore, these parameters can be considered as new markers in diagnosis of SSNHL. 

  7. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  8. Modified protocol for genomic DNA extraction from newly plucked feathers of lophura leucomelana hamiltoni (Galliformes) for genetic studies and its endo-restriction analysis

    International Nuclear Information System (INIS)

    Andleeb, S.; Shamim, S.; Minhas, R.A.

    2012-01-01

    A rapid and accurate protocol was used first time to isolate the high-quality genomic DNA from newly plucked feathers of Lophura leucomelana. Two different lysis protocols were used depending on the feather size and it was observed that 55 deg. C for 3 to 4 days showed better results of feathers lysis as compared with the 37 deg. C for overnight with gentle shaking. Purification of genomic DNA was also performed with phenol: chloroform: isoamyl alcohol and 100% absolute ethanol precipitation methods. By using this protocol, a significant amount of high-quality genomic DNA was obtained and the purity of DNA was analyzed through endo-restriction analysis. Genomic DNA isolated with this modified method will be used for Southern blotting and also in several polymerase chain reaction systems devoted to sex determination and paternity testing and the evolutionary relationships among the other pheasants. (author)

  9. Establishment of Lipofection Protocol for Efficient miR-21 Transfection into Cortical Neurons In Vitro.

    Science.gov (United States)

    Han, Zhaoli; Ge, Xintong; Tan, Jin; Chen, Fanglian; Gao, Huabin; Lei, Ping; Zhang, Jianning

    2015-12-01

    Dysregulated microRNAs in neurons could cause many nervous system diseases. The therapeutic manipulation of these pathogenic microRNAs necessitates novel, efficient delivery systems to facilitate microRNA modulators targeting neurons with minimal off-target effects. The study aimed to establish a lipofection protocol to upregulate expression levels of miR-21 in neurons under different conditions, including different serum-free medium, transfection conditions, and reagent concentration, by evaluating the expression levels of miR-21 and neuron injury. The expression levels of miR-21 were higher in neurons transfected by Neurobasal-A than by DMEM. Expression levels of miR-21 were already the highest at the ratio RNAiMAX:miR-21 = 3:5, but the increase of RNAiMAX's concentration had not caused the further upregulation of expression level of miR-21. Neuron injury was condition dependent and dose dependent after transfection. Compared to S-Neurobasal groups, neurons have a smaller injury in N-Neurobasal groups, and compared to ratios RNAiMAX:miR-21 = 4:5, 5:5, neuron injury was smaller at ratios of RNAiMAX:miR-21 = 1:5, 2:5, 3:5. Without the pretreatment of starvation in vitro, the lipofection protocol was that RNAiMAX/miR-21 agomir complexes were diluted in Neurobasal-A at the ratio of RNAiMAX:miR-21 = 3:5.

  10. Re-verification of a Lip Synchronization Protocol using Robust Reachability

    Directory of Open Access Journals (Sweden)

    Piotr Kordy

    2010-03-01

    Full Text Available The timed automata formalism is an important model for specifying and analysing real-time systems. Robustness is the correctness of the model in the presence of small drifts on clocks or imprecision in testing guards. A symbolic algorithm for the analysis of the robustness of timed automata has been implemented. In this paper, we re-analyse an industrial case lip synchronization protocol using the new robust reachability algorithm. This lip synchronization protocol is an interesting case because timing aspects are crucial for the correctness of the protocol. Several versions of the model are considered: with an ideal video stream, with anchored jitter, and with non-anchored jitter.

  11. Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs

    Directory of Open Access Journals (Sweden)

    Haowen Tan

    2018-01-01

    Full Text Available As a crucial component of Internet-of-Thing (IoT, vehicular ad hoc networks (VANETs have attracted increasing attentions from both academia and industry fields in recent years. With the extensive VANETs deployment in transportation systems of more and more countries, drivers’ driving experience can be drastically improved. In this case, the real-time road information needs to be disseminated to the correlated vehicles. However, due to inherent wireless communicating characteristics of VANETs, authentication and group key management strategies are indispensable for security assurance. Furthermore, effective road message dissemination mechanism is of significance. In this paper, we address the above problems by developing a certificateless authentication and road message dissemination protocol. In our design, certificateless signature and the relevant feedback mechanism are adopted for authentication and group key distribution. Subsequently, message evaluating and ranking strategy is introduced. Security analysis shows that our protocol achieves desirable security properties. Additionally, performance analysis demonstrates that the proposed protocol is efficient compared with the state of the art.

  12. The Comparative Study Some of Reactive and Proactive Routing Protocols in The Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Anas Ali Hussien

    2018-02-01

    Full Text Available The wireless sensor network (WSN consists mostly of a large number of nodes in a large area where not all nodes are directly connected. The applications of comprise a wide variety of scenarios.The mobile nodes are free to move because this network has selfــstructured topology. Routing protocols are responsible for detecting and maintaining paths in the network, and it classified into reactive (OnـــDemand, proactive (Table driven, and hybrid. In this paper represents a performance study of some WSN routing protocols: the Dynamic Source Routing (DSR, Ad hoc On-Demand Distance Vector (AODV, and Destination-Sequenced Distance-Vector (DSDV. The comparison made according to important metrics like packet delivery ratio (PDR, total packets dropped, Average end-to-end delay (Avg EED, and normalized routing load under the Transmission Control Protocol (TCP and User Datagram Protocol (UDP traffic connection and with varying number of nodes, pause time; and  varying speed. In this work used (NSــ2.35 that installed on (Ubuntu 14.04 operating system to implementing the scenario. Conclude that the DSR has better performance in TCP connection; while the DSDV has better performance in UDP protocol.

  13. Linear transceiver design for nonorthogonal amplify-and-forward protocol using a bit error rate criterion

    KAUST Repository

    Ahmed, Qasim Zeeshan

    2014-04-01

    The ever growing demand of higher data rates can now be addressed by exploiting cooperative diversity. This form of diversity has become a fundamental technique for achieving spatial diversity by exploiting the presence of idle users in the network. This has led to new challenges in terms of designing new protocols and detectors for cooperative communications. Among various amplify-and-forward (AF) protocols, the half duplex non-orthogonal amplify-and-forward (NAF) protocol is superior to other AF schemes in terms of error performance and capacity. However, this superiority is achieved at the cost of higher receiver complexity. Furthermore, in order to exploit the full diversity of the system an optimal precoder is required. In this paper, an optimal joint linear transceiver is proposed for the NAF protocol. This transceiver operates on the principles of minimum bit error rate (BER), and is referred as joint bit error rate (JBER) detector. The BER performance of JBER detector is superior to all the proposed linear detectors such as channel inversion, the maximal ratio combining, the biased maximum likelihood detectors, and the minimum mean square error. The proposed transceiver also outperforms previous precoders designed for the NAF protocol. © 2002-2012 IEEE.

  14. Effect of tranexamic acid on coagulation and fibrinolysis in women with postpartum haemorrhage (WOMAN-ETAC: protocol and statistical analysis plan for a randomized controlled trial [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Haleema Shakur

    2016-12-01

    Full Text Available Background: Postpartum haemorrhage (PPH is a leading cause of maternal death. Tranexamic acid has the potential to reduce bleeding and a large randomized controlled trial of its effect on maternal health outcomes in women with PPH (The WOMAN trial is ongoing. We will examine the effect of tranexamic acid on fibrinolysis and coagulation in a subset of WOMAN trial participants.   Methods. Adult women with clinically diagnosed primary PPH after vaginal or caesarean delivery are eligible for inclusion in the WOMAN trial. In a sub-group of trial participants, blood samples will be collected at baseline and 30 minutes after the first dose of tranexamic acid or matching placebo.  Our primary objective is to evaluate the effect of tranexamic acid on fibrinolysis. Fibrinolysis will be assessed by measuring D-dimers and by rotational thromboelastometry (ROTEM. Secondary outcomes are international normalized ratio (INR, prothrombin time (PT, activated partial thromboplastin time (APTT, fibrinogen, haemoglobin and platelets. We aim to include about 180 women from the University College Hospital, Ibadan in Nigeria.   Discussion:  This sub-study of WOMAN trial participants should provide information on the mechanism of action of tranexamic acid in women with postpartum haemorrhage. We present the trial protocol and statistical analysis plan. The trial protocol was registered prior to the start of patient recruitment. The statistical analysis plan was completed before un-blinding.     Trial registration: The trial was registered: ClinicalTrials.gov, Identifier NCT00872469 https://clinicaltrials.gov/ct2/show/NCT00872469; ISRCTN registry, Identifier   ISRCTN76912190 http://www.isrctn.com/ISRCTN76912190 (Registration date: 22/03/2012.

  15. Registered nurses' clinical reasoning in home healthcare clinical practice: A think-aloud study with protocol analysis.

    Science.gov (United States)

    Johnsen, Hege Mari; Slettebø, Åshild; Fossum, Mariann

    2016-05-01

    The home healthcare context can be unpredictable and complex, and requires registered nurses with a high level of clinical reasoning skills and professional autonomy. Thus, additional knowledge about registered nurses' clinical reasoning performance during patient home care is required. The aim of this study is to describe the cognitive processes and thinking strategies used by recently graduated registered nurses while caring for patients in home healthcare clinical practice. An exploratory qualitative think-aloud design with protocol analysis was used. Home healthcare visits to patients with stroke, diabetes, and chronic obstructive pulmonary disease in seven healthcare districts in southern Norway. A purposeful sample of eight registered nurses with one year of experience. Each nurse was interviewed using the concurrent think-aloud technique in three different patient home healthcare clinical practice visits. A total of 24 home healthcare visits occurred. Follow-up interviews were conducted with each participant. The think-aloud sessions were transcribed and analysed using three-step protocol analysis. Recently graduated registered nurses focused on both general nursing concepts and concepts specific to the domains required and tasks provided in home healthcare services as well as for different patient groups. Additionally, participants used several assertion types, cognitive processes, and thinking strategies. Our results showed that recently graduated registered nurses used both simple and complex cognitive processes involving both inductive and deductive reasoning. However, their reasoning was more reactive than proactive. The results may contribute to nursing practice in terms of developing effective nursing education programmes. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Cost-benefit analysis of stricter emission ceilings for air pollutants. National evaluation for the revision of the Gothenburg Protocol; Kosten en baten van strengere emissieplafonds voor luchtverontreinigende stoffen. Nationale evaluatie voor de herziening van het Gothenburg Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Smeets, W.

    2012-06-15

    The Netherlands experiences high benefits of strict European emission targets for air pollutants. The Dutch live longer and are healthier because of extra emission reductions. In addition, damage to nature decreases. This emerges from a cost-benefit analysis of a number of possible variants for tightening emission targets by 2020 in the context of the revision of the Gothenburg Protocol [Dutch] Nederland ondervindt hoge baten van strenge Europese emissiedoelen voor luchtverontreinigende stoffen. Nederlanders leven langer en gezonder door extra emissiereducties. Daarnaast neemt de schade aan de natuur af. Dit blijkt uit een kosten-batenanalyse van een aantal mogelijke varianten voor aanscherping van emissiedoelen per 2020 in het kader van de herziening van het Gothenburg protocol.

  17. Timing Analysis of Rate Constrained Traffic for the TTEthernet Communication Protocol

    DEFF Research Database (Denmark)

    Tamas-Selicean, Domitian; Pop, Paul; Steiner, Wilfried

    2015-01-01

    Ethernet is a low-cost communication solution offering high transmission speeds. Although its applications extend beyond computer networking, Ethernet is not suitable for real-time and safety-critical systems. To alleviate this, several real-time Ethernet-based communication protocols have been...

  18. Energy Efficient Clustering Based Network Protocol Stack for 3D Airborne Monitoring System

    Directory of Open Access Journals (Sweden)

    Abhishek Joshi

    2017-01-01

    Full Text Available Wireless Sensor Network consists of large number of nodes densely deployed in ad hoc manner. Usually, most of the application areas of WSNs require two-dimensional (2D topology. Various emerging application areas such as airborne networks and underwater wireless sensor networks are usually deployed using three-dimensional (3D network topology. In this paper, a static 3D cluster-based network topology has been proposed for airborne networks. A network protocol stack consisting of various protocols such as TDMA MAC and dynamic routing along with services such as time synchronization, Cluster Head rotation, and power level management has been proposed for this airborne network. The proposed protocol stack has been implemented on the hardware platform consisting of number of TelosB nodes. This 3D airborne network architecture can be used to measure Air Quality Index (AQI in an area. Various parameters of network such as energy consumption, Cluster Head rotation, time synchronization, and Packet Delivery Ratio (PDR have been analyzed. Detailed description of the implementation of the protocol stack along with results of implementation has been provided in this paper.

  19. ARQ Protocols in Cognitive Decode-and-Forward Relay Networks: Opportunities Gain

    Directory of Open Access Journals (Sweden)

    Zongsheng Zhang

    2015-04-01

    Full Text Available In this paper, two novel automatic-repeat-request (ARQ based protocols were proposed, which exploit coop- eration opportunity inherent in secondary retransmission to create access opportunities. If the signal was not decoded correctly in destination, another user can be acted as a relay to reduce retransmission rounds by relaying the signal. For comparison, we also propose a Direct ARQ Protocol. Specif- ically, we derive the exact closed-form outage probability of three protocols, which provides an effective means to evalu- ate the effects of several parameters. Moreover, we propose a new metric to evaluate the performance improvement for cognitive networks. Finally, Monte Carlo simulations were presented to validate the theory analysis, and a comparison is made among the three protocols.

  20. Quantum secret information equal exchange protocol based on dense coding

    Science.gov (United States)

    Jiang, Ying-Hua; Zhang, Shi-Bin; Dai, Jin-Qiao; Shi, Zhi-Ping

    2018-04-01

    In this paper, we design a novel quantum secret information equal exchange protocol, which implements the equal exchange of secret information between the two parties with the help of semi-trusted third party (TP). In the protocol, EPR pairs prepared by the TP are, respectively, distributed to both the communication parties. Then, the two parties perform Pauli operation on each particle and return the new particles to TP, respectively. TP measures each new pair with Bell basis and announces the measurement results. Both parties deduce the secret information of each other according to the result of announcement by TP. Finally, the security analysis shows that this protocol solves the problem about equal exchange of secret information between two parties and verifies the security of semi-trusted TPs. It proves that the protocol can effectively resist glitch attacks, intercept retransmission attacks and entanglement attack.

  1. Mixture Analysis and Mammalian Sex Ratio Among Middle Pleistocene Mouflon of Arago Cave, France

    Science.gov (United States)

    Monchot, Hervé

    1999-09-01

    In archaeological studies, it is often important to be able assess sexual dimorphism and sex ratios in populations. Obtaining sex ratio is easy if each individual in the population can be accurately sexed through the use of one more objective variables. But this is often impossible, due to incompleteness of the osteological record. A modern statistical approach to handle this problem is Mixture Analysis using the method of maximum likelihood. It consists of determining how many groups are present in the sample, two in this case, in which proportions they occur, and to estimate the parameters accordingly. This paper shows the use of this method on vertebrate fossil populations in a prehistoric context with implications on prey acquisition by early humans. For instance, the analysis of mouflon bones from Arago cave (Tautavel, France) indicates that there are more females than males in the F layer. According to the ethology of the animal, this indicates that the hunting strategy could be the result of selective choice of the prey. Moreover, we may deduce the presence of Anteneandertalians on the site during spring and summer periods.

  2. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation

    International Nuclear Information System (INIS)

    Li Jian; Song Danjie; Guo Xiaojing; Jing Bo

    2012-01-01

    In order to transmit secure messages, a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented. The five-particle cluster state is used to detect eavesdroppers, and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol. In the security analysis, the entropy theory method is introduced, and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all the information, the detection rate of the original ping-pong protocol is 50%; the second protocol, using two particles of the Einstein-Podolsky-Rosen pair as detection particles, is also 50%; while the presented protocol is 89%. Finally, the security of the proposed protocol is discussed, and the analysis results indicate that the protocol in this paper is more secure than the other two. (authors)

  3. Past and Future of the Kyoto Protocol. Final report

    International Nuclear Information System (INIS)

    Wijen, F.; Zoeteman, K.

    2004-01-01

    The present report reflects findings from a study on the realization of and prospects for the Kyoto Protocol. The purpose of the study was (1) to obtain insights into the factors that enabled the realization of the Kyoto Protocol, in particular the interactions among major parties involved; (2) to assess the future opportunities and threats of the Kyoto Protocol, in particular against the backdrop of an increasingly globalised world. The study was conducted from February up to December 2003 by (a) reviewing the literature, especially publications on the negotiation history of the Kyoto process, the social interactions enabling the realization of the Protocol, analyses of strengths and weaknesses, and future climate regimes; (b) conducting a series of interviews with representatives from government, academia, non-governmental organisations, and business, who have been - directly or indirectly - involved in the Kyoto process; (c) internal discussions,brainstorming and analysing the Protocol's strengths and weaknesses, possible future scenarios (including policy options), and the management of a possible failure of the Kyoto Protocol. The present report reflects and integrates the different sources. The first section deals with the past and the present. It discusses how the Kyoto Protocol could be realized despite the divergent interests, reflects on its architecture, and analyses major strengths and weaknesses. In the second section, we present possible future scenarios. We explore how different combinations of domestic and international commitment provide possible realities that national government may face when crafting climate policy. The third section provides an in-depth analysis of the possible event that the Kyoto Protocol fails. We discuss its definition and policy implications. The final section is reserved for overall conclusions and policy recommendations

  4. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    Science.gov (United States)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  5. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  6. Cancer risk of anti-TNF-α at recommended doses in adult rheumatoid arthritis: a meta-analysis with intention to treat and per protocol analyses.

    Directory of Open Access Journals (Sweden)

    Guillaume Moulis

    Full Text Available BACKGROUND: The risk of malignancies on TNF-α antagonists is controversial. The aim of this survey was to assess cancer risk on TNF-α antagonists in adult rheumatoid arthritis patients, including the five marketed drugs (infliximab, etanercept, adalimumab, golimumab and certolizumab used in line with the New Drug Application. Furthermore, the relative interest of modified intention to treat or per protocol analyses to assess such sparse events remains unknown. METHODOLOGY/PRINCIPAL FINDINGS: Data sources were MEDLINE, CENTRAL, ISI Web of Science, ACR and EULAR meeting abstracts, scientific evaluation of the drugs leading to their marketing approval, and clinicaltrials.gov, until 31 December 2012.We selected double-blind randomized controlled trials in adult rheumatoid arthritis patients, including at least one treatment arm in line with New Drug Application. We performed random effect meta-analysis, with modified intention to treat and per protocol analyses. Thirty-three trials were included. There was no excess risk of malignancies on anti-TNF-α administered in line with New Drug Application in the per protocol model (OR, 0.93 95%CI[0.59-1.44], as well as in the modified intention to treat model (OR, 1.27 95%CI[0.82-1.98]. There was a non-significant tendency for an excess non-melanoma skin cancer risk in both models (respectively, 1.37 [0.71-2.66] and 1.90 [0.98-3.67]. With fixed effect Peto model restricting to trials during at least 52 weeks, the overall cancer risk was respectively 1.60 [0.97-2.64] and 1.22 [0.72-2.08]. Whatever the model, modified intention to treat analysis led to higher estimations than per protocol analysis. The later may underestimate the treatment effect when assessing very sparse events and when many patients dropped out in placebo arms. In metaregression, there was no differential risk among the five drugs. CONCLUSIONS/SIGNIFICANCE: This study did not find any evidence for an excess cancer risk on TNF

  7. Thermodynamic analysis of a variable compression ratio diesel engine running with palm oil methyl ester

    International Nuclear Information System (INIS)

    Debnath, Biplab K.; Sahoo, Niranjan; Saha, Ujjwal K.

    2013-01-01

    Highlights: ► Energy and exergy analysis of palm oil methyl ester (POME) run diesel engine. ► Engine was run at various compression ratios (CRs) and injection timings (ITs). ► POME can recover around 26% of the energy supplied by the fuel. ► CR rise and IT change cause shaft energy per unit fuel supply to increase. ► CR of 18 and IT of 20°BTDC reduce more entropy generation. - Abstract: The present work is set to explore the effect of compression ratio (CR) and injection timing (IT) on energy and exergy potential of a palm oil methyl ester (POME) run diesel engine. Experiments are carried out in a single cylinder, direct injection, water cooled variable compression ratio diesel engine at a constant peed of 1500 rpm under a full load of 4.24 bar brake mean effective pressure (BMEP). The study involves four different CRs of 16, 17, 17.5 and 18; and three different ITs of 20°, 23° and 28°BTDC. Here, the CR of 17.5 and IT of 23°BTDC are the standard ones. The energy analysis performed for the experimental data includes shaft power, energy input through fuel, output by cooling water and exhaust, uncounted loss per unit time. Side by side, the effects of varying CR and IT on peak pressure, peak heat release rate, brake thermal efficiency and exhaust gas temperature are also studied. The exergy analysis is carried out for availability input, shaft, cooling water and exhaust availability, availability destruction and entropy generation. It shows that higher values of CR increase the shaft availability and cooling water availability, however, they decrease the exhaust flow availability. The retardation and advancement of IT give similar results. The exergy analysis also shows that with the increase of CR, the injection retardation and advancement increase the shaft availability and exergy efficiency, while it reduces the exergy destruction. The entropy generation is also reduced for the similar CR and IT modifications.

  8. IMPLEMENTATION AND VALIDATION OF STATISTICAL TESTS IN RESEARCH'S SOFTWARE HELPING DATA COLLECTION AND PROTOCOLS ANALYSIS IN SURGERY.

    Science.gov (United States)

    Kuretzki, Carlos Henrique; Campos, Antônio Carlos Ligocki; Malafaia, Osvaldo; Soares, Sandramara Scandelari Kusano de Paula; Tenório, Sérgio Bernardo; Timi, Jorge Rufino Ribas

    2016-03-01

    The use of information technology is often applied in healthcare. With regard to scientific research, the SINPE(c) - Integrated Electronic Protocols was created as a tool to support researchers, offering clinical data standardization. By the time, SINPE(c) lacked statistical tests obtained by automatic analysis. Add to SINPE(c) features for automatic realization of the main statistical methods used in medicine . The study was divided into four topics: check the interest of users towards the implementation of the tests; search the frequency of their use in health care; carry out the implementation; and validate the results with researchers and their protocols. It was applied in a group of users of this software in their thesis in the strict sensu master and doctorate degrees in one postgraduate program in surgery. To assess the reliability of the statistics was compared the data obtained both automatically by SINPE(c) as manually held by a professional in statistics with experience with this type of study. There was concern for the use of automatic statistical tests, with good acceptance. The chi-square, Mann-Whitney, Fisher and t-Student were considered as tests frequently used by participants in medical studies. These methods have been implemented and thereafter approved as expected. The incorporation of the automatic SINPE (c) Statistical Analysis was shown to be reliable and equal to the manually done, validating its use as a research tool for medical research.

  9. The costs and cost-effectiveness of an integrated sepsis treatment protocol.

    Science.gov (United States)

    Talmor, Daniel; Greenberg, Dan; Howell, Michael D; Lisbon, Alan; Novack, Victor; Shapiro, Nathan

    2008-04-01

    Sepsis is associated with high mortality and treatment costs. International guidelines recommend the implementation of integrated sepsis protocols; however, the true cost and cost-effectiveness of these are unknown. To assess the cost-effectiveness of an integrated sepsis protocol, as compared with conventional care. Prospective cohort study of consecutive patients presenting with septic shock and enrolled in the institution's integrated sepsis protocol. Clinical and economic outcomes were compared with a historical control cohort. Beth Israel Deaconess Medical Center. Overall, 79 patients presenting to the emergency department with septic shock in the treatment cohort and 51 patients in the control group. An integrated sepsis treatment protocol incorporating empirical antibiotics, early goal-directed therapy, intensive insulin therapy, lung-protective ventilation, and consideration for drotrecogin alfa and steroid therapy. In-hospital treatment costs were collected using the hospital's detailed accounting system. The cost-effectiveness analysis was performed from the perspective of the healthcare system using a lifetime horizon. The primary end point for the cost-effectiveness analysis was the incremental cost per quality-adjusted life year gained. Mortality in the treatment group was 20.3% vs. 29.4% in the control group (p = .23). Implementing an integrated sepsis protocol resulted in a mean increase in cost of approximately $8,800 per patient, largely driven by increased intensive care unit length of stay. Life expectancy and quality-adjusted life years were higher in the treatment group; 0.78 and 0.54, respectively. The protocol was associated with an incremental cost of $11,274 per life-year saved and a cost of $16,309 per quality-adjusted life year gained. In patients with septic shock, an integrated sepsis protocol, although not cost-saving, appears to be cost-effective and compares very favorably to other commonly delivered acute care interventions.

  10. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    Science.gov (United States)

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  11. Non-stationary (13)C-metabolic flux ratio analysis.

    Science.gov (United States)

    Hörl, Manuel; Schnidder, Julian; Sauer, Uwe; Zamboni, Nicola

    2013-12-01

    (13)C-metabolic flux analysis ((13)C-MFA) has become a key method for metabolic engineering and systems biology. In the most common methodology, fluxes are calculated by global isotopomer balancing and iterative fitting to stationary (13)C-labeling data. This approach requires a closed carbon balance, long-lasting metabolic steady state, and the detection of (13)C-patterns in a large number of metabolites. These restrictions mostly reduced the application of (13)C-MFA to the central carbon metabolism of well-studied model organisms grown in minimal media with a single carbon source. Here we introduce non-stationary (13)C-metabolic flux ratio analysis as a novel method for (13)C-MFA to allow estimating local, relative fluxes from ultra-short (13)C-labeling experiments and without the need for global isotopomer balancing. The approach relies on the acquisition of non-stationary (13)C-labeling data exclusively for metabolites in the proximity of a node of converging fluxes and a local parameter estimation with a system of ordinary differential equations. We developed a generalized workflow that takes into account reaction types and the availability of mass spectrometric data on molecular ions or fragments for data processing, modeling, parameter and error estimation. We demonstrated the approach by analyzing three key nodes of converging fluxes in central metabolism of Bacillus subtilis. We obtained flux estimates that are in agreement with published results obtained from steady state experiments, but reduced the duration of the necessary (13)C-labeling experiment to less than a minute. These results show that our strategy enables to formally estimate relative pathway fluxes on extremely short time scale, neglecting cellular carbon balancing. Hence this approach paves the road to targeted (13)C-MFA in dynamic systems with multiple carbon sources and towards rich media. © 2013 Wiley Periodicals, Inc.

  12. What the drivers do and do not tell you: using verbal protocol analysis to investigate driver behaviour in emergency situations.

    Science.gov (United States)

    Banks, Victoria A; Stanton, Neville A; Harvey, Catherine

    2014-01-01

    Although task analysis of pedestrian detection can provide us with useful insights into how a driver may behave in emergency situations, the cognitive elements of driver decision-making are less well understood. To assist in the design of future Advanced Driver Assistance Systems, such as Autonomous Emergency Brake systems, it is essential that the cognitive elements of the driving task are better understood. This paper uses verbal protocol analysis in an exploratory fashion to uncover the thought processes underlying behavioural outcomes represented by hard data collected using the Southampton University Driving Simulator.

  13. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.

    Science.gov (United States)

    Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng

    2018-04-01

     With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated.  Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks.  The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS.  We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features

  14. [Professor Xu Fu-song's traditional Chinese medicine protocols for male diseases: A descriptive analysis].

    Science.gov (United States)

    Liu, Cheng-yong; Xu, Fu-song

    2015-04-01

    To analyze the efficacy and medication principles of Professor Xu Fu-songs traditional Chinese medicine (TCM) protocols for male diseases. We reviewed and descriptively analyzed the unpublished complete medical records of 100 male cases treated by Professor Xu Fu-song with his TCM protocols from 1978 to 1992. The 100 cases involved 32 male diseases, most of which were difficult and complicated cases. The drug compliance was 95%. Each prescription was made up of 14 traditional Chinese drugs on average. The cure rate was 32% , and the effective rate was 85%. Professor Xu Fu-song advanced and proved some new theories and therapeutic methods. Professor Xu Fu-song's TCM protocols can be applied to a wide range of male diseases, mostly complicated, and are characterized by accurate differentiation of symptoms and signs, high drug compliance, and excellent therapeutic efficacy.

  15. Delay-Tolerant, Low-Power Protocols for Large Security-Critical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Claudio S. Malavenda

    2012-01-01

    Full Text Available This paper reports the analysis, implementation, and experimental testing of a delay-tolerant and energy-aware protocol for a wireless sensor node, oriented to security applications. The solution proposed takes advantages from different domains considering as a guideline the low power consumption and facing the problems of seamless and lossy connectivity offered by the wireless medium along with very limited resources offered by a wireless network node. The paper is organized as follows: first we give an overview on delay-tolerant wireless sensor networking (DTN; then we perform a simulation-based comparative analysis of state-of-the-art DTN approaches and illustrate the improvement offered by the proposed protocol; finally we present experimental data gathered from the implementation of the proposed protocol on a proprietary hardware node.

  16. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  17. Estimate of Small Stiffness and Damping Ratio in Residual Soil Using Spectral Analysis of Surface Wave Method

    Directory of Open Access Journals (Sweden)

    Bawadi Nor Faizah

    2016-01-01

    Full Text Available Research in the important parameters for modeling the dynamic behavior of soils has led to rapid development of the small strain stiffness and damping ratio for use in the seismic method. It is because, the experimental determination of the damping ratio is problematic, especially for hard soils sample. Many researchers have proved that the surface wave method is a reliable tool to determine shear wave velocity and damping ratio profiles at a site with very small strains level. Surface wave methods based on Rayleigh waves propagation and the resulting attenuation curve can become erroneous when higher modes contribute to the soil’s response. In this study, two approaches has been used to determine the shear strain amplitude and damping ratio of residual soils at small strain level using Spectral Analysis of Surface Wave (SASW method. One is to derive shear strain amplitude from the frequency-response curve and the other is to derive damping ratio from travel-time data. Then, the results are compared to the conventional method.

  18. Modelling, Verification, and Comparative Performance Analysis of the B.A.T.M.A.N. Protocol

    NARCIS (Netherlands)

    Chaudhary, Kaylash; Fehnker, Ansgar; Mehta, Vinay; Hermanns, Holger; Höfner, Peter

    2017-01-01

    This paper considers on a network routing protocol known as Better Approach to Mobile Ad hoc Networks (B.A.T.M.A.N.). The protocol serves two aims: first, to discover all bidirectional links, and second, to identify the best-next-hop for every other node in the network. A key element is that each

  19. Canyon transfer neutron absorber to fissile material ratio analysis. Revision 1

    International Nuclear Information System (INIS)

    Clemmons, J.S.

    1994-01-01

    Waste tank fissile material and non-fissile material estimates are used to evaluate criticality safety for the existing sludge inventory and batches of sludge sent to Extended Sludge Processing (ESP). This report documents the weight ratios of several non-fissile waste constituents to fissile waste constituents from canyon reprocessing waste streams. Weight ratios of Fe, Mn, Al, Mi, and U-238 to fissile material are calculated from monthly loss estimates from the F and H Canyon Low Heat Waste (LHW) and High Heat Waste (HHW) streams. The monthly weight ratios for Fe, Mn and U-238 are then compared to calculated minimum safe weight ratios. Documented minimum safe weight ratios for Al and Ni to fissile material are currently not available. Total mass data for the subject sludge constituents is provided along with scatter plots of the monthly weight ratios for each waste stream

  20. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    Directory of Open Access Journals (Sweden)

    G. P. Halkes

    2010-01-01

    Full Text Available The evaluation of MAC protocols for Wireless Sensor Networks (WSNs is often performed through simulation. These simulations necessarily abstract away from reality in many ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have studied either the physical layer and per link effects or routing protocol effects. To the best of our knowledge, no other work has focused on the study of the simulation abstractions with respect to MAC protocol performance. In this paper, we present the results of an experimental study of two often used abstractions in the simulation of WSN MAC protocols. We show that a simple SNR-based reception model can provide quite accurate results for metrics commonly used to evaluate MAC protocols. Furthermore, we provide an analysis of what the main sources of deviation are and thereby how the simulations can be improved to provide even better results.