WorldWideScience

Sample records for risk analysis protocol

  1. 75 FR 74007 - Federal Aquatic Nuisance Species Research Risk Analysis Protocol

    Science.gov (United States)

    2010-11-30

    ... site, http://anstaskforce.gov/documents.php . To obtain a hard copy of the Protocol, see Document... aquatic species that are the target of this risk analysis. Language used in the NANPCA differentiates...: http://anstaskforce.gov/documents.php Write: Susan Pasko, National Oceanic and Atmospheric...

  2. Analysis of agreement between cardiac risk stratification protocols applied to participants of a center for cardiac rehabilitation

    Directory of Open Access Journals (Sweden)

    Ana A. S. Santos

    2016-01-01

    Full Text Available ABSTRACT Background Cardiac risk stratification is related to the risk of the occurrence of events induced by exercise. Despite the existence of several protocols to calculate risk stratification, studies indicating that there is similarity between these protocols are still unknown. Objective To evaluate the agreement between the existing protocols on cardiac risk rating in cardiac patients. Method The records of 50 patients from a cardiac rehabilitation program were analyzed, from which the following information was extracted: age, sex, weight, height, clinical diagnosis, medical history, risk factors, associated diseases, and the results from the most recent laboratory and complementary tests performed. This information was used for risk stratification of the patients in the protocols of the American College of Sports Medicine, the Brazilian Society of Cardiology, the American Heart Association, the protocol designed by Frederic J. Pashkow, the American Association of Cardiovascular and Pulmonary Rehabilitation, the Société Française de Cardiologie, and the Sociedad Española de Cardiología. Descriptive statistics were used to characterize the sample and the analysis of agreement between the protocols was calculated using the Kappa coefficient. Differences were considered with a significance level of 5%. Results Of the 21 analyses of agreement, 12 were considered significant between the protocols used for risk classification, with nine classified as moderate and three as low. No agreements were classified as excellent. Different proportions were observed in each risk category, with significant differences between the protocols for all risk categories. Conclusion The agreements between the protocols were considered low and moderate and the risk proportions differed between protocols.

  3. 75 FR 53273 - Federal Aquatic Nuisance Species Research Risk Analysis Protocol

    Science.gov (United States)

    2010-08-31

    ... Aquatic Nuisance Species Task Force (ANSTF). The Protocol is available for public review and comment... the draft revised Protocol are available on the ANSTF website, http://anstaskforce.gov/documents.php... nonindigenous species (ANS) and is designed to reduce the risk that research activities may cause introduction...

  4. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  5. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  6. Screening Protocol for Early Identification of Brazilian Children at Risk for Dyslexia

    Directory of Open Access Journals (Sweden)

    Giseli D. Germano

    2017-10-01

    Full Text Available Early identification of students at risk of dyslexia has been an educational challenge in the past years. This research had two main goals. First, we aimed to develop a screening protocol for early identification of Brazilian children at risk for dyslexia; second, we aimed to identify the predictive variables of this protocol using Principal Component Analysis. The major step involved in developing this protocol was the selection of variables, which were chosen based on the literature review and linguistic criteria. The screening protocol was composed of seven cognitive-linguistic skills: Letter naming; Phonological Awareness (which comprises the following subtests: Rhyme production, Rhyme identification, Syllabic segmentation, Production of words from a given phoneme, Phonemic Synthesis, and Phonemic analysis; Phonological Working memory, Rapid naming Speed; Silent reading; Reading of words and non-words; and Auditory Comprehension of sentences from pictures. A total of 149 children, aged from 6 years to 6 and 11, of both genders who were enrolled in the 1st grade of elementary public schools were submitted to the screening protocol. Principal Component Analysis revealed four factors, accounting for 64.45% of the variance of the Protocol variables: first factor (“pre-reading”, second factor (“decoding”, third factor (“Reading”, and fourth factor “Auditory processing.” The factors found corroborate those reported in the National and International literature and have been described as early signs of dyslexia and reading problems.

  7. Study protocol for examining job strain as a risk factor for severe unipolar depression in an individual participant meta-analysis of 14 European cohorts

    DEFF Research Database (Denmark)

    Madsen, Ida E H; Hannerz, Harald; Nyberg, Solja T

    2013-01-01

    scales that do not necessarily correspond to clinically diagnosed depression. In addition, a meta-analysis from 2008 indicated publication bias in the field. METHODS: This study protocol describes the planned design and analyses of an individual participant data meta-analysis, to examine whether job...... using random effects meta-analysis. DISCUSSION: The planned analyses will help clarify whether job strain is associated with an increased risk of clinically diagnosed unipolar depression. As the analysis is based on pre-planned study protocols and an individual participant data meta-analysis, the pooled......BACKGROUND: Previous studies have shown that gainfully employed individuals with high work demands and low control at work (denoted "job strain") are at increased risk of common mental disorders, including depression. Most existing studies have, however, measured depression using self-rated symptom...

  8. Cancer risk of anti-TNF-α at recommended doses in adult rheumatoid arthritis: a meta-analysis with intention to treat and per protocol analyses.

    Directory of Open Access Journals (Sweden)

    Guillaume Moulis

    Full Text Available BACKGROUND: The risk of malignancies on TNF-α antagonists is controversial. The aim of this survey was to assess cancer risk on TNF-α antagonists in adult rheumatoid arthritis patients, including the five marketed drugs (infliximab, etanercept, adalimumab, golimumab and certolizumab used in line with the New Drug Application. Furthermore, the relative interest of modified intention to treat or per protocol analyses to assess such sparse events remains unknown. METHODOLOGY/PRINCIPAL FINDINGS: Data sources were MEDLINE, CENTRAL, ISI Web of Science, ACR and EULAR meeting abstracts, scientific evaluation of the drugs leading to their marketing approval, and clinicaltrials.gov, until 31 December 2012.We selected double-blind randomized controlled trials in adult rheumatoid arthritis patients, including at least one treatment arm in line with New Drug Application. We performed random effect meta-analysis, with modified intention to treat and per protocol analyses. Thirty-three trials were included. There was no excess risk of malignancies on anti-TNF-α administered in line with New Drug Application in the per protocol model (OR, 0.93 95%CI[0.59-1.44], as well as in the modified intention to treat model (OR, 1.27 95%CI[0.82-1.98]. There was a non-significant tendency for an excess non-melanoma skin cancer risk in both models (respectively, 1.37 [0.71-2.66] and 1.90 [0.98-3.67]. With fixed effect Peto model restricting to trials during at least 52 weeks, the overall cancer risk was respectively 1.60 [0.97-2.64] and 1.22 [0.72-2.08]. Whatever the model, modified intention to treat analysis led to higher estimations than per protocol analysis. The later may underestimate the treatment effect when assessing very sparse events and when many patients dropped out in placebo arms. In metaregression, there was no differential risk among the five drugs. CONCLUSIONS/SIGNIFICANCE: This study did not find any evidence for an excess cancer risk on TNF

  9. Traditional cardiovascular risk factors and coronary collateral circulation: Protocol for a systematic review and meta-analysis of case-control studies.

    Science.gov (United States)

    Xing, Zhenhua; Pei, Junyu; Tang, Liang; Hu, Xinqun

    2018-04-01

    Well-developed coronary collateral circulation usually results in fewer infarct size, improved cardiac function, and fewer mortality. Traditional coronary risk factors (diabetes, hypertension, and smoking) have some effects on coronary collateral circulation. However, the association between these risk factors and coronary collateral circulation are controversial. Given the confusing evidences regarding traditional cardiovascular risk factors on coronary collateral circulation, we performed this meta-analysis protocol to investigate the relationship between traditional risk factors of coronary artery disease and coronary collateral circulation. MEDINE, EMBASE, and Science Citation Index will be searched to identify relevant studies. The primary outcomes of this meta-analysis are well-developed coronary collateral circulation. Meta-analysis was performed to calculate the odds ratio (OR) and 95% confidence interval (CI) of traditional coronary risk factors (diabetes, smoking, hypertriton). Pooled ORs were computed as the Mantel-Haenszel-weighted average of the ORs for all included studies. Sensitivity analysis, quality assessment, publication bias analysis, and the Grading of Recommendations Assessment, Development and Evaluation approach (GRADE) will be performed to ensure the reliability of our results. This study will provide a high-quality synthesis of current evidence of traditional risk factors on collateral circulation. This conclusion of our systematic review and meta-analysis will provide evidence to judge whether traditional risk factors affects coronary collateral circulation.Ethics and dissemination: Ethical approval is not required because our systematic review and meta-analysis will be based on published data without interventions on patients. The findings of this study will be published in a peer-reviewed journal.

  10. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  11. Documentation Protocols to Generate Risk Indicators Regarding Degradation Processes for Cultural Heritage Risk Evaluation

    Science.gov (United States)

    Kioussi, A.; Karoglou, M.; Bakolas, A.; Labropoulos, K.; Moropoulou, A.

    2013-07-01

    Sustainable maintenance and preservation of cultural heritage assets depends highly on its resilience to external or internal alterations and to various hazards. Risk assessment of a heritage asset's can be defined as the identification of all potential hazards affecting it and the evaluation of the asset's vulnerability (building materials and building structure conservation state).Potential hazards for cultural heritage are complex and varying. The risk of decay and damage associated with monuments is not limited to certain long term natural processes, sudden events and human impact (macroscale of the heritage asset) but is also a function of the degradation processes within materials and structural elements due to physical and chemical procedures. Obviously, these factors cover different scales of the problem. The deteriorating processes in materials may be triggered by external influences or caused because of internal chemical and/or physical variations of materials properties and characteristics. Therefore risk evaluation should be dealt in the direction of revealing the specific active decay and damage mechanism both in mesoscale [type of decay and damage] and microscale [decay phenomenon mechanism] level. A prerequisite for risk indicators identification and development is the existence of an organised source of comparable and interoperable data about heritage assets under observation. This unified source of information offers a knowledge based background of the asset's vulnerability through the diagnosis of building materials' and building structure's conservation state, through the identification of all potential hazards affecting these and through mapping of its possible alterations during its entire life-time. In this framework the identification and analysis of risks regarding degradation processes for the development of qualitative and quantitative indicators can be supported by documentation protocols. The data investigated by such protocols help

  12. DOCUMENTATION PROTOCOLS TO GENERATE RISK INDICATORS REGARDING DEGRADATION PROCESSES FOR CULTURAL HERITAGE RISK EVALUATION

    Directory of Open Access Journals (Sweden)

    A. Kioussi

    2013-07-01

    Full Text Available Sustainable maintenance and preservation of cultural heritage assets depends highly on its resilience to external or internal alterations and to various hazards. Risk assessment of a heritage asset's can be defined as the identification of all potential hazards affecting it and the evaluation of the asset's vulnerability (building materials and building structure conservation state.Potential hazards for cultural heritage are complex and varying. The risk of decay and damage associated with monuments is not limited to certain long term natural processes, sudden events and human impact (macroscale of the heritage asset but is also a function of the degradation processes within materials and structural elements due to physical and chemical procedures. Obviously, these factors cover different scales of the problem. The deteriorating processes in materials may be triggered by external influences or caused because of internal chemical and/or physical variations of materials properties and characteristics. Therefore risk evaluation should be dealt in the direction of revealing the specific active decay and damage mechanism both in mesoscale [type of decay and damage] and microscale [decay phenomenon mechanism] level. A prerequisite for risk indicators identification and development is the existence of an organised source of comparable and interoperable data about heritage assets under observation. This unified source of information offers a knowledge based background of the asset's vulnerability through the diagnosis of building materials' and building structure's conservation state, through the identification of all potential hazards affecting these and through mapping of its possible alterations during its entire life-time. In this framework the identification and analysis of risks regarding degradation processes for the development of qualitative and quantitative indicators can be supported by documentation protocols. The data investigated by such

  13. Assessing older drivers: a primary care protocol to evaluate driving safety risk.

    Science.gov (United States)

    Murden, Robert A; Unroe, Kathleen

    2005-08-01

    Most articles on elder drivers offer either general advice, or review testing protocols that divide drivers into two distinct groups: safe or unsafe. We believe it is unreasonable to expect any testing to fully separate drivers into just these two mutually exclusive groups, so we offer a protocol for a more practical approach. This protocol can be applied by primary care physicians. We review the justification for the many steps of this protocol, which have branches that lead to identifying drivers as low risk, high risk (for accidents) or needing further evaluation. Options for further evaluation are provided.

  14. Increasing fall risk awareness using wearables: A fall risk awareness protocol.

    Science.gov (United States)

    Danielsen, Asbjørn; Olofsen, Hans; Bremdal, Bernt Arild

    2016-10-01

    Each year about a third of elderly aged 65 or older experience a fall. Many of these falls may have been avoided if fall risk assessment and prevention tools where available in a daily living situation. We identify what kind of information is relevant for doing fall risk assessment and prevention using wearable sensors in a daily living environment by investigating current research, distinguishing between prospective and context-aware fall risk assessment and prevention. Based on our findings, we propose a fall risk awareness protocol as a fall prevention tool integrating both wearables and ambient sensing technology into a single platform. Copyright © 2016. Published by Elsevier Inc.

  15. Multidisciplinary perioperative protocol in patients undergoing acute high-risk abdominal surgery

    DEFF Research Database (Denmark)

    Tengberg, L. T.; Bay-Nielsen, M.; Bisgaard, T.

    2017-01-01

    Background: Acute high-risk abdominal (AHA) surgery carries a very high risk of morbidity and mortality and represents a massive healthcare burden. The aim of the present study was to evaluate the effect of a standardized multidisciplinary perioperative protocol in patients undergoing AHA surgery...... = 0·004). Conclusion: The introduction of a multidisciplinary perioperative protocol was associated with a significant reduction in postoperative mortality in patients undergoing AHA surgery. NCT01899885 (http://www.clinicaltrials.gov)....

  16. Investigation of the Study Characteristics Affecting Clinical Trial Quality Using the Protocol Deviations Leading to Exclusion of Subjects From the Per Protocol Set Data in Studies for New Drug Application: A Retrospective Analysis.

    Science.gov (United States)

    Kohara, Norihito; Kaneko, Masayuki; Narukawa, Mamoru

    2018-01-01

    The concept of the risk-based approach has been introduced as an effort to secure the quality of clinical trials. In the risk-based approach, identification and evaluation of risk in advance are considered important. For recently completed clinical trials, we investigated the relationship between study characteristics and protocol deviations leading to the exclusion of subjects from Per Protocol Set (PPS) efficacy analysis. New drugs approved in Japan in the fiscal year 2014-2015 were targeted in the research. The reasons for excluding subjects from the PPS efficacy analysis were described in 102 trials out of 492 in the summary of new drug application documents, which was publicly disclosed after the drug's regulatory approval. The author extracted these reasons along with the numbers of the cases and the study characteristics of each clinical trial. Then, the direct comparison, univariate regression analysis, and multivariate regression analysis was carried out based on the exclusion rate. The study characteristics for which exclusion of subjects from the PPS efficacy analysis were frequently observed was multiregional clinical trials in study region; inhalant and external use in administration route; Anti-infective for systemic use; Respiratory system, Dermatologicals, and Nervous system in therapeutic drug under the Anatomical Therapeutic Chemical Classification. In the multivariate regression analysis, the clinical trial variables of inhalant, Respiratory system, or Dermatologicals were selected as study characteristics leading to a higher exclusion rate. The characteristics of the clinical trial that is likely to cause protocol deviations that will affect efficacy analysis were suggested. These studies should be considered for specific attention and priority observation in the trial protocol or its monitoring plan and execution, such as a clear description of inclusion/exclusion criteria in the protocol, development of training materials to site staff, and

  17. Failure mode and effects analysis of witnessing protocols for ensuring traceability during IVF.

    Science.gov (United States)

    Rienzi, Laura; Bariani, Fiorenza; Dalla Zorza, Michela; Romano, Stefania; Scarica, Catello; Maggiulli, Roberta; Nanni Costa, Alessandro; Ubaldi, Filippo Maria

    2015-10-01

    Traceability of cells during IVF is a fundamental aspect of treatment, and involves witnessing protocols. Failure mode and effects analysis (FMEA) is a method of identifying real or potential breakdowns in processes, and allows strategies to mitigate risks to be developed. To examine the risks associated with witnessing protocols, an FMEA was carried out in a busy IVF centre, before and after implementation of an electronic witnessing system (EWS). A multidisciplinary team was formed and moderated by human factors specialists. Possible causes of failures, and their potential effects, were identified and risk priority number (RPN) for each failure calculated. A second FMEA analysis was carried out after implementation of an EWS. The IVF team identified seven main process phases, 19 associated process steps and 32 possible failure modes. The highest RPN was 30, confirming the relatively low risk that mismatches may occur in IVF when a manual witnessing system is used. The introduction of the EWS allowed a reduction in the moderate-risk failure mode by two-thirds (highest RPN = 10). In our experience, FMEA is effective in supporting multidisciplinary IVF groups to understand the witnessing process, identifying critical steps and planning changes in practice to enable safety to be enhanced. Copyright © 2015 Reproductive Healthcare Ltd. Published by Elsevier Ltd. All rights reserved.

  18. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  19. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  20. [Comparison of the present and previously used protocol of risk stratification in children with acute lymphoblastic leukemia].

    Science.gov (United States)

    Glodkowska, Eliza; Bialas, Agnieszka; Jackowska, Teresa

    2007-01-01

    Acute lymphoblastic leukaemia (ALL) is one of the most common cancers in children. In Poland, since November 2002 a new protocol of risk stratification has been recommended for assessment of risk factors and for choosing therapy regimens. assessment of accuracy of protocol ALL-IC 2002 in comparison to previously used risk stratification protocols. ALL was diagnosed in 100 children (44 girls, 56 boys; 1-18 years of age) in the Department of Pediatric Hematology and Oncology, Warsaw Medical University, over the period from November 2002 to November 2006. According to the ALL-IC 2002 protocol the patients were divided into three risk groups: SR-standard, IR-intermediate and HR-high. The stratification was by age, leukocyte count, cytogenetic changes, early response to prednisone therapy and bone marrow remission. In the previously used risk stratification protocols-BFM-90, only hepatosplenomegaly and the number of blasts in peripheral blood (PB) were considered, and the patients were divided into three risk groups: low (LRG1.2). out of the 100 patients qualified for treatment regimens according to the ALL-IC 2002 protocol, 97 entered remission, 11 died and 3 had a relapse. Under the ALL-IC 2002 protocol these children were stratified into the following groups: SR-31%, IR-44% and HR-25%. In the previously used stratification, there would be 26% children in low, 46% in the medium and 28% in the high risk group. According to the BFM-90 protocol 18/31 (58%) and 16/44 (36%) patients from the SR and IR groups respectively would be given more intensive treatment. On the other hand 11/44 (25%) and 14/25 (56%) patients from the IR and HR groups respectively would be given less intensive treatment. 1. ALL-IC 2002 protocol in comparison with the previously used protocol BFM-90, changes the qualification of children with ALL for the SR, IR and HR risk groups. This is linked to basic change of treatment protocol, adequate to severity of disease. 2. Children with ALL qualified

  1. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  2. Reduction of cancer risk by optimization of Computed Tomography head protocols: far eastern Cuban experience

    International Nuclear Information System (INIS)

    Miller Clemente, R.; Adame Brooks, D.; Lores Guevara, M.; Perez Diaz, M.; Arias Garlobo, M. L.; Ortega Rodriguez, O.; Nepite Haber, R.; Grinnan Hernandez, O.; Guillama Llosas, A.

    2015-01-01

    The cancer risk estimation constitutes one way for the evaluation of the public health, regarding computed tomography (CT) exposures. Starting from the hypothesis that the optimization of CT protocols would reduce significantly the added cancer risk, the purpose of this research was the application of optimization strategies regarding head CT protocols, in order to reduce the factors affecting the risk of induced cancer. The applied systemic approach included technological and human components, represented by quantitative physical factors. the volumetric kerma indexes, compared with respect to standard, optimized and reference values, were evaluated with multiple means comparison method. The added cancer risk resulted from the application of the methodology for biological effects evaluation, at low doses with low Linear Energy Transfer. Human observers in all scenarios evaluated the image quality. the reduced dose was significantly lower than for standard head protocols and reference levels, where: (1) for pediatric patients, by using an Automatic Exposure Control system, a reduction of 31% compared with standard protocol and ages range of 10-14, and (2) adults, using a Bilateral Filter for images obtained at low doses of 62% from those of standard head protocol. The risk reduction was higher than 25%. The systemic approach used allows the effective identification of factors involved on cancer risk related with exposures to CT. The combination of dose modulation and image restoration with Bilateral Filter, provide a significantly reduction of cancer risk, with acceptable diagnostic image quality. (Author)

  3. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  4. A protocol improves GP recording of long-term sickness absence risk factors.

    Science.gov (United States)

    van Dijk, Paul; Hogervorst, Wouter; ter Riet, Gerben; van Dijk, Frank

    2008-06-01

    If general practitioners (GPs) were better informed about patients' risks of long-term sickness absence (LTSA), they could incorporate these risk assessments into their patient management plans and cooperate more with occupational physicians to prevent LTSA. To evaluate the effectiveness of a protocol helping GPs in recording risks of LTSA and in co-operating with occupational physicians (OPs). Twenty-six GPs (co-operating in four groups) in Amsterdam, The Netherlands, participated in a controlled intervention study. Fourteen GPs were the protocol-supported intervention group and twelve GPs were the reference group. Outcome measures were consultations containing work-related information, information about two risk factors for LTSA, referrals to OPs and contacts of OPs with GPs and patients. Outcomes were identified through an electronic search in the GPs' information systems. Entries containing information were independently scored by two investigators. The proportions of patients with consultations documenting LTSA-pertinent items were compared between the groups, accounting for differences at baseline. There was no increase in consultations containing work-related information. Recording of risk factor information increased in the intervention group; the difference was 4.5% [95% CI 1.5-7.6] and 1.8% (95% CI -0.8 to 4.4) for the two risk factors. The referral rate to the OP increased by 2.9% (95% CI 1.2-4.5). There was no effect on contacts of OPs with GPs or with patients. Protocol-supported consultations may lead to a modest increase in information regarding two risk factors for LTSA in GPs' electronic records and to more referrals to OPs.

  5. A Calculus for Control Flow Analysis of Security Protocols

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Nielson, Hanne Riis; Nielson, Flemming

    2004-01-01

    The design of a process calculus for anaysing security protocols is governed by three factors: how to express the security protocol in a precise and faithful manner, how to accommodate the variety of attack scenarios, and how to utilise the strengths (and limit the weaknesses) of the underlying...... analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style and we have previously shown its ability to analyse a variety of security protocols. This paper develops a calculus, LysaNS that allows for much greater control and clarity in the description...

  6. Study protocol for examining job strain as a risk factor for severe unipolar depression in an individual participant meta-analysis of 14 European cohorts [v2; ref status: indexed, http://f1000r.es/30q

    Directory of Open Access Journals (Sweden)

    Ida E. H. Madsen

    2014-02-01

    Full Text Available Background: Previous studies have shown that gainfully employed individuals with high work demands and low control at work (denoted “job strain” are at increased risk of common mental disorders, including depression. Most existing studies have, however, measured depression using self-rated symptom scales that do not necessarily correspond to clinically diagnosed depression. In addition, a meta-analysis from 2008 indicated publication bias in the field.   Methods: This study protocol describes the planned design and analyses of an individual participant data meta-analysis, to examine whether job strain is associated with an increased risk of clinically diagnosed unipolar depression based on hospital treatment registers.  The study will be based on data from approximately 120,000 individuals who participated in 14 studies on work environment and health in 4 European countries. The self-reported working conditions data will be merged with national registers on psychiatric hospital treatment, primarily hospital admissions. Study-specific risk estimates for the association between job strain and depression will be calculated using Cox regressions. The study-specific risk estimates will be pooled using random effects meta-analysis.   Discussion: The planned analyses will help clarify whether job strain is associated with an increased risk of clinically diagnosed unipolar depression. As the analysis is based on pre-planned study protocols and an individual participant data meta-analysis, the pooled risk estimates will not be influenced by selective reporting and publication bias. However, the results of the planned study may only pertain to severe cases of unipolar depression, because of the outcome measure applied.

  7. Study protocol for examining job strain as a risk factor for severe unipolar depression in an individual participant meta-analysis of 14 European cohorts [v1; ref status: indexed, http://f1000r.es/1yz

    Directory of Open Access Journals (Sweden)

    IPD-Work Consortium

    2013-11-01

    Full Text Available Background: Previous studies have shown that gainfully employed individuals with high work demands and low control at work (denoted “job strain” are at increased risk of common mental disorders, including depression. Most existing studies have, however, measured depression using self-rated symptom scales that do not necessarily correspond to clinically diagnosed depression. In addition, a meta-analysis from 2008 indicated publication bias in the field.   Methods: This study protocol describes the planned design and analyses of an individual participant data meta-analysis, to examine whether job strain is associated with an increased risk of clinically diagnosed unipolar depression based on hospital treatment registers.  The study will be based on data from approximately 120,000 individuals who participated in 14 studies on work environment and health in 4 European countries. The self-reported working conditions data will be merged with national registers on psychiatric hospital treatment, primarily hospital admissions. Study-specific risk estimates for the association between job strain and depression will be calculated using Cox regressions. The study-specific risk estimates will be pooled using random effects meta-analysis.   Discussion: The planned analyses will help clarify whether job strain is associated with an increased risk of clinically diagnosed unipolar depression. As the analysis is based on pre-planned study protocols and an individual participant data meta-analysis, the pooled risk estimates will not be influenced by selective reporting and publication bias. However, the results of the planned study may only pertain to severe cases of unipolar depression, because of the outcome measure applied.

  8. Fall risk screening protocol for older hearing clinic patients.

    Science.gov (United States)

    Criter, Robin E; Honaker, Julie A

    2017-10-01

    The primary purposes of this study were (1) to describe measures that may contrast audiology patients who fall from those who do not fall and (2) to evaluate the clinical performance of measures that could be easily used for fall risk screening in a mainstream audiology hearing clinic. Cross-sectional study Study sample: Thirty-six community-dwelling audiology patient participants and 27 community-dwelling non-audiology patients over 60 years of age. The Hearing Handicap Inventory for the Elderly (HHIE) most accurately identified patients with a recent fall (sensitivity: 76.0%), while the Dizziness Handicap Inventory (DHI) most accurately identified patients without a recent fall (specificity: 90.9%). A combination of measures used in a protocol-including HHIE, DHI, number of medications, and the Timed Up and Go test-resulted in good, accurate identification of patients with or without a recent history of falls (92.0% sensitivity, 100% specificity). This study reports good sensitivity and excellent specificity for identifying patients with and without a recent history of falls when measures were combined into a screening protocol. Despite previously reported barriers, effective fall risk screenings may be performed in hearing clinic settings with measures often readily accessible to audiologists.

  9. Comprehensive protocol of traceability during IVF: the result of a multicentre failure mode and effect analysis.

    Science.gov (United States)

    Rienzi, L; Bariani, F; Dalla Zorza, M; Albani, E; Benini, F; Chamayou, S; Minasi, M G; Parmegiani, L; Restelli, L; Vizziello, G; Costa, A Nanni

    2017-08-01

    Can traceability of gametes and embryos be ensured during IVF? The use of a simple and comprehensive traceability system that includes the most susceptible phases during the IVF process minimizes the risk of mismatches. Mismatches in IVF are very rare but unfortunately possible with dramatic consequences for both patients and health care professionals. Traceability is thus a fundamental aspect of the treatment. A clear process of patient and cell identification involving witnessing protocols has to be in place in every unit. To identify potential failures in the traceability process and to develop strategies to mitigate the risk of mismatches, previously failure mode and effects analysis (FMEA) has been used effectively. The FMEA approach is however a subjective analysis, strictly related to specific protocols and thus the results are not always widely applicable. To reduce subjectivity and to obtain a widespread comprehensive protocol of traceability, a multicentre centrally coordinated FMEA was performed. Seven representative Italian centres (three public and four private) were selected. The study had a duration of 21 months (from April 2015 to December 2016) and was centrally coordinated by a team of experts: a risk analysis specialist, an expert embryologist and a specialist in human factor. Principal investigators of each centre were first instructed about proactive risk assessment and FMEA methodology. A multidisciplinary team to perform the FMEA analysis was then formed in each centre. After mapping the traceability process, each team identified the possible causes of mistakes in their protocol. A risk priority number (RPN) for each identified potential failure mode was calculated. The results of the FMEA analyses were centrally investigated and consistent corrective measures suggested. The teams performed new FMEA analyses after the recommended implementations. In each centre, this study involved: the laboratory director, the Quality Control & Quality

  10. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  11. Insect Venom Immunotherapy: Analysis of the Safety and Tolerance of 3 Buildup Protocols Frequently Used in Spain.

    Science.gov (United States)

    Gutiérrez Fernández, D; Moreno-Ancillo, A; Fernández Meléndez, S; Domínguez-Noche, C; Gálvez Ruiz, P; Alfaya Arias, T; Carballada González, F; Alonso Llamazares, A; Marques Amat, L; Vega Castro, A; Antolín Amérigo, D; Cruz Granados, S; Ruiz León, B; Sánchez Morillas, L; Fernández Sánchez, J; Soriano Gomis, V; Borja Segade, J; Dalmau Duch, G; Guspi Bori, R; Miranda Páez, A

    2016-01-01

    Hymenoptera venom immunotherapy (VIT) is an effective treatment but not one devoid of risk, as both local and systemic adverse reactions may occur, especially in the initial phases. We compared the tolerance to 3 VIT buildup protocols and analyzed risk factors associated with adverse reactions during this phase. We enrolled 165 patients divided into 3 groups based on the buildup protocol used (3, 4, and 9 weeks). The severity of systemic reactions was evaluated according to the World Allergy Organization model. Results were analyzed using exploratory descriptive statistics, and variables were compared using analysis of variance. Adverse reactions were recorded in 53 patients (32%) (43 local and 10 systemic). Local reactions were immediate in 27 patients (63%) and delayed in 16 (37%). The severity of the local reaction was slight/moderate in 15 patients and severe in 13. Systemic reactions were grade 1-2. No significant association was found between the treatment modality and the onset of local or systemic adverse reactions or the type of local reaction. We only found a statistically significant association between severity of the local reaction and female gender. As for the risk factors associated with systemic reactions during the buildup phase, we found no significant differences in values depending on the protocol used or the insect responsible. The buildup protocols compared proved to be safe and did not differ significantly from one another. In the population studied, patients undergoing the 9-week schedule presented no systemic reactions. Therefore, this protocol can be considered the safest approach.

  12. Relative risk analysis of several manufactured nanomaterials: an insurance industry context.

    Science.gov (United States)

    Robichaud, Christine Ogilvie; Tanzil, Dicksen; Weilenmann, Ulrich; Wiesner, Mark R

    2005-11-15

    A relative risk assessment is presented for the industrial fabrication of several nanomaterials. The production processes for five nanomaterials were selected for this analysis, based on their current or near-term potential for large-scale production and commercialization: single-walled carbon nanotubes, bucky balls (C60), one variety of quantum dots, alumoxane nanoparticles, and nano-titanium dioxide. The assessment focused on the activities surrounding the fabrication of nanomaterials, exclusive of any impacts or risks with the nanomaterials themselves. A representative synthesis method was selected for each nanomaterial based on its potential for scaleup. A list of input materials, output materials, and waste streams for each step of fabrication was developed and entered into a database that included key process characteristics such as temperature and pressure. The physical-chemical properties and quantities of the inventoried materials were used to assess relative risk based on factors such as volatility, carcinogenicity, flammability, toxicity, and persistence. These factors were first used to qualitatively rank risk, then combined using an actuarial protocol developed by the insurance industry for the purpose of calculating insurance premiums for chemical manufacturers. This protocol ranks three categories of risk relative to a 100 point scale (where 100 represents maximum risk): incident risk, normal operations risk, and latent contamination risk. Results from this analysis determined that relative environmental risk from manufacturing each of these five materials was comparatively low in relation to other common industrial manufacturing processes.

  13. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  14. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  15. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Van Leeuwen, Brian P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Eldridge, John M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approach that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.

  16. Risk of Deep vein thrombosis in neurosurgery: State of the art on prophylaxis protocols and best clinical practices.

    Science.gov (United States)

    Ganau, Mario; Prisco, Lara; Cebula, Helene; Todeschi, Julien; Abid, Houssem; Ligarotti, Gianfranco; Pop, Raoul; Proust, Francois; Chibbaro, Salvatore

    2017-11-01

    To analytically discuss some protocols in Deep vein thrombosis (DVT)/pulmonary Embolism (PE) prophylaxis currently use in Neurosurgical Departments around the world. Analysis of the prophylaxis protocols in the English literature: An analytical and narrative review of literature concerning DVT prophylaxis protocols in Neurosurgery have been conducted by a PubMed search (back to 1978). 80 abstracts were reviewed, and 74 articles were extracted. The majority of DVT seems to develop within the first week after a neurosurgical procedure, and a linear correlation between the duration of surgery and DVT occurrence has been highlighted. The incidence of DVT seems greater for cranial (7.7%) than spinal procedures (1.5%). Although intermittent pneumatic compression (IPC) devices provided adequate reduction of DVT/PE in some cranial and combined cranial/spinal series, low-dose subcutaneous unfractionated heparin (UFH) or low molecular-weight heparin (LMWH) further reduced the incidence, not always of DVT, but of PE. Nevertheless, low-dose heparin-based prophylaxis in cranial and spinal series risks minor and major postoperative haemorrhages: 2-4% in cranial series, 3.4% minor and 3.4% major haemorrhages in combined cranial/spinal series, and a 0.7% incidence of major/minor haemorrhages in spinal series. This analysis showed that currently most of the articles are represented by case series and case reports. As long as clear guidelines will not be defined and universally applied to this diverse group of patients, any prophylaxis for DVT and PE should be tailored to the individual patient with cautious assessment of benefits versus risks. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Mean-Field Analysis for the Evaluation of Gossip Protocols

    NARCIS (Netherlands)

    Bakshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  18. Mean-field analysis for the evaluation of gossip protocols

    NARCIS (Netherlands)

    Bakhshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    2008-01-01

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  19. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  20. A Ten Step Protocol and Plan for CCS Site Characterization, Based on an Analysis of the Rocky Mountain Region, USA

    Energy Technology Data Exchange (ETDEWEB)

    McPherson, Brian; Matthews, Vince

    2013-09-15

    This report expresses a Ten-Step Protocol for CO2 Storage Site Characterization, the final outcome of an extensive Site Characterization analysis of the Rocky Mountain region, USA. These ten steps include: (1) regional assessment and data gathering; (2) identification and analysis of appropriate local sites for characterization; (3) public engagement; (4) geologic and geophysical analysis of local site(s); (5) stratigraphic well drilling and coring; (6) core analysis and interpretation with other data; (7) database assembly and static model development; (8) storage capacity assessment; (9) simulation and uncertainty assessment; (10) risk assessment. While the results detailed here are primarily germane to the Rocky Mountain region, the intent of this protocol is to be portable or generally applicable for CO2 storage site characterization.

  1. RCRA groundwater data analysis protocol for the Hanford Site, Washington

    International Nuclear Information System (INIS)

    Chou, C.J.; Jackson, R.L.

    1992-04-01

    The Resource Conservation and Recovery Act of 1976 (RCRA) groundwater monitoring program currently involves site-specific monitoring of 20 facilities on the Hanford Site in southeastern Washington. The RCRA groundwater monitoring program has collected abundant data on groundwater quality. These data are used to assess the impact of a facility on groundwater quality or whether remediation efforts under RCRA corrective action programs are effective. Both evaluations rely on statistical analysis of groundwater monitoring data. The need for information on groundwater quality by regulators and environmental managers makes statistical analysis of monitoring data an important part of RCRA groundwater monitoring programs. The complexity of groundwater monitoring programs and variabilities (spatial, temporal, and analytical) exhibited in groundwater quality variables indicate the need for a data analysis protocol to guide statistical analysis. A data analysis protocol was developed from the perspective of addressing regulatory requirements, data quality, and management information needs. This data analysis protocol contains four elements: data handling methods; graphical evaluation techniques; statistical tests for trend, central tendency, and excursion analysis; and reporting procedures for presenting results to users

  2. Communicating systems with UML 2 modeling and analysis of network protocols

    CERN Document Server

    Barrera, David Garduno

    2013-01-01

    This book gives a practical approach to modeling and analyzing communication protocols using UML 2. Network protocols are always presented with a point of view focusing on partial mechanisms and starting models. This book aims at giving the basis needed for anybody to model and validate their own protocols. It follows a practical approach and gives many examples for the description and analysis of well known basic network mechanisms for protocols.The book firstly shows how to describe and validate the main protocol issues (such as synchronization problems, client-server interactions, layer

  3. An approach to standardization of urine sediment analysis via suggestion of a common manual protocol.

    Science.gov (United States)

    Ko, Dae-Hyun; Ji, Misuk; Kim, Sollip; Cho, Eun-Jung; Lee, Woochang; Yun, Yeo-Min; Chun, Sail; Min, Won-Ki

    2016-01-01

    The results of urine sediment analysis have been reported semiquantitatively. However, as recent guidelines recommend quantitative reporting of urine sediment, and with the development of automated urine sediment analyzers, there is an increasing need for quantitative analysis of urine sediment. Here, we developed a protocol for urine sediment analysis and quantified the results. Based on questionnaires, various reports, guidelines, and experimental results, we developed a protocol for urine sediment analysis. The results of this new protocol were compared with those obtained with a standardized chamber and an automated sediment analyzer. Reference intervals were also estimated using new protocol. We developed a protocol with centrifugation at 400 g for 5 min, with the average concentration factor of 30. The correlation between quantitative results of urine sediment analysis, the standardized chamber, and the automated sediment analyzer were generally good. The conversion factor derived from the new protocol showed a better fit with the results of manual count than the default conversion factor in the automated sediment analyzer. We developed a protocol for manual urine sediment analysis to quantitatively report the results. This protocol may provide a mean for standardization of urine sediment analysis.

  4. Cardiovascular Disease Population Risk Tool (CVDPoRT): predictive algorithm for assessing CVD risk in the community setting. A study protocol.

    Science.gov (United States)

    Taljaard, Monica; Tuna, Meltem; Bennett, Carol; Perez, Richard; Rosella, Laura; Tu, Jack V; Sanmartin, Claudia; Hennessy, Deirdre; Tanuseputro, Peter; Lebenbaum, Michael; Manuel, Douglas G

    2014-10-23

    Recent publications have called for substantial improvements in the design, conduct, analysis and reporting of prediction models. Publication of study protocols, with prespecification of key aspects of the analysis plan, can help to improve transparency, increase quality and protect against increased type I error. Valid population-based risk algorithms are essential for population health planning and policy decision-making. The purpose of this study is to develop, evaluate and apply cardiovascular disease (CVD) risk algorithms for the population setting. The Ontario sample of the Canadian Community Health Survey (2001, 2003, 2005; 77,251 respondents) will be used to assess risk factors focusing on health behaviours (physical activity, diet, smoking and alcohol use). Incident CVD outcomes will be assessed through linkage to administrative healthcare databases (619,886 person-years of follow-up until 31 December 2011). Sociodemographic factors (age, sex, immigrant status, education) and mediating factors such as presence of diabetes and hypertension will be included as predictors. Algorithms will be developed using competing risks survival analysis. The analysis plan adheres to published recommendations for the development of valid prediction models to limit the risk of overfitting and improve the quality of predictions. Key considerations are fully prespecifying the predictor variables; appropriate handling of missing data; use of flexible functions for continuous predictors; and avoiding data-driven variable selection procedures. The 2007 and 2009 surveys (approximately 50,000 respondents) will be used for validation. Calibration will be assessed overall and in predefined subgroups of importance to clinicians and policymakers. This study has been approved by the Ottawa Health Science Network Research Ethics Board. The findings will be disseminated through professional and scientific conferences, and in peer-reviewed journals. The algorithm will be accessible

  5. Risks to the fetus from diagnostic imaging during pregnancy: review and proposal of a clinical protocol

    International Nuclear Information System (INIS)

    Gomes, Mafalda; Matias, Alexandra; Macedo, Filipe

    2015-01-01

    Every day, medical practitioners face the dilemma of exposing pregnant or possibly pregnant patients to radiation from diagnostic examinations. Both doctors and patients often have questions about the risks of radiation. The most vulnerable period is between the 8th and 15th weeks of gestation. Deterministic effects like pregnancy loss, congenital malformations, growth retardation and neurobehavioral abnormalities have threshold doses above 100-200 mGy. The risk is considered negligible at 50 mGy and in reality no diagnostic examination exceeds this limit. The risk of carcinogenesis is slightly higher than in the general population. Intravenous iodinated contrast is discouraged, except in highly selected patients. Considering all the possible noxious effects of radiation exposure, measures to diminish radiation are essential and affect the fetal outcome. Nonionizing procedures should be considered whenever possible and every radiology center should have its own data analysis on fetal radiation exposure. In this review, we analyze existing literature on fetal risks due to radiation exposure, producing a clinical protocol to guide safe radiation use in a clinical setting. (orig.)

  6. Risks to the fetus from diagnostic imaging during pregnancy: review and proposal of a clinical protocol.

    Science.gov (United States)

    Gomes, Mafalda; Matias, Alexandra; Macedo, Filipe

    2015-12-01

    Every day, medical practitioners face the dilemma of exposing pregnant or possibly pregnant patients to radiation from diagnostic examinations. Both doctors and patients often have questions about the risks of radiation. The most vulnerable period is between the 8th and 15th weeks of gestation. Deterministic effects like pregnancy loss, congenital malformations, growth retardation and neurobehavioral abnormalities have threshold doses above 100-200 mGy. The risk is considered negligible at 50 mGy and in reality no diagnostic examination exceeds this limit. The risk of carcinogenesis is slightly higher than in the general population. Intravenous iodinated contrast is discouraged, except in highly selected patients. Considering all the possible noxious effects of radiation exposure, measures to diminish radiation are essential and affect the fetal outcome. Nonionizing procedures should be considered whenever possible and every radiology center should have its own data analysis on fetal radiation exposure. In this review, we analyze existing literature on fetal risks due to radiation exposure, producing a clinical protocol to guide safe radiation use in a clinical setting.

  7. Risks to the fetus from diagnostic imaging during pregnancy: review and proposal of a clinical protocol

    Energy Technology Data Exchange (ETDEWEB)

    Gomes, Mafalda; Matias, Alexandra [University of Porto, Faculty of Medicine, Porto (Portugal); Macedo, Filipe [SMIC, Porto (Portugal)

    2015-12-15

    Every day, medical practitioners face the dilemma of exposing pregnant or possibly pregnant patients to radiation from diagnostic examinations. Both doctors and patients often have questions about the risks of radiation. The most vulnerable period is between the 8th and 15th weeks of gestation. Deterministic effects like pregnancy loss, congenital malformations, growth retardation and neurobehavioral abnormalities have threshold doses above 100-200 mGy. The risk is considered negligible at 50 mGy and in reality no diagnostic examination exceeds this limit. The risk of carcinogenesis is slightly higher than in the general population. Intravenous iodinated contrast is discouraged, except in highly selected patients. Considering all the possible noxious effects of radiation exposure, measures to diminish radiation are essential and affect the fetal outcome. Nonionizing procedures should be considered whenever possible and every radiology center should have its own data analysis on fetal radiation exposure. In this review, we analyze existing literature on fetal risks due to radiation exposure, producing a clinical protocol to guide safe radiation use in a clinical setting. (orig.)

  8. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  9. Protocol design and analysis for cooperative wireless networks

    CERN Document Server

    Song, Wei; Jin, A-Long

    2017-01-01

    This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...

  10. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    International Nuclear Information System (INIS)

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-01-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults

  11. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  12. Rethinking Protocol Analysis from a Cultural Perspective.

    Science.gov (United States)

    Smagorinsky, Peter

    2001-01-01

    Outlines a cultural-historical activity theory (CHAT) perspective that accounts for protocol analysis along three key dimensions: the relationship between thinking and speech from a representational standpoint; the social role of speech in research methodology; and the influence of speech on thinking and data collection. (Author/VWL)

  13. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4, Volume IV: Inherent Optical Properties: Instruments, Characterizations, Field Measurements and Data Analysis Protocols

    Science.gov (United States)

    Mueller, J. L.; Fargion, G. S.; McClain, C. R. (Editor); Pegau, S.; Zanefeld, J. R. V.; Mitchell, B. G.; Kahru, M.; Wieland, J.; Stramska, M.

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparision and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background, and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 is entirely superseded by the six volumes of Revision 4 listed above.

  14. Design and Analysis of Transport Protocols for Reliable High-Speed Communications

    NARCIS (Netherlands)

    Oláh, A.

    1997-01-01

    The design and analysis of transport protocols for reliable communications constitutes the topic of this dissertation. These transport protocols guarantee the sequenced and complete delivery of user data over networks which may lose, duplicate and reorder packets. Reliable transport services are

  15. WHY DO YOU NEED TO USE A CARIES RISK ASSESSMENT PROTOCOL TO PROVIDE AN EFFECTIVE CARIES PREVENTIVE REGIME?

    Science.gov (United States)

    Afuakwah, Charles; Welbury, Richard

    2015-11-01

    Clinical guidelines recommend an individual is given a caries risk status based on analysis of defined clinical and social criteria before implementing a tailored preventive plan. Improve documentation of caries risk assessment (CRA) in a general dental practice setting, using a systems-based approach to quality improvement methods. Investigate the impact of quality improvement efforts on subsequent design and delivery of preventive care. Identify barriers to delivery of CRA and provision of preventive care. Data for patients aged 0-16 years was collected over two cycles using standard audit methodology. The first cycle was a retrospective analysis (n = 400) using random sampling. The second cycle a prospective analysis (n = 513) using consecutive sampling over a 15-week period. Five staff meetings with feedback occurred between cycles. In cycle one, no specific CRA system was identified. CRA status was not stated widely, risk factors were not analysed and there was variation with respect to the prescription and delivery of preventive strategies. These discrepancies were demonstrable for all four participating dentists and at all ages. In cycle two, 100% recorded CRA. All risk factors were analysed and individual caries risk was correctly annotated. There was 100% compliance with the protocol for preventive plans. The use of CRA improved documentation of caries risk status. This has improved subsequent prescription of age specific evidence-based preventive care appropriate to the risk status of that individual. Barriers were identified to the delivery of CRA and the provision of comprehensive preventive care by the dentists and other healthcare professionals.

  16. Analysis of the LTE Access Reservation Protocol for Real-Time Traffic

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2013-01-01

    LTE is increasingly seen as a system for serving real-time Machine-to-Machine (M2M) communication needs. The asynchronous M2M user access in LTE is obtained through a two-phase access reservation protocol (contention and data phase). Existing analysis related to these protocols is based...... of the two-phase LTE reservation protocol and asses its performance, when assumptions (1) and (2) do not hold....

  17. Clinical trials of CCLSG L874 and I874 protocols without cranial irradiation for standard-risk acute lymphoblastic leukemia in childhood

    International Nuclear Information System (INIS)

    Koizumi, Shoichi; Fujimoto, Takeo; Tsurusawa, Masahito

    1992-01-01

    In the CCLSG-874 protocol for children with low-risk (LR) and intermediate-risk (IR) acute lymphoblastic leukemia (ALL), two regimens with or without cranial irradiation (CI) were compared with respect to their ability to prevent central nervous system (CNS) leukemia and to improve overall outcome of ALL. From 1987 to 1990, 82 and 109 evaluable patients were registered into L874 and I874 protocols for LR and IR patients, respectively. All responders to induction therapy were randomized to treatment with 18 Gy of CI plus intrathecal methotrexate (MTX it) or to treatment with high-dose MTX plus MTX it. Patients were then treated with standard maintenance regimens of L874 and I874. At a median follow-up of 39 months (range 14-58 months) there was no difference in the rate of hematologic relapse between the CI group and MTX group. The rate of CNS relapse in the MTX group seemed to be higher (3 of 39 in L874 and 2 of 54 in I874) than that in the CI group (1 of 43 in L874 and 0 of 55 in I874), but these data were not statistically significant. The rates of 4-year event-free survival (EFS) in L874 were 81.1±7.6% (mean±SE) and 75.2±7.9% (ns) for the CI and MTX group, respectively, and the rates of EFS in I874 were 70.0±13.6% and 70.0±9.0% (ns) for the CI and MTX group, respectively. These data suggest that MTX alone may be as effective as CI to prolong disease-free survival in LR and IR ALL although further continuous studies are needed. Analysis of serial CCLSG protocols for ALL from 1981 revealed that the rate of EFS of ALL allover including all risk groups has gradually been increasing from 44.2±3.6% for 811 protocol and 53.1±3.5% for 841 to 65.5±3.6% for the present 874 protocol. (author)

  18. A pilot audit of a protocol for ambulatory investigation of predicted low-risk patients with possible pulmonary embolism.

    Science.gov (United States)

    McDonald, A H; Murphy, R

    2011-09-01

    Patients with possible pulmonary embolism (PE) commonly present to acute medical services. Research has led to the identification of low-risk patients suitable for ambulatory management. We report on a protocol designed to select low-risk patients for ambulatory investigation if confirmatory imaging is not available that day. The protocol was piloted in the Emergency Department and Medical Assessment Area at the Royal Infirmary of Edinburgh. We retrospectively analysed electronic patient records in an open observational audit of all patients managed in the ambulatory arm over five months of use. We analysed 45 patients' records. Of these, 91.1% required imaging to confirm or refute PE, 62.2% received a computed tomography pulmonary angiogram (CTPA). In 25% of patients, PE was confirmed with musculoskeletal pain (22.7%), and respiratory tract infection (15.9%) the next most prevalent diagnoses. Alternative diagnoses was provided by CTPA in 32% of cases. We identified no adverse events or readmissions but individualised follow-up was not attempted. The data from this audit suggests this protocol can be applied to select and manage low-risk patients suitable for ambulatory investigation of possible PE. A larger prospective comparative study would be required to accurately define the safety and effectiveness of this protocol.

  19. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  20. Formal Security Analysis of the MaCAN Protocol

    DEFF Research Database (Denmark)

    Bruni, Alessandro; Sojka, Michal; Nielson, Flemming

    2014-01-01

    analysis identifies two flaws in the original protocol: one creates unavailability concerns during key establishment, and the other allows re-using authenticated signals for different purposes. We propose and analyse a modification that improves its behaviour while fitting the constraints of CAN bus...

  1. Association between highly active antiretroviral therapy and selected cardiovascular disease risk factors in sub-Saharan Africa: a systematic review and meta-analysis protocol.

    Science.gov (United States)

    Dimala, Christian Akem; Blencowe, Hannah

    2017-03-09

    The increasing highly active antiretroviral therapy (HAART) coverage in sub-Saharan Africa (SSA) has been associated with increasing cardiovascular disease (CVD) incidence. However, the epidemiology of the association between HAART and CVD risk factors in SSA is sparse. We aim to assess the extent to which HAART is associated with selected cardiovascular risk factors (hypertension, diabetes, dyslipidaemia and metabolic syndrome) in SSA. This will be a systematic review and meta-analysis of published studies on the association between HAART and CVD risk factors retrieved from Medline, Embase, Popline, Africa-Wide Information, African Index Medicus and the Cochrane library databases. Studies will be screened for eligibility according to the selection criteria by two independent reviewers. Eligible studies will be assessed for the quality of their evidence and risk of bias using the Quality Assessment Tool for Observational Cohort and Cross-Sectional Studies of the National Health Institute and the Grading of Recommendations Assessment, Development and Evaluation (GRADE) approach, with respect to the measured outcomes (hypertension, diabetes, dyslipidaemia and metabolic syndrome). A data abstraction form will be produced on Epi info V.7 and data analysis done on STATA V.14 statistical software. Summary estimates of measures of effects for the association between HAART use and the outcomes will be derived. Random effects meta-analyses will be performed and I 2 statistic used to assess for heterogeneity between studies with respect to measured parameters. Qualitative synthesis will be used where data is insufficient to produce quantitative synthesis. The protocol has been reviewed by the Research Governance & Integrity Office of the Research Ethics Committee of the London School of Hygiene and Tropical Medicine and confirmed as not requiring ethical approval. The findings of this study will be made widely available especially to national HIV/AIDS committees formulating

  2. Cumulative effective dose and cancer risk for pediatric population in repetitive full spine follow-up imaging: How micro dose is the EOS microdose protocol?

    Science.gov (United States)

    Law, Martin; Ma, Wang-Kei; Lau, Damian; Cheung, Kenneth; Ip, Janice; Yip, Lawrance; Lam, Wendy

    2018-04-01

    To evaluate and to obtain analytic formulation for the calculation of the effective dose and associated cancer risk using the EOS microdose protocol for scoliotic pediatric patients undergoing full spine imaging at different age of exposure; to demonstrate the microdose protocol capable of delivering lesser radiation dose and hence of further reducing cancer risk induction when compared with the EOS low dose protocol; to obtain cumulative effective dose and cancer risk for both genders scoliotic pediatrics of US and Hong Kong population using the microdose protocol. Organ absorbed doses of full spine exposed scoliotic pediatric patients have been simulated with the use of EOS microdose protocol imaging parameters input to the Monte Carlo software PCXMC. Gender and age specific effective dose has been calculated with the simulated organ absorbed dose using the ICRP-103 approach. The associated radiation induced cancer risk, expressed as lifetime attributable risk (LAR), has been estimated according to the method introduced in the Biological Effects of Ionizing Radiation VII report. Values of LAR have been estimated for scoliotic patients exposed repetitively during their follow up period at different age for US and Hong Kong population. The effective doses of full spine imaging with simultaneous posteroanterior and lateral projection for patients exposed at the age between 5 and 18 years using the EOS microdose protocol have been calculated within the range of 2.54-14.75 μSv. The corresponding LAR for US and Hong Kong population was ranged between 0.04 × 10 -6 and 0.84 × 10 -6 . Cumulative effective dose and cancer risk during follow-up period can be estimated using the results and are of information to patients and their parents. With the use of computer simulation and analytic formulation, we obtained the cumulative effective dose and cancer risk at any age of exposure for pediatric patients of US and Hong Kong population undergoing repetitive

  3. Performance Analysis of Untraceability Protocols for Mobile Agents Using an Adaptable Framework

    OpenAIRE

    LESZCZYNA RAFAL; GORSKI Janusz Kazimierz

    2006-01-01

    Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should extend a sole validation of their security and cover other quality aspects, primarily their efficiency. Thus after conducting a security analysis, we wanted to complement it with a performance analysis. For this purpose we developed a performance evaluation framework, which, as we realised, with certain adjustments, can ...

  4. A markerless protocol for genetic analysis of Aggregatibacter actinomycetemcomitans

    Science.gov (United States)

    Cheng, Ya-An; Jee, Jason; Hsu, Genie; Huang, Yanyan; Chen, Casey; Lin, Chun-Pin

    2015-01-01

    Background/Purpose The genomes of different Aggregatibacter actinomycetemcomitans strains contain many strain-specific genes and genomic islands (defined as DNA found in some but not all strains) of unknown functions. Genetic analysis for the functions of these islands will be constrained by the limited availability of genetic markers and vectors for A. actinomycetemcomitans. In this study we tested a novel genetic approach of gene deletion and restoration in a naturally competent A. actinomycetemcomitans strain D7S-1. Methods Specific genes’ deletion mutants and mutants restored with the deleted genes were constructed by a markerless loxP/Cre system. In mutants with sequential deletion of multiple genes loxP with different spacer regions were used to avoid unwanted recombinations between loxP sites. Results Eight single-gene deletion mutants, four multiple-gene deletion mutants, and two mutants with restored genes were constructed. No unintended non-specific deletion mutants were generated by this protocol. The protocol did not negatively affect the growth and biofilm formation of A. actinomycetemcomitans. Conclusion The protocol described in this study is efficient and specific for genetic manipulation of A. actinomycetemcomitans, and will be amenable for functional analysis of multiple genes in A. actinomycetemcomitans. PMID:24530245

  5. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  6. Performance Analysis of an Enhanced PRMA-HS Protocol for LEO Satellite Communication

    Institute of Scientific and Technical Information of China (English)

    ZHUO Yong-ning; YAN Shao-hu; WU Shi-qi

    2005-01-01

    The packet reservation multiple access with hindering state (PRMA-HS) is a protocol suitable for LEO satellite mobile communication. Although working well with light system payload (amount of user terminals), the protocol imposes high channel congestion on system with heavy payload, thus degrades the system's quality of service. To controlling the channel congestion, a scheme of enhanced PRMA-HS protocol is proposed, which aims to reduce the collision of voice packets by adopting a mechanism of access control. Through theoretic analysis, the system's mathematic model is presented and the packet drop probability of the scheme is deduced. To testify the performance of the scheme, a simulation is performed and the results support our analysis.

  7. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  8. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  9. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    Science.gov (United States)

    2006-12-01

    field of 9 identifies the ICMP message as an adverstisement . Code Mobile IP home agents and foreign agents use the value of 16 to prevent any nodes...ANALYSIS OF THE MOBILE IP PROTOCOL (RFC 3344 AND RELATED RFCS) by Chin Chin Ng December 2006 Thesis Co-Advisors: George W. Dinolt J. D...December 2006 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Performance Analysis of the Mobile IP Protocol (RFC 3344 and

  10. Analysis of transmission speed of AX.25 Protocol implemented in satellital earth station UPTC

    Directory of Open Access Journals (Sweden)

    Oscar Fernando Vera Cely

    2015-11-01

    Full Text Available One of the important parameters for the proper functioning of satellital ground station projected on Pedagogical and Technological University of Colombia (UPTC is the efficiency in transmission speed on communications protocol. This paper shows the results of analysis of the transmission speed of the AX.25 protocol implemented in the communication system of the satellital ground station UPTC. It begins with a brief description of the implemented hardware; the behavior of the transmission rate is evaluated using a theoretical analysis based on equations to estimate this parameter in the operation of the protocol, then tests are performed using the hardware that the satellital ground station UPTC has and finally, the conclusions are presented. Based on comparison of the theoretical analysis results obtained experimentally, it became apparent that AX.25 protocol efficiency is higher when increasing the number of frames.

  11. A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2010-01-01

    We present a formal analysis of the Web Services Atomic Transaction (WS-AT) protocol. WS-AT is a part of the WS-Coordination framework and describes an algorithm for reaching agreement on the outcome of a distributed transaction. The protocol is modelled and verified using the model checker UPPAAL...

  12. Information security risk analysis

    CERN Document Server

    Peltier, Thomas R

    2001-01-01

    Effective Risk AnalysisQualitative Risk AnalysisValue AnalysisOther Qualitative MethodsFacilitated Risk Analysis Process (FRAP)Other Uses of Qualitative Risk AnalysisCase StudyAppendix A: QuestionnaireAppendix B: Facilitated Risk Analysis Process FormsAppendix C: Business Impact Analysis FormsAppendix D: Sample of ReportAppendix E: Threat DefinitionsAppendix F: Other Risk Analysis OpinionsIndex

  13. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA)

    DEFF Research Database (Denmark)

    Muharemovic, O; Troelsen, A; Thomsen, M G

    2018-01-01

    INTRODUCTION: Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time...... imaging. Radiographers in the control group used a standard RSA protocol. RESULTS: At three months, radiographers in the case group significantly reduced (p .... No significant improvements were found in the control group at any time point. CONCLUSION: There is strong evidence that personalized RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute...

  14. PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM

    Directory of Open Access Journals (Sweden)

    S. Prasanna

    2014-03-01

    Full Text Available Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.

  15. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  16. Risk of bias and confounding of observational studies of Zika virus infection: A scoping review of research protocols.

    Science.gov (United States)

    Reveiz, Ludovic; Haby, Michelle M; Martínez-Vega, Ruth; Pinzón-Flores, Carlos E; Elias, Vanessa; Smith, Emma; Pinart, Mariona; Broutet, Nathalie; Becerra-Posada, Francisco; Aldighieri, Sylvain; Van Kerkhove, Maria D

    2017-01-01

    Given the severity and impact of the current Zika virus (ZIKV) outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE) and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV. We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols. Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome). Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design. Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to minimize bias at

  17. Risk of bias and confounding of observational studies of Zika virus infection: A scoping review of research protocols.

    Directory of Open Access Journals (Sweden)

    Ludovic Reveiz

    Full Text Available Given the severity and impact of the current Zika virus (ZIKV outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV.We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols.Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome. Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design.Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to

  18. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  19. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  20. Security analysis of standards-driven communication protocols for healthcare scenarios.

    Science.gov (United States)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  1. High incidence of pseudotumours after hip resurfacing even in low risk patients; results from an intensified MRI screening protocol.

    NARCIS (Netherlands)

    Weegen, W. van der; Smolders, J.M.; Sijbesma, T.; Hoekstra, H.J.; Brakel, K.; Susante, J.L.C. van

    2013-01-01

    We intensified our screening protocol for the presence of pseudotumours in a consecutive series of patients with a hip resurfacing arthroplasty (HRA), to establish whether we should be alert to the presence of 'silent' pseudotumours. Patients categorised with high risk (11 hips) and low risk (10

  2. Depression and risk of fracture and bone loss: an updated meta-analysis of prospective studies.

    Science.gov (United States)

    Wu, Q; Liu, B; Tonmoy, S

    2018-03-12

    This meta-analysis pooled results from 23 qualifying individual cohort studies and found that depression was significantly associated with an increased risk of fractures and bone loss. The association between depression and risk of fracture remains controversial. We conducted a comprehensive meta-analysis to examine the effect of depression on the risk of osteoporotic fractures and bone loss. We searched databases and reviewed citations in relevant articles for eligible cohort studies. Two investigators independently conducted study selection, appraisal, and data abstraction through the use of a standardized protocol. Random effect models were used for meta-analysis. Cochrane Q and I 2 statistics were used to assess heterogeneity. Funnel plots and rank correlation tests were used to evaluate publication bias. Twenty-three studies were included for meta-analysis. In studies that reported hazard ratio (HR) as the outcome (nine studies [n = 309,862]), depression was associated with 26% increase in fracture risk (HR = 1.26, 95% CI, 1.10-1.43, p meta-analysis having modified inclusion criteria and in different subgroup analyses as well. Significant heterogeneity was observed in the meta-analysis; however, no significant publication bias was detected. Depression is associated with a significant increased risk in fracture and bone loss. Effective prevention may decrease such risk.

  3. Biosafety assessment protocols for new organisms in New Zealand: Can they apply internationally to emerging technologies?

    International Nuclear Information System (INIS)

    Barratt, B.I.P.; Moeed, A.; Malone, L.A.

    2006-01-01

    An analysis of established biosafety protocols for release into the environment of exotic plants and biological control agents for weeds and arthropod pests has been carried out to determine whether such protocols can be applied to relatively new and emerging technologies intended for the primary production industries, such as transgenic plants. Example case studies are described to indicate the scope of issues considered by regulators who make decisions on new organism releases. No transgenic plants have been released to date in New Zealand, but two field test approvals are described as examples. An analysis of the biosafety protocols has shown that, while many of the risk criteria considered for decision-making by regulators are similar for all new organisms, a case-by-case examination of risks and potential impacts is required in order to fully assess risk. The value of post-release monitoring and validation of decisions made by regulators is emphasised

  4. Harmonization of international risk assessment protocol

    International Nuclear Information System (INIS)

    Toyofuku, Hajime . E-mail toyofuku@nihs.go.jp

    2006-01-01

    For over centuries developments in food production and new food safety management systems in most developed countries have been perceived by many to be efficient in the prevention of food-borne disease. Nevertheless a number of problems remain dominant, one of these being the high level of food-borne microbiological disease which seems, for some pathogens, to have increased over the last decades. The development of an interdisciplinary approach with direct interaction between surveillance and risk analysis systems is described as a potential basis for improved prevention of food-borne disease. Quantitative microbiological risk assessment is a relatively new scientific approach, able to link data from food within the entire food chain and the various data on human disease to provide a clear estimation of risk. Today food safety is one of the WHOs top eleven priorities; the Organization calls for more systematic and aggressive steps to be taken to reduce significantly the risk of microbiological food-borne diseases. Dealing with this challenge is one of the major challenges for the 21st century in regard to food safety, implying a significant re-direction of food microbiology efforts in many parts of the world

  5. Three-Stage Quantum Cryptography Protocol under Collective-Rotation Noise

    Directory of Open Access Journals (Sweden)

    Linsen Wu

    2015-05-01

    Full Text Available Information security is increasingly important as society migrates to the information age. Classical cryptography widely used nowadays is based on computational complexity, which means that it assumes that solving some particular mathematical problems is hard on a classical computer. With the development of supercomputers and, potentially, quantum computers, classical cryptography has more and more potential risks. Quantum cryptography provides a solution which is based on the Heisenberg uncertainty principle and no-cloning theorem. While BB84-based quantum protocols are only secure when a single photon is used in communication, the three-stage quantum protocol is multi-photon tolerant. However, existing analyses assume perfect noiseless channels. In this paper, a multi-photon analysis is performed for the three-stage quantum protocol under the collective-rotation noise model. The analysis provides insights into the impact of the noise level on a three-stage quantum cryptography system.

  6. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  7. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA).

    Science.gov (United States)

    Muharemovic, O; Troelsen, A; Thomsen, M G; Kallemose, T; Gosvig, K K

    2018-05-01

    Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time and the number of exposure repetitions. Forty patients undergoing primary total hip arthroplasty were equally randomized to either a case or a control group. Radiographers in the case group were assisted by personalized patient protocols containing information about each patient's post-operative RSA imaging. Radiographers in the control group used a standard RSA protocol. At three months, radiographers in the case group significantly reduced (p RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute to the reduction of examination time, thus ensuring a cost benefit for department and patient safety. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.

  8. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  9. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  10. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

    Science.gov (United States)

    Watzlaf, Valerie J.M.; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR. PMID:25945172

  11. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance.

    Science.gov (United States)

    Watzlaf, Valerie J M; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.

  12. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  13. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  14. Radiation risk statement in the participant information for a research protocol that involves exposure to ionising radiation

    International Nuclear Information System (INIS)

    Caon, Martin

    2005-01-01

    A Human Research Ethics Committee (HREC) is required to scrutinise the protocols of clinical drug trials that recruit patients as participants. If the study involves exposing the participants to ionizing radiation the information provided to the participant should contain a radiation risk statement that is understandable by the Committee and the participant. The information that should be included in the risk statement is available from a variety of published sources and is discussed. The ARPANSA Code of Practice Exposure of Humans to Ionizing Radiation for Research Purposes (2005) states explicitly what the responsibilities of the researcher and the HREC are. Some research protocols do not provide the information required by good radiation protection practice and explicitly called for by the Code. Nine points (including: state that ionizing radiation is involved; that the radiation is additional to standard care; the effective dose to be received; the dose compared to natural background; the dose to the most exposed organs; a statement of risk; the benefits accruing from the exposure; ask the participant about previous exposures; name a contact person from whom information may be sought) that should be considered for inclusion in the participant information are presented and discussed. An example of a radiation risk statement is provided

  15. Meta Salud Diabetes study protocol: a cluster-randomised trial to reduce cardiovascular risk among a diabetic population of Mexico

    Science.gov (United States)

    Cornejo Vucovich, Elsa; Ingram, Maia; Valenica, Celina; Castro Vasquez, Maria del Carmen; Gonzalez-Fagoaga, Eduardo; Geurnsey de Zapien, Jill

    2018-01-01

    Introduction Northern Mexico has among the highest rates of cardiovascular disease (CVD) and diabetes in the world. This research addresses core gaps in implementation science to develop, test and scale-up CVD risk-reduction interventions in diabetics through a national primary care health system. Methods and analysis The Meta Salud Diabetes (MSD) research project is a parallel two-arm cluster-randomised clinical behavioural trial based in 22 (n=22) health centres in Sonora, Mexico. MSD aims to evaluate the effectiveness of the MSD intervention for the secondary prevention of CVD risk factors among a diabetic population (n=320) compared with the study control of usual care. The MSD intervention consists of 2-hour class sessions delivered over a 13-week period providing educational information to encourage sustainable behavioural change to prevent disease complications including the adoption of physical activity. MSD is delivered within the context of Mexico’s national primary care health centre system by health professionals, including nurses, physicians and community health workers via existing social support groups for individuals diagnosed with chronic disease. Mixed models are used to estimate the effect of MSD by comparing cardiovascular risk, as measured by the Framingham Risk Score, between the trial arms. Secondary outcomes include hypertension, behavioural risk factors and psychosocial factors. Ethics and dissemination This work is supported by the National Institutes of Health, National Heart Lung and Blood Institute (1R01HL125996-01) and approved by the University of Arizona Research Institutional Review Board (Protocol 1508040144) and the Research Bioethics Committee at the University of Sonora. The first Internal Review Board approval date was 31 August 2015 with five subsequent approved amendments. This article refers to protocol V.0.2, dated 30 January 2017. Results will be disseminated via peer-reviewed publication and presentation at

  16. Adherence to, and outcomes of, a galactomannan screening protocol in high-risk hematology patients.

    Science.gov (United States)

    Harricharan, S; Biederman, K; Bombassaro, A M; Lazo-Langner, A; Elsayed, S; Fulford, A; Delport, J A; Xenocostas, A

    2018-04-01

    A twice-weekly galactomannan (gm) screening protocol was implemented in high-risk hematology inpatients. Study objectives were to determine adherence to the protocol, use of selected resources, and patient outcomes. This retrospective cohort study compared outcomes of interest before and after implementation of gm screening. Adults undergoing matched related allogeneic hematopoietic stem-cell transplantation or induction chemotherapy for acute leukemia were eligible. Patients could be enrolled more than once and were evaluated as episodes. Adherence to the gm protocol was assessed in post-implementation episodes. Use of broad-spectrum antifungals (bsafs), consultations (infectious diseases, respirology), and diagnostic procedures (computed tomography imaging, bronchoalveolar lavage) were compared between phases, as were the patient outcomes of all-cause mortality and clinical success (alive and not taking a bsaf). Of 182 episodes consecutively screened, 70 per phase were enrolled. Clinical characteristics and duration of assessment were similar for the phases. Full or partial adherence to the protocol was observed in 61 post-implementation episodes (87%), with full adherence in 40 episodes (57%). More episodes in the pre-implementation phase than in the post-implementation phase involved receipt of bsafs, consultations, and diagnostics (27% vs. 7%, p = 0.02; 46% vs. 26%, p = 0.014; and 46% vs. 31%, p = 0.083 respectively). Although mortality was similar in the two phases, clinical success at the final assessment was observed in fewer pre-implementation than post-implementation episodes (79% vs. 98%, p < 0.001). Implementation of a gm screening protocol was feasible and associated with significantly fewer episodes involving receipt of bsafs and consultations, and with significantly more episodes showing clinical success.

  17. Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol

    Directory of Open Access Journals (Sweden)

    Xing Hu

    2017-01-01

    Full Text Available In high diversity node situation, multichannel MAC protocol can improve the frequency efficiency, owing to fewer collisions compared with single-channel MAC protocol. And the performance of cyclic quorum-based multichannel (CQM MAC protocol is outstanding. Based on cyclic quorum system and channel slot allocation, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel-hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF, is proposed. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm. In addition, to improve the performance of CQM protocol in unsaturation situation, a dynamic channel slot allocation of CQM (DCQM protocol is proposed, based on wavelet neural network. Finally, the performance of CQM protocol and DCQM protocol is simulated by Qualnet platform. And the simulation results show that the analytic and simulation results match very well; the DCQM performs better in unsaturation situation.

  18. Advancing Risk Analysis for Nanoscale Materials: Report from an International Workshop on the Role of Alternative Testing Strategies for Advancement: Advancing Risk Analysis for Nanoscale Materials

    Energy Technology Data Exchange (ETDEWEB)

    Shatkin, J. A. [Vireo Advisors, Boston MA USA; Ong, Kimberly J. [Vireo Advisors, Boston MA USA; Beaudrie, Christian [Compass RM, Vancouver CA USA; Clippinger, Amy J. [PETA International Science Consortium Ltd, London UK; Hendren, Christine Ogilvie [Center for the Environmental Implications of NanoTechnology, Duke University, Durham NC USA; Haber, Lynne T. [TERA, Cincinnati OH USA; Hill, Myriam [Health Canada, Ottawa Canada; Holden, Patricia [UC Santa Barbara, Bren School of Environmental Science & Management, ERI, and UC CEIN, University of California, Santa Barbara CA USA; Kennedy, Alan J. [U.S. Army Engineer Research and Development Center, Environmental Laboratory, Vicksburg MS USA; Kim, Baram [Independent, Somerville MA USA; MacDonell, Margaret [Argonne National Laboratory, Environmental Science Division, Argonne IL USA; Powers, Christina M. [U.S. Environmental Protection Agency, Office of Air and Radiation, Office of Transportation and Air Quality, Ann Arbor MI USA; Sharma, Monita [PETA International Science Consortium Ltd, London UK; Sheremeta, Lorraine [Alberta Ingenuity Labs, Edmonton Alberta Canada; Stone, Vicki [John Muir Building Gait 1 Heriot-Watt University, Edinburgh Scotland UK; Sultan, Yasir [Environment Canada, Gatineau QC Canada; Turley, Audrey [ICF International, Durham NC USA; White, Ronald H. [RH White Consultants, Silver Spring MD USA

    2016-08-01

    The Society for Risk Analysis (SRA) has a history of bringing thought leadership to topics of emerging risk. In September 2014, the SRA Emerging Nanoscale Materials Specialty Group convened an international workshop to examine the use of alternative testing strategies (ATS) for manufactured nanomaterials (NM) from a risk analysis perspective. Experts in NM environmental health and safety, human health, ecotoxicology, regulatory compliance, risk analysis, and ATS evaluated and discussed the state of the science for in vitro and other alternatives to traditional toxicology testing for NM. Based on this review, experts recommended immediate and near-term actions that would advance ATS use in NM risk assessment. Three focal areas-human health, ecological health, and exposure considerations-shaped deliberations about information needs, priorities, and the next steps required to increase confidence in and use of ATS in NM risk assessment. The deliberations revealed that ATS are now being used for screening, and that, in the near term, ATS could be developed for use in read-across or categorization decision making within certain regulatory frameworks. Participants recognized that leadership is required from within the scientific community to address basic challenges, including standardizing materials, protocols, techniques and reporting, and designing experiments relevant to real-world conditions, as well as coordination and sharing of large-scale collaborations and data. Experts agreed that it will be critical to include experimental parameters that can support the development of adverse outcome pathways. Numerous other insightful ideas for investment in ATS emerged throughout the discussions and are further highlighted in this article.

  19. Comparative risk analysis

    International Nuclear Information System (INIS)

    Niehaus, F.

    1988-01-01

    In this paper, the risks of various energy systems are discussed considering severe accidents analysis, particularly the probabilistic safety analysis, and probabilistic safety criteria, and the applications of these criteria and analysis. The comparative risk analysis has demonstrated that the largest source of risk in every society is from daily small accidents. Nevertheless, we have to be more concerned about severe accidents. The comparative risk analysis of five different energy systems (coal, oil, gas, LWR and STEC (Solar)) for the public has shown that the main sources of risks are coal and oil. The latest comparative risk study of various energy has been conducted in the USA and has revealed that the number of victims from coal is 42 as many than victims from nuclear. A study for severe accidents from hydro-dams in United States has estimated the probability of dam failures at 1 in 10,000 years and the number of victims between 11,000 and 260,000. The average occupational risk from coal is one fatal accident in 1,000 workers/year. The probabilistic safety analysis is a method that can be used to assess nuclear energy risks, and to analyze the severe accidents, and to model all possible accident sequences and consequences. The 'Fault tree' analysis is used to know the probability of failure of the different systems at each point of accident sequences and to calculate the probability of risks. After calculating the probability of failure, the criteria for judging the numerical results have to be developed, that is the quantitative and qualitative goals. To achieve these goals, several systems have been devised by various countries members of AIEA. The probabilistic safety ana-lysis method has been developed by establishing a computer program permit-ting to know different categories of safety related information. 19 tabs. (author)

  20. Protocol Analysis as a Method for Analyzing Conversational Data.

    Science.gov (United States)

    Aleman, Carlos G.; Vangelisti, Anita L.

    Protocol analysis, a technique that uses people's verbal reports about their cognitions as they engage in an assigned task, has been used in a number of applications to provide insight into how people mentally plan, assess, and carry out those assignments. Using a system of networked computers where actors communicate with each other over…

  1. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  2. Analysis of security protocols based on challenge-response

    Institute of Scientific and Technical Information of China (English)

    LUO JunZhou; YANG Ming

    2007-01-01

    Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods,which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques,in which secrecy analysis is split into two parts: Explicit-Information-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand parameters. This new method owns both the power of the Strand Space Model and concision of authentication logic.

  3. Foundations of Risk Analysis

    CERN Document Server

    Aven, Terje

    2012-01-01

    Foundations of Risk Analysis presents the issues core to risk analysis - understanding what risk means, expressing risk, building risk models, addressing uncertainty, and applying probability models to real problems. The author provides the readers with the knowledge and basic thinking they require to successfully manage risk and uncertainty to support decision making. This updated edition reflects recent developments on risk and uncertainty concepts, representations and treatment. New material in Foundations of Risk Analysis includes:An up to date presentation of how to understand, define and

  4. Probabilistic risk analysis and terrorism risk.

    Science.gov (United States)

    Ezell, Barry Charles; Bennett, Steven P; von Winterfeldt, Detlof; Sokolowski, John; Collins, Andrew J

    2010-04-01

    Since the terrorist attacks of September 11, 2001, and the subsequent establishment of the U.S. Department of Homeland Security (DHS), considerable efforts have been made to estimate the risks of terrorism and the cost effectiveness of security policies to reduce these risks. DHS, industry, and the academic risk analysis communities have all invested heavily in the development of tools and approaches that can assist decisionmakers in effectively allocating limited resources across the vast array of potential investments that could mitigate risks from terrorism and other threats to the homeland. Decisionmakers demand models, analyses, and decision support that are useful for this task and based on the state of the art. Since terrorism risk analysis is new, no single method is likely to meet this challenge. In this article we explore a number of existing and potential approaches for terrorism risk analysis, focusing particularly on recent discussions regarding the applicability of probabilistic and decision analytic approaches to bioterrorism risks and the Bioterrorism Risk Assessment methodology used by the DHS and criticized by the National Academies and others.

  5. Prevalence, awareness, and associated risk factors of hypertension in older adults in Africa: a systematic review and meta-analysis protocol.

    Science.gov (United States)

    Bosu, William K; Aheto, Justice M K; Zucchelli, Eugenio; Reilly, Siobhan

    2017-10-04

    The health of older persons has not been a major priority in many African countries. Hypertension is one of the common health problems of older persons. However, there is little information on the prevalence of hypertension in older adults in Africa. This is in spite of the fact that Africa has the highest age-standardized prevalence of hypertension in the world. We therefore present this protocol to conduct a systematic review and meta-analysis on the prevalence of hypertension and the level of its awareness among older persons living in Africa. Major databases (EMBASE, MEDLINE, Academic Search Complete, CINAHL, PsycINFO) and unpublished literature will be searched to identify population-based studies on hypertension in adults aged 50 years and older living in Africa. Eligible articles are those which use the 140/90-mmHg cutoff to diagnose hypertension and were published from 1980 to present. We will exclude subjects in restricted environments such as patients and refugees. Articles will be independently evaluated by two reviewers to determine if they meet the inclusion criteria. They will also evaluate the quality of included studies using a validated tool by Hoy and colleagues for prevalence studies. The main outcome is the prevalence of hypertension while the explanatory variables include demographic, socio-economic, dietary, lifestyle and behavioural factors. Effect sizes in bivariate and multivariate analyses will be presented as odds or prevalence ratios. We will explore for heterogeneity of the standard errors across the studies, and if appropriate, we will perform a meta-analysis using a random-effects model to present a summary estimate of the prevalence of hypertension in this population. The estimates of the prevalence, the risk factors and the level of awareness of hypertension could help in galvanizing efforts at prioritizing the cardiovascular health of older persons in Africa. PROSPERO CRD42017056474.

  6. MATHEMATICAL RISK ANALYSIS: VIA NICHOLAS RISK MODEL AND BAYESIAN ANALYSIS

    Directory of Open Access Journals (Sweden)

    Anass BAYAGA

    2010-07-01

    Full Text Available The objective of this second part of a two-phased study was to explorethe predictive power of quantitative risk analysis (QRA method andprocess within Higher Education Institution (HEI. The method and process investigated the use impact analysis via Nicholas risk model and Bayesian analysis, with a sample of hundred (100 risk analysts in a historically black South African University in the greater Eastern Cape Province.The first findings supported and confirmed previous literature (KingIII report, 2009: Nicholas and Steyn, 2008: Stoney, 2007: COSA, 2004 that there was a direct relationship between risk factor, its likelihood and impact, certiris paribus. The second finding in relation to either controlling the likelihood or the impact of occurrence of risk (Nicholas risk model was that to have a brighter risk reward, it was important to control the likelihood ofoccurrence of risks as compared with its impact so to have a direct effect on entire University. On the Bayesian analysis, thus third finding, the impact of risk should be predicted along three aspects. These aspects included the human impact (decisions made, the property impact (students and infrastructural based and the business impact. Lastly, the study revealed that although in most business cases, where as business cycles considerably vary dependingon the industry and or the institution, this study revealed that, most impacts in HEI (University was within the period of one academic.The recommendation was that application of quantitative risk analysisshould be related to current legislative framework that affects HEI.

  7. Implementation and Analysis of Real-Time Streaming Protocols.

    Science.gov (United States)

    Santos-González, Iván; Rivero-García, Alexandra; Molina-Gil, Jezabel; Caballero-Gil, Pino

    2017-04-12

    Communication media have become the primary way of interaction thanks to the discovery and innovation of many new technologies. One of the most widely used communication systems today is video streaming, which is constantly evolving. Such communications are a good alternative to face-to-face meetings, and are therefore very useful for coping with many problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability and connectivity. Hence, the quality of service and the quality of experience are considered the two most important issues for this type of communication. This work presents a complete comparative study of two of the most used protocols of video streaming, Real Time Streaming Protocol (RTSP) and the Web Real-Time Communication (WebRTC). In addition, this paper proposes two new mobile applications that implement those protocols in Android whose objective is to know how they are influenced by the aspects that most affect the streaming quality of service, which are the connection establishment time and the stream reception time. The new video streaming applications are also compared with the most popular video streaming applications for Android, and the experimental results of the analysis show that the developed WebRTC implementation improves the performance of the most popular video streaming applications with respect to the stream packet delay.

  8. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

    Directory of Open Access Journals (Sweden)

    Valerie J.M. Watzlaf

    2010-10-01

    Full Text Available Voice over the Internet Protocol (VoIP systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR therapy that can provide voice and video teleconferencing between patients and therapists.  Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care, and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.   

  9. Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol

    International Nuclear Information System (INIS)

    Hirota, Osamu

    2007-01-01

    There exists a great gap between one-time pad with perfect secrecy and conventional mathematical encryption. The Yuen 2000 (Y00) protocol or αη scheme may provide a protocol which covers from the conventional security to the ultimate one, depending on implementations. This paper presents the complexity-theoretic security analysis on some models of the Y00 protocol with nonlinear pseudo-random-number-generator and quantum noise diffusion mapping (QDM). Algebraic attacks and fast correlation attacks are applied with a model of the Y00 protocol with nonlinear filtering like the Toyocrypt stream cipher as the running key generator, and it is shown that these attacks in principle do not work on such models even when the mapping between running key and quantum state signal is fixed. In addition, a security property of the Y00 protocol with QDM is clarified. Consequently, we show that the Y00 protocol has a potential which cannot be realized by conventional cryptography and that it goes beyond mathematical encryption with physical encryption

  10. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  11. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  12. Cost effectiveness of a protocol using palivizumab in preterm infants

    Directory of Open Access Journals (Sweden)

    Yolanda Hernández-Gago

    2017-03-01

    Full Text Available Objective: The main objective was to evaluate the cost-effectiveness of protocol use of palivizumab in premature established by consensus in our Hospital comparing it based on the recommendations of various Scientific Societies. As a secondary objective risk factors and severity of hospitalized patients attending the established protocol in our Hospital were analyzed. Methods: The study period was 4 seasons with the expanded protocol (retrospective data versus 2 with restricted or agreed protocol (prospective data. The perspective of the study was the Health System, including the costs of hospitalization and palivizumab our center. The calculation of the effectiveness was determined with the admission rate of premature patients stratified by weeks of gestational age <29, <32; and <35. For the analysis of risk factors and severity in patients admitted seasons with the new protocol are collected prospectively clinical data and environmental and social factors. Results: In the range of gestational age <29 years old and <32 greater effectiveness of the extended protocol was not demonstrated against the consensus. Only more effective for EG <35 in the accumulated data and comparing seasons 12/13 and 08/09 to 13/14 for individual data was observed. This range has an associated incremental cost effectiveness ratio of € 53 250,07 (range: € 14 793,39 to € 90 446,47 for singles data and € 50 525,53 (€ 28 688.22 to € 211 575,65 for accumulated. The establishment of this protocol in our center meant an average saving per season € 169 911,51. A cost- effectiveness of the extended protocol appropriate relationship is found if the cost of palivizumab per patient was less than € 1 206,67 (calculated for maximum use of the vial and a higher rate of hospitalization of 9.21%. Children entering the season with the new protocol (season 12/13 and 13/14 are 63.4% in children under 3 months and 90% are term infants who do not belong to any population at

  13. [Protocols of health security in the light of some examples of risk management].

    Science.gov (United States)

    Postel-Vinay, Nicolas; Coquin, Yves

    2005-11-30

    Throughout medical training, medical risk management is a subject that has been insufficiently addressed and treated without a global vision. Yet the different dangers often make the front page of a media that addresses the question of health security when there is a failure of the system or new legal developments. Added to this disequilibrium of communication and training is the great complexity of risk management. Not only is the nature of the potentially dangerous agents extraordinarily varied but also the entity that detects the risk is sometimes a stranger to the causes of its appearance. The surrounding regulations are themselves complex and dense. Using the examples that have arisen over the last 2 or 3 years, this article describes the current French protocols in risk management, that rely upon the agencies delivering their expertise, certain of which are endowed with the power of policing these regulations. In practice, the doctor should understand the role of these agencies, know how to find the validated information that they can provide, and understand his role in this picture. A role that is perceived as far away as long as the risk has not emerged, but is in the forefront once the event arises.

  14. A content analysis of posthumous sperm procurement protocols with considerations for developing an institutional policy.

    Science.gov (United States)

    Bahm, Sarah M; Karkazis, Katrina; Magnus, David

    2013-09-01

    To identify and analyze existing posthumous sperm procurement (PSP) protocols in order to outline central themes for institutions to consider when developing future policies. Qualitative content analysis. Large academic institutions across the United States. We performed a literature search and contacted 40 institutions to obtain nine full PSP protocols. We then performed a content analysis on these policies to identify major themes and factors to consider when developing a PSP protocol. Presence of a PSP policy. We identified six components of a thorough PSP protocol: Standard of Evidence, Terms of Eligibility, Sperm Designee, Restrictions on Use in Reproduction, Logistics, and Contraindications. We also identified two different approaches to policy structure. In the Limited Role approach, institutions have stricter consent requirements and limit their involvement to the time of procurement. In the Family-Centered approach, substituted judgment is permitted but a mandatory wait period is enforced before sperm use in reproduction. Institutions seeking to implement a PSP protocol will benefit from considering the six major building blocks of a thorough protocol and where they would like to fall on the spectrum from a Limited Role to a Family-Centered approach. Copyright © 2013 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  15. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  16. Is risk analysis scientific?

    Science.gov (United States)

    Hansson, Sven Ove; Aven, Terje

    2014-07-01

    This article discusses to what extent risk analysis is scientific in view of a set of commonly used definitions and criteria. We consider scientific knowledge to be characterized by its subject matter, its success in developing the best available knowledge in its fields of study, and the epistemic norms and values that guide scientific investigations. We proceed to assess the field of risk analysis according to these criteria. For this purpose, we use a model for risk analysis in which science is used as a base for decision making on risks, which covers the five elements evidence, knowledge base, broad risk evaluation, managerial review and judgment, and the decision; and that relates these elements to the domains experts and decisionmakers, and to the domains fact-based or value-based. We conclude that risk analysis is a scientific field of study, when understood as consisting primarily of (i) knowledge about risk-related phenomena, processes, events, etc., and (ii) concepts, theories, frameworks, approaches, principles, methods and models to understand, assess, characterize, communicate, and manage risk, in general and for specific applications (the instrumental part). © 2014 Society for Risk Analysis.

  17. Human Schedule Performance, Protocol Analysis, and the "Silent Dog" Methodology

    Science.gov (United States)

    Cabello, Francisco; Luciano, Carmen; Gomez, Inmaculada; Barnes-Holmes, Dermot

    2004-01-01

    The purpose of the current experiment was to investigate the role of private verbal behavior on the operant performances of human adults, using a protocol analysis procedure with additional methodological controls (the "silent dog" method). Twelve subjects were exposed to fixed ratio 8 and differential reinforcement of low rate 3-s schedules. For…

  18. Feasibility of an intracranial EEG-fMRI protocol at 3T: risk assessment and image quality.

    Science.gov (United States)

    Boucousis, Shannon M; Beers, Craig A; Cunningham, Cameron J B; Gaxiola-Valdez, Ismael; Pittman, Daniel J; Goodyear, Bradley G; Federico, Paolo

    2012-11-15

    Integrating intracranial EEG (iEEG) with functional MRI (iEEG-fMRI) may help elucidate mechanisms underlying the generation of seizures. However, the introduction of iEEG electrodes in the MR environment has inherent risk and data quality implications that require consideration prior to clinical use. Previous studies of subdural and depth electrodes have confirmed low risk under specific circumstances at 1.5T and 3T. However, no studies have assessed risk and image quality related to the feasibility of a full iEEG-fMRI protocol. To this end, commercially available platinum subdural grid/strip electrodes (4×5 grid or 1×8 strip) and 4 or 6-contact depth electrodes were secured to the surface of a custom-made phantom mimicking the conductivity of the human brain. Electrode displacement, temperature increase of electrodes and surrounding phantom material, and voltage fluctuations in electrode contacts were measured in a GE Discovery MR750 3T MR scanner during a variety of imaging sequences, typical of an iEEG-fMRI protocol. An electrode grid was also used to quantify the spatial extent of susceptibility artifact. The spatial extent of susceptibility artifact in the presence of an electrode was also assessed for typical imaging parameters that maximize BOLD sensitivity at 3T (TR=1500 ms; TE=30 ms; slice thickness=4mm; matrix=64×64; field-of-view=24 cm). Under standard conditions, all electrodes exhibited no measurable displacement and no clinically significant temperature increase (2.0°C) that in some cases exceeded 10°C. Induced voltages in the frequency range that could elicit neuronal stimulation (<10 kHz) were well below the threshold of 100 mV. fMRI signal intensity was significantly reduced within 20mm of the electrodes for the imaging parameters used in this study. Thus, for the conditions tested, a full iEEG-fMRI protocol poses a low risk at 3T; however, fMRI sensitivity may be reduced immediately adjacent to the electrodes. In addition, high SAR sequences

  19. Environmental modeling and health risk analysis (ACTS/RISK)

    National Research Council Canada - National Science Library

    Aral, M. M

    2010-01-01

    ... presents a review of the topics of exposure and health risk analysis. The Analytical Contaminant Transport Analysis System (ACTS) and Health RISK Analysis (RISK) software tools are an integral part of the book and provide computational platforms for all the models discussed herein. The most recent versions of these two softwa...

  20. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  1. [Protocols for the health surveillance of fisherman].

    Science.gov (United States)

    Soleo, Leonardo; Cannizzaro, Emanuele; Lovreglio, Piero; Basso, Antonella; D'Errico, Maria Nicolà; Pira, Enrico

    2013-01-01

    To define protocols for health surveillance of workers in the marine fishing sector for specific occupational risk factors, considering the latest and most advanced scientific knowledge. The specific literature was analyzed to identify the occupational risk factors to which fishermen are exposed. Then, for each risk factor a protocol for the relative health checkups and their time schedule was defined. The risk factors to which fishermen are exposed are essentially noise, vibrations, solar and ultraviolet radiation, climatic agents (heat, cold, wind, rain, damp), chemical agents, shifts, work rate, night work, physical strain, stress, manual handling of loads, upper limb repetitive tasks, incongruous postures. The health protocols stipulate the health screening investigations to be carried out in all workers of a homogeneous group, and in-depth diagnostic investigations to be carried out in symptomatic workers. Complementary health investigations must be focused on a functional exploration of the organs specifically exposed to the risk factor. For hearing impairments due to noise exposure, the medico-legal measures with which the occupational health physician must comply, in cases of occupational disease, are indicated.

  2. Protocol for Microplastics Sampling on the Sea Surface and Sample Analysis

    Science.gov (United States)

    Kovač Viršek, Manca; Palatinus, Andreja; Koren, Špela; Peterlin, Monika; Horvat, Petra; Kržan, Andrej

    2016-01-01

    Microplastic pollution in the marine environment is a scientific topic that has received increasing attention over the last decade. The majority of scientific publications address microplastic pollution of the sea surface. The protocol below describes the methodology for sampling, sample preparation, separation and chemical identification of microplastic particles. A manta net fixed on an »A frame« attached to the side of the vessel was used for sampling. Microplastic particles caught in the cod end of the net were separated from samples by visual identification and use of stereomicroscopes. Particles were analyzed for their size using an image analysis program and for their chemical structure using ATR-FTIR and micro FTIR spectroscopy. The described protocol is in line with recommendations for microplastics monitoring published by the Marine Strategy Framework Directive (MSFD) Technical Subgroup on Marine Litter. This written protocol with video guide will support the work of researchers that deal with microplastics monitoring all over the world. PMID:28060297

  3. ProRisk : risk analysis instrument : developed for William properties

    NARCIS (Netherlands)

    van Doorn, W.H.W.; Egeberg, Ingrid; Hendrickx, Kristoff; Kahramaner, Y.; Masseur, B.; Waijers, Koen; Weglicka, K.A.

    2005-01-01

    This report presents a Risk Analysis Instrument developed for William Properties. Based on the analysis, it appears that the practice of Risk Analysis exists within the organization, yet rather implicit. The Risk Analysis Instrument comes with a package of four components: an activity diagram, a

  4. Anorexia nervosa and cancer: a protocol for a systematic review and meta-analysis of observational studies.

    Science.gov (United States)

    Catalá-López, Ferrán; Hutton, Brian; Driver, Jane A; Ridao, Manuel; Valderas, José M; Gènova-Maleras, Ricard; Forés-Martos, Jaume; Alonso-Arroyo, Adolfo; Saint-Gerons, Diego Macías; Vieta, Eduard; Valencia, Alfonso; Tabarés-Seisdedos, Rafael

    2017-07-11

    Anorexia nervosa is characterized by a severe restriction of caloric intake, low body weight, fear of gaining weight or of becoming fat, and disturbance of body image. Pathogenesis of the disorder may include genetic predisposition, hormonal changes and a combination of environmental, psychosocial, and cultural factors. Cancer is the second leading cause of death worldwide. At present, no systematic reviews and meta-analyses have evaluated the risk of cancer in people with anorexia nervosa. The objective of this study will be to evaluate the association between anorexia nervosa and the risk of developing or dying from cancer. This study protocol is part of a systematic collection and assessment of multiple systematic reviews and meta-analyses (umbrella review) evaluating the association of cancer and multiple central nervous system disorders. We designed a specific protocol for a new systematic review and meta-analysis of observational studies of anorexia nervosa with risk of developing or dying from any cancer. Data sources will be PubMed, Embase, Scopus, Web of Science, and manual screening of references. Observational studies (case-control and cohort) in humans that examined the association between anorexia nervosa and risk of developing or dying from cancer will be sought. The primary outcomes will be cancer incidence and cancer mortality in association with anorexia nervosa. Secondary outcomes will be site-specific cancer incidence and mortality, respectively. Screening of abstracts and full texts, and data abstraction will be performed by two team members independently. Conflicts at all levels of screening and abstraction will be resolved through discussion. The quality of studies will be assessed by using the Ottawa-Newcastle scale by two team members independently. Random effects models will be conducted where appropriate. Subgroup and additional analyses will be conducted to explore the potential sources of heterogeneity. The World Cancer Research Fund

  5. Correlation dimension based nonlinear analysis of network traffics with different application protocols

    International Nuclear Information System (INIS)

    Wang Jun-Song; Yuan Jing; Li Qiang; Yuan Rui-Xi

    2011-01-01

    This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols—HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic, furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components. (general)

  6. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  7. Analysis of Pre-participation Screening Protocols for Football Players in Europe, USA, and Libya: Possible Implications for Preventing Sudden Cardiac Death

    Directory of Open Access Journals (Sweden)

    Salaheddin Sharif

    2017-06-01

    Full Text Available Sudden cardiac death is the leading cause of death in sport participants and may result from undiagnosed cardiac diseases. It has been universally agreed upon that pre-participation screening can identify those athletes at risk of sudden cardiac death, and yet, there is no commonly accepted protocol to screen athletes. Although the European Society of Cardiology (ESC and the American Heart Association (AHA recommend the routine screening of athletes to prevent sudden death, there is significant disagreement regarding the guidelines of the protocols. The American Heart Association protocol includes a detailed medical history and a physical examination, whereas the European Society of Cardiology protocol includes 12-lead electrocardiography with a detailed medical history and a physical examination. The cost benefit of using electrocardiography is debatable, particularly if the screening is used to prevent sudden death associated with uncommon diseases. The Libyan Football Federation established a new seasonal pre-competition medical assessment protocol for Libyan football athletes during the 2013-2014 season, which includes a medical history, physical examination, 12 lead electrocardiography, echocardiography, and blood test. Regardless of cost and differences in protocol, there is a significant value in pre-participation screening for athletes in order to decrease the incidence of sudden cardiac death, and this report examines some of these different protocols as well as their potential for identifying athletes at risk for sudden cardiac death.

  8. Observations on risk analysis

    International Nuclear Information System (INIS)

    Thompson, W.A. Jr.

    1979-11-01

    This paper briefly describes WASH 1400 and the Lewis report. It attempts to define basic concepts such as risk and risk analysis, common mode failure, and rare event. Several probabilistic models which go beyond the WASH 1400 methodology are introduced; the common characteristic of these models is that they recognize explicitly that risk analysis is time dependent whereas WASH 1400 takes a per demand failure rate approach which obscures the important fact that accidents are time related. Further, the presentation of a realistic risk analysis should recognize that there are various risks which compete with one another for the lives of the individuals at risk. A way of doing this is suggested

  9. Targeted agents for patients with advanced/metastatic pancreatic cancer: A protocol for systematic review and network meta-analysis.

    Science.gov (United States)

    Di, Baoshan; Pan, Bei; Ge, Long; Ma, Jichun; Wu, Yiting; Guo, Tiankang

    2018-03-01

    Pancreatic cancer (PC) is a devastating malignant tumor. Although surgical resection may offer a good prognosis and prolong survival, approximately 80% patients with PC are always diagnosed as unresectable tumor. National Comprehensive Cancer Network's (NCCN) recommended gemcitabine-based chemotherapy as efficient treatment. While, according to recent studies, targeted agents might be a better available option for advanced or metastatic pancreatic cancer patients. The aim of this systematic review and network meta-analysis will be to examine the differences of different targeted interventions for advanced/metastatic PC patients. We will conduct this systematic review and network meta-analysis using Bayesian method and according to Preferred Reporting Items for Systematic review and Meta-Analysis Protocols (PRISMA-P) statement. To identify relevant studies, 6 electronic databases including PubMed, EMBASE, the Cochrane Central Register of Controlled Trials (CENTRAL), Web of science, CNKI (Chinese National Knowledge Infrastructure), and CBM (Chinese Biological Medical Database) will be searched. The risk of bias in included randomized controlled trials (RCTs) will be assessed using the Cochrane Handbook version 5.1.0. And we will use GRADE approach to assess the quality of evidence from network meta-analysis. Data will be analyzed using R 3.4.1 software. To the best of our knowledge, this systematic review and network meta-analysis will firstly use both direct and indirect evidence to compare the differences of different targeted agents and targeted agents plus chemotherapy for advanced/metastatic pancreatic cancer patients. This is a protocol of systematic review and meta-analysis, so the ethical approval and patient consent are not required. We will disseminate the results of this review by submitting to a peer-reviewed journal.

  10. Comparison of two instruments for assessing risk of postoperative nausea and vomiting.

    Science.gov (United States)

    Kapoor, Rachna; Hola, Eric T; Adamson, Robert T; Mathis, A Scott

    2008-03-01

    Two instruments for assessing patients' risk of postoperative nausea and vomiting (PONV) were compared. The existing protocol (protocol 1) assessed PONV risk using 16 weighted risk factors and was used for both adults and pediatric patients. The new protocol (protocol 2) included a form for adults and a pediatric-specific form. The form for adults utilized the simplified risk score, calculated using a validated, nonweighted, 4-point scale, and categorized patients' risk of PONV as low, moderate, or high. The form for pediatric patients used a 7-point, non-weighted scale and categorized patients' risk of PONV as moderate or high. A list was generated of all patients who had surgery during August 2005, for whom protocol 1 was used, and during April 2006, for whom protocol 2 was used. Fifty patients from each time period were randomly selected for data analysis. Data collected included the percentage of the form completed, the development of PONV, the number of PONV risk factors, patient demographics, and the appropriateness of prophylaxis. The mean +/- S.D. number of PONV risk factors was significantly lower in the group treated according to protocol 2 ( p = 0.001), but fewer patients in this group were categorized as low or moderate risk and more patients were identified as high risk (p < 0.001). More patients assessed by protocol 2 received fewer interventions than recommended (p < 0.001); however, the frequency of PONV did not significantly differ between groups. Implementation of a validated and simplified PONV risk-assessment tool appeared to improve form completion rates and appropriate risk assessment; however, the rates of PONV remained similar and fewer patients received appropriate prophylaxis compared with patients assessed by the existing risk-assessment tool.

  11. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  12. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    Science.gov (United States)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  13. Mobile Health Technology Interventions for Suicide Prevention: Protocol for a Systematic Review and Meta-Analysis.

    Science.gov (United States)

    Melia, Ruth; Francis, Kady; Duggan, Jim; Bogue, John; O'Sullivan, Mary; Chambers, Derek; Young, Karen

    2018-01-26

    Previous research has reported that two of the major barriers to help-seeking for individuals at risk of suicide are stigma and geographical isolation. Mobile technology offers a potential means of delivering evidence-based interventions with greater specificity to the individual, and at the time that it is needed. Despite documented motivation by at-risk individuals to use mobile technology to track mental health and to support psychological interventions, there is a shortfall of outcomes data on the efficacy of mobile health (mHealth) technology on suicide-specific outcomes. The objective of this study is to develop a protocol for a systematic review and meta-analysis that aims to evaluate the effectiveness of mobile technology-based interventions for suicide prevention. The search includes the Cochrane Central Register of Controlled Trials (CENTRAL: The Cochrane Library), MEDLINE, Embase, PsycINFO, CRESP and relevant sources of gray literature. Studies that have evaluated psychological or nonpsychological interventions delivered via mobile computing and communication technology, and have suicidality as an outcome measure will be included. Two authors will independently extract data and assess the study suitability in accordance with the Cochrane Collaboration Risk of Bias Tool. Studies will be included if they measure at least one suicide outcome variable (ie, suicidal ideation, suicidal intent, nonsuicidal self-injurious behavior, suicidal behavior). Secondary outcomes will be measures of symptoms of depression. Where studies are sufficiently homogenous and reported outcomes are amenable for pooled synthesis, meta-analysis will be performed. A narrative synthesis will be conducted if the data is unsuitable for a meta-analysis. The review is in progress, with findings expected by summer 2018. To date, evaluations of mobile technology-based interventions in suicide prevention have focused on evaluating content as opposed to efficacy. Indeed, previous research has

  14. The effects of a tailored intensive care unit delirium prevention protocol: A randomized controlled trial.

    Science.gov (United States)

    Moon, Kyoung-Ja; Lee, Sun-Mi

    2015-09-01

    A decreased incidence of delirium following the application of non-pharmacologic intervention protocols to several patient populations has been previously reported. However, few studies have been conducted to examine the effects of their application to intensive care unit (ICU) patients. To examine the effects of applying a tailored delirium preventive protocol, developed by the authors, to ICU patients by analyzing its effects on delirium incidence, in-hospital mortality, ICU readmission, and length of ICU stay in a Korean hospital. A single-blind randomized controlled trial. A 1049-bed general hospital with a 105-bed ICU. Sixty and 63 ICU patients were randomly assigned to the intervention and control groups, respectively. The researchers applied the delirium prevention protocol to the intervention group every day for the first 7 days of ICU hospitalization. Delirium incidence, mortality, and re-admission to the ICU during the same hospitalization period were analyzed by logistic regression analysis; the 7- and 30-day in-hospital mortality by Kaplan-Meier survival and Cox proportional hazard regression analysis; and length of ICU stay was assessed by linear regression analysis. Application of the protocol had no significant effect on delirium incidence, in-hospital mortality, re-admission to the ICU, or length of ICU stay. Whereas the risk of 30-day in-hospital mortality was not significantly lower in the intervention than in the control group (OR: 0.33; 95% CI: 0.10-1.09), we found a significantly decreased 7-day in-hospital mortality in the intervention group after protocol application (HR: 0.09; 95% CI: 0.01-0.72). Application of a tailored delirium prevention protocol to acute stage patients during the first 7 days of ICU hospitalization appeared to reduce the 7-day in-hospital risk of mortality only for this patient population. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Sensitivity Analysis of Per-Protocol Time-to-Event Treatment Efficacy in Randomized Clinical Trials

    Science.gov (United States)

    Gilbert, Peter B.; Shepherd, Bryan E.; Hudgens, Michael G.

    2013-01-01

    Summary Assessing per-protocol treatment effcacy on a time-to-event endpoint is a common objective of randomized clinical trials. The typical analysis uses the same method employed for the intention-to-treat analysis (e.g., standard survival analysis) applied to the subgroup meeting protocol adherence criteria. However, due to potential post-randomization selection bias, this analysis may mislead about treatment efficacy. Moreover, while there is extensive literature on methods for assessing causal treatment effects in compliers, these methods do not apply to a common class of trials where a) the primary objective compares survival curves, b) it is inconceivable to assign participants to be adherent and event-free before adherence is measured, and c) the exclusion restriction assumption fails to hold. HIV vaccine efficacy trials including the recent RV144 trial exemplify this class, because many primary endpoints (e.g., HIV infections) occur before adherence is measured, and nonadherent subjects who receive some of the planned immunizations may be partially protected. Therefore, we develop methods for assessing per-protocol treatment efficacy for this problem class, considering three causal estimands of interest. Because these estimands are not identifiable from the observable data, we develop nonparametric bounds and semiparametric sensitivity analysis methods that yield estimated ignorance and uncertainty intervals. The methods are applied to RV144. PMID:24187408

  16. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  17. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  18. Systematic assessment of benefits and risks: study protocol for a multi-criteria decision analysis using the Analytic Hierarchy Process for comparative effectiveness research.

    Science.gov (United States)

    Maruthur, Nisa M; Joy, Susan; Dolan, James; Segal, Jodi B; Shihab, Hasan M; Singh, Sonal

    2013-01-01

    Regulatory decision-making involves assessment of risks and benefits of medications at the time of approval or when relevant safety concerns arise with a medication. The Analytic Hierarchy Process (AHP) facilitates decision-making in complex situations involving tradeoffs by considering risks and benefits of alternatives. The AHP allows a more structured method of synthesizing and understanding evidence in the context of importance assigned to outcomes. Our objective is to evaluate the use of an AHP in a simulated committee setting selecting oral medications for type 2 diabetes.  This study protocol describes the AHP in five sequential steps using a small group of diabetes experts representing various clinical disciplines. The first step will involve defining the goal of the decision and developing the AHP model. In the next step, we will collect information about how well alternatives are expected to fulfill the decision criteria. In the third step, we will compare the ability of the alternatives to fulfill the criteria and judge the importance of eight criteria relative to the decision goal of the optimal medication choice for type 2 diabetes. We will use pairwise comparisons to sequentially compare the pairs of alternative options regarding their ability to fulfill the criteria. In the fourth step, the scales created in the third step will be combined to create a summary score indicating how well the alternatives met the decision goal. The resulting scores will be expressed as percentages and will indicate the alternative medications' relative abilities to fulfill the decision goal. The fifth step will consist of sensitivity analyses to explore the effects of changing the estimates. We will also conduct a cognitive interview and process evaluation.  Multi-criteria decision analysis using the AHP will aid, support and enhance the ability of decision makers to make evidence-based informed decisions consistent with their values and preferences.

  19. An improved method of studying user-system interaction by combining transaction log analysis and protocol analysis

    Directory of Open Access Journals (Sweden)

    Jillian R. Griffiths

    2002-01-01

    Full Text Available The paper reports a novel approach to studying user-system interaction that captures a complete record of the searcher's actions, the system responses and synchronised talk-aloud comments from the searcher. The data is recorded unobtrusively and is available for later analysis. The approach is set in context by a discussion of transaction logging and protocol analysis and examples of the search logging in operation are presented

  20. Unsharpness-risk analysis

    International Nuclear Information System (INIS)

    Preyssl, C.

    1986-01-01

    Safety analysis provides the only tool for evaluation and quantification of rare or hypothetical events leading to system failure. So far probability theory has been used for the fault- and event-tree methodology. The phenomenon of uncertainties constitutes an important aspect in risk analysis. Uncertainties can be classified as originating from 'randomness' or 'fuzziness'. Probability theory addresses randomness only. The use of 'fuzzy set theory' makes it possible to include both types of uncertainty in the mathematical model of risk analysis. Thus the 'fuzzy fault tree' is expressed in 'possibilistic' terms implying a range of simplifications and improvements. 'Human failure' and 'conditionality' can be treated correctly. Only minimum-maximum relations are used to combine the possibility distributions of events. Various event-classifications facilitate the interpretation of the results. The method is demonstrated by application to a TRIGA-research reactor. Uncertainty as an implicit part of 'fuzzy risk' can be quantified explicitly using an 'uncertainty measure'. Based on this the 'degree of relative compliance' with a quantizative safety goal can be defined for a particular risk. The introduction of 'weighting functionals' guarantees the consideration of the importances attached to different parts of the risk exceeding or complying with the standard. The comparison of two reference systems is demonstrated in a case study. It is concluded that any application of the 'fuzzy risk analysis' has to be free of any hypostatization when reducing subjective to objective information. (Author)

  1. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  2. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  3. Hypertensive disorders of pregnancy and risk of neurodevelopmental disorders in the offspring: a systematic review and meta-analysis protocol.

    LENUS (Irish Health Repository)

    Maher, Gillian M

    2017-10-05

    Hypertensive disorders of pregnancy (HDPs), that is chronic hypertension, gestational hypertension, pre-eclampsia (de novo or superimposed on chronic hypertension) and white coat hypertension, affect approximately 5%-15% of pregnancies. HDP exposure has been linked to an increased risk of autism spectrum disorder, attention deficit\\/hyperactivity disorder and other neurodevelopmental disorders in children. However, findings are inconsistent, and a clear consensus on the impact of HDPs on the risk of neurodevelopmental disorders is needed. Therefore, we aim to synthesise the published literature on the relationship between HDPs and the risk of neurodevelopmental disorders in the form of a systematic review and meta-analysis.

  4. RAMS (Risk Analysis - Modular System) methodology

    Energy Technology Data Exchange (ETDEWEB)

    Stenner, R.D.; Strenge, D.L.; Buck, J.W. [and others

    1996-10-01

    The Risk Analysis - Modular System (RAMS) was developed to serve as a broad scope risk analysis tool for the Risk Assessment of the Hanford Mission (RAHM) studies. The RAHM element provides risk analysis support for Hanford Strategic Analysis and Mission Planning activities. The RAHM also provides risk analysis support for the Hanford 10-Year Plan development activities. The RAMS tool draws from a collection of specifically designed databases and modular risk analysis methodologies and models. RAMS is a flexible modular system that can be focused on targeted risk analysis needs. It is specifically designed to address risks associated with overall strategy, technical alternative, and `what if` questions regarding the Hanford cleanup mission. RAMS is set up to address both near-term and long-term risk issues. Consistency is very important for any comparative risk analysis, and RAMS is designed to efficiently and consistently compare risks and produce risk reduction estimates. There is a wide range of output information that can be generated by RAMS. These outputs can be detailed by individual contaminants, waste forms, transport pathways, exposure scenarios, individuals, populations, etc. However, they can also be in rolled-up form to support high-level strategy decisions.

  5. Are vaccine strain, type or administration protocol risk factors for canine parvovirus vaccine failure?

    Science.gov (United States)

    Altman, K D; Kelman, M; Ward, M P

    2017-10-01

    Canine parvovirus (CPV) is a highly contagious and worldwide cause of serious and often fatal disease in dogs, despite the widespread availability of vaccines. Which vaccine-related factors are associated with vaccination failure is largely unknown, and there are no reports from Australia. In this study - the first national population-level CPV study of its kind ever conducted - we analysed data on 594 cases of apparent CPV vaccination failure reported from an Australian national surveillance system to determine whether vaccine strain, type or administration protocol are risk factors for vaccination failures. The strain of CPV used in vaccine manufacture was not significantly associated with vaccination failure in clinical practice. The vaccine type (killed versus attenuated vaccine) for puppies diagnosed with CPV was associated with a lower mean age at time of vaccination (P=0.0495). The age at administration of the last CPV vaccination a puppy received prior to presenting with disease was a significant (P=0.0334) risk factor for vaccination failure, irrespective of whether the vaccine was marketed for a 10-week or 12-week or greater vaccination finish protocol. There was also a strong negative correlation between age at last vaccination prior to disease and vaccination failure (Pparvovirus vaccines, especially in outbreak situations. The large number of cases identified in this study confirms that CPV vaccination failure is occurring in Australia. Veterinarians should consider CPV as a differential diagnosis in cases with appropriate clinical presentation, regardless of the reported vaccination status of the dog. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. Risk analysis

    International Nuclear Information System (INIS)

    Baron, J.H.; Nunez McLeod, J.; Rivera, S.S.

    1997-01-01

    This book contains a selection of research works performed in the CEDIAC Institute (Cuyo National University) in the area of Risk Analysis, with specific orientations to the subjects of uncertainty and sensitivity studies, software reliability, severe accident modeling, etc. This volume presents important material for all those researches who want to have an insight in the risk analysis field, as a tool to solution several problems frequently found in the engineering and applied sciences field, as well as for the academic teachers who want to keep up to date, including the new developments and improvements continuously arising in this field [es

  7. Performance Analysis of a Cluster-Based MAC Protocol for Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jesús Alonso-Zárate

    2010-01-01

    Full Text Available An analytical model to evaluate the non-saturated performance of the Distributed Queuing Medium Access Control Protocol for Ad Hoc Networks (DQMANs in single-hop networks is presented in this paper. DQMAN is comprised of a spontaneous, temporary, and dynamic clustering mechanism integrated with a near-optimum distributed queuing Medium Access Control (MAC protocol. Clustering is executed in a distributed manner using a mechanism inspired by the Distributed Coordination Function (DCF of the IEEE 802.11. Once a station seizes the channel, it becomes the temporary clusterhead of a spontaneous cluster and it coordinates the peer-to-peer communications between the clustermembers. Within each cluster, a near-optimum distributed queuing MAC protocol is executed. The theoretical performance analysis of DQMAN in single-hop networks under non-saturation conditions is presented in this paper. The approach integrates the analysis of the clustering mechanism into the MAC layer model. Up to the knowledge of the authors, this approach is novel in the literature. In addition, the performance of an ad hoc network using DQMAN is compared to that obtained when using the DCF of the IEEE 802.11, as a benchmark reference.

  8. Health risk behaviours amongst school adolescents: protocol for a mixed methods study

    Directory of Open Access Journals (Sweden)

    Youness El Achhab

    2016-11-01

    Full Text Available Abstract Background Determining risky behaviours of adolescents provides valuable information for designing appropriate intervention programmes for advancing adolescent’s health. However, these behaviours are not fully addressed by researchers in a comprehensive approach. We report the protocol of a mixed methods study designed to investigate the health risk behaviours of Moroccan adolescents with the goal of identifying suitable strategies to address their health concerns. Methods We used a sequential two-phase explanatory mixed method study design. The approach begins with the collection of quantitative data, followed by the collection of qualitative data to explain and enrich the quantitative findings. In the first phase, the global school-based student health survey (GSHS was administered to 800 students who were between 14 and 19 years of age. The second phase engaged adolescents, parents and teachers in focus groups and assessed education documents to explore the level of coverage of health education in the programme learnt in the middle school. To obtain opinions about strategies to reduce Moroccan adolescents’ health risk behaviours, a nominal group technique will be used. Discussion The findings of this mixed methods sequential explanatory study provide insights into the risk behaviours that need to be considered if intervention programmes and preventive strategies are to be designed to promote adolescent’s health in the Moroccan school.

  9. Performance Analysis of TDMA Protocol in a Femtocell Network

    Directory of Open Access Journals (Sweden)

    Wanod Kumar

    2014-07-01

    Full Text Available In this paper, we evaluate the performance of TDMA (Time Division Multiple Access protocol using queuing theory in a femtocell network. The fair use of wireless channel among the users of network is carried out using TDMA protocol. The arrival of data packets from M communicating nodes becomes multiple Poisson process. The time slots of TDMA protocol represent c servers to communicate data packets coming from communicating nodes to the input of FAP (Femtocell Access Point. The service time of each server (time slot is exponentially distributed. This complete communication scenario using TDMA protocol is modeled using M/M/c queue. The performance of the protocol is evaluated in terms of mean number in system, average system delay and utilization for varying traffic intensity

  10. Association between vestibulo-ocular reflex suppression, balance, gait, and fall risk in ageing and neurodegenerative disease: protocol of a one-year prospective follow-up study.

    Science.gov (United States)

    Srulijes, Karin; Mack, David J; Klenk, Jochen; Schwickert, Lars; Ihlen, Espen A F; Schwenk, Michael; Lindemann, Ulrich; Meyer, Miriam; Srijana, K C; Hobert, Markus A; Brockmann, Kathrin; Wurster, Isabel; Pomper, Jörn K; Synofzik, Matthis; Schneider, Erich; Ilg, Uwe; Berg, Daniela; Maetzler, Walter; Becker, Clemens

    2015-10-09

    Falls frequency increases with age and particularly in neurogeriatric cohorts. The interplay between eye movements and locomotion may contribute substantially to the occurrence of falls, but is hardly investigated. This paper provides an overview of current approaches to simultaneously measure eye and body movements, particularly for analyzing the association of vestibulo-ocular reflex (VOR) suppression, postural deficits and falls in neurogeriatric risk cohorts. Moreover, VOR suppression is measured during head-fixed target presentation and during gaze shifting while postural control is challenged. Using these approaches, we aim at identifying quantitative parameters of eye-head-coordination during postural balance and gait, as indicators of fall risk. Patients with Progressive Supranuclear Palsy (PSP) or Parkinson's disease (PD), age- and sex-matched healthy older adults, and a cohort of young healthy adults will be recruited. Baseline assessment will include a detailed clinical assessment, covering medical history, neurological examination, disease specific clinical rating scales, falls-related self-efficacy, activities of daily living, neuro-psychological screening, assessment of mobility function and a questionnaire for retrospective falls. Moreover, participants will simultaneously perform eye and head movements (fixating a head-fixed target vs. shifting gaze to light emitting diodes in order to quantify vestibulo-ocular reflex suppression ability) under different conditions (sitting, standing, or walking). An eye/head tracker synchronized with a 3-D motion analysis system will be used to quantify parameters related to eye-head-coordination, postural balance, and gait. Established outcome parameters related to VOR suppression ability (e.g., gain, saccadic reaction time, frequency of saccades) and motor related fall risk (e.g., step-time variability, postural sway) will be calculated. Falls will be assessed prospectively over 12 months via protocols and

  11. Analysis of MD5 authentication in various routing protocols using simulation tools

    Science.gov (United States)

    Dinakaran, M.; Darshan, K. N.; Patel, Harsh

    2017-11-01

    Authentication being an important paradigm of security and Computer Networks require secure paths to make the flow of the data even more secure through some security protocols. So MD-5(Message Digest 5) helps in providing data integrity to the data being sent through it and authentication to the network devices. This paper gives a brief introduction to the MD-5, simulation of the networks by including MD-5 authentication using various routing protocols like OSPF, EIGRP and RIPv2. GNS3 is being used to simulate the scenarios. Analysis of the MD-5 authentication is done in the later sections of the paper.

  12. A background risk analysis. Vol. 1

    International Nuclear Information System (INIS)

    Taylor, J.R.

    1979-01-01

    This 4-volumes report gives a background of ideas, principles, and examples which might be of use in developing practical methods for risk analysis. Some of the risk analysis techniques, described are somewhat experimental. The report is written in an introductory style, but where some point needs further justification or evaluation, this is given in the form of a chapter appendix. In this way, it is hoped that the report can serve two purposes, - as a basis for starting risk analysis work and as a basis for discussing effectiveness of risk analysis procedures. The report should be seen as a preliminary stage, prior to a program of industrial trials of risk analysis methods. Vol. 1 contains a short history of risk analysis, and chapters on risk, failures, errors and accidents, and general procedures for risk analysis. (BP)

  13. International Conference on Risk Analysis

    CERN Document Server

    Oliveira, Teresa; Rigas, Alexandros; Gulati, Sneh

    2015-01-01

    This book covers the latest results in the field of risk analysis. Presented topics include probabilistic models in cancer research, models and methods in longevity, epidemiology of cancer risk, engineering reliability and economical risk problems. The contributions of this volume originate from the 5th International Conference on Risk Analysis (ICRA 5). The conference brought together researchers and practitioners working in the field of risk analysis in order to present new theoretical and computational methods with applications in biology, environmental sciences, public health, economics and finance.

  14. Preston and Park-Sanders protocols adapted for semi-quantitative isolation of thermotolerant Campylobacter from chicken rinse

    DEFF Research Database (Denmark)

    Josefsen, Mathilde Hartmann; Lübeck, Peter Stephensen; Aalbaek, B.

    2003-01-01

    Human campylobacteriosis has become the major cause of foodborne gastrointestinal diseases in several European countries. In order to implement effective control measures in the primary production, and as a tool in risk assessment studies, it is necessary to have sensitive and quantitative...... detection methods. Thus, semi-quantitative detection of thermophilic Campylobacter spp. in 20 naturally contaminated chicken rinse samples was carried out using the two most common standard protocols: Preston and Park-Sanders, as proposed by Nordic Committee on Food Analysis (NMKL) and International...... Standard Organization (ISO), respectively. For both protocols, the chicken rinse samples were prepared in 500 ml buffered peptone water, as recommended in the ISO protocol no. 6887-2. The results indicated that the Preston protocol was superior to the Park-Sanders protocol in supporting growth...

  15. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  16. Human Factors Risk Analyses of a Doffing Protocol for Ebola-Level Personal Protective Equipment: Mapping Errors to Contamination.

    Science.gov (United States)

    Mumma, Joel M; Durso, Francis T; Ferguson, Ashley N; Gipson, Christina L; Casanova, Lisa; Erukunuakpor, Kimberly; Kraft, Colleen S; Walsh, Victoria L; Zimring, Craig; DuBose, Jennifer; Jacob, Jesse T

    2018-03-05

    Doffing protocols for personal protective equipment (PPE) are critical for keeping healthcare workers (HCWs) safe during care of patients with Ebola virus disease. We assessed the relationship between errors and self-contamination during doffing. Eleven HCWs experienced with doffing Ebola-level PPE participated in simulations in which HCWs donned PPE marked with surrogate viruses (ɸ6 and MS2), completed a clinical task, and were assessed for contamination after doffing. Simulations were video recorded, and a failure modes and effects analysis and fault tree analyses were performed to identify errors during doffing, quantify their risk (risk index), and predict contamination data. Fifty-one types of errors were identified, many having the potential to spread contamination. Hand hygiene and removing the powered air purifying respirator (PAPR) hood had the highest total risk indexes (111 and 70, respectively) and number of types of errors (9 and 13, respectively). ɸ6 was detected on 10% of scrubs and the fault tree predicted a 10.4% contamination rate, likely occurring when the PAPR hood inadvertently contacted scrubs during removal. MS2 was detected on 10% of hands, 20% of scrubs, and 70% of inner gloves and the predicted rates were 7.3%, 19.4%, 73.4%, respectively. Fault trees for MS2 and ɸ6 contamination suggested similar pathways. Ebola-level PPE can both protect and put HCWs at risk for self-contamination throughout the doffing process, even among experienced HCWs doffing with a trained observer. Human factors methodologies can identify error-prone steps, delineate the relationship between errors and self-contamination, and suggest remediation strategies.

  17. Validation of HPLC-ESI-MS/MS Protocol to Analyze EtG in Hair for Assessment of Chronic Excessive Alcohol Use in Thailand in Conjunction with AUDIT.

    Science.gov (United States)

    Thananchai, Thiwaphorn; Junkuy, Anongphan; Kittirattanapaiboon, Phunnapa; Sribanditmongkol, Pongruk

    2016-06-01

    Hair analysis for chronic excessive alcohol (ethanol) use has focused on ethyl glucuronide (EtG), a minor metabolite of ethanol. Preferred methods have involved high-performance liquid chromatography (HPLC) combined with tandem mass spectrometry (MS/MS) in line with an electrospray ionization (ESI) source. EtG analysis in hair has not yet been introduced to Thailand To validate an in-house HPLC-ESI-MS/MS hair analysis protocol for EtG and to apply it to a field sample of alcohol drinkers to assess different risk levels of alcohol consumption as measured by the Alcohol Use Disorders Identification Test (AUDIT). Validation procedures followed guidelines of the US Food and Drug Administration, the European Medicines Agency, and the Scientific Working Group for Forensic Toxicology. One hundred twenty subjects reported consuming alcohol during a 3-month period prior to enrollment. After taking the Thai-language version of AUDIT, subjects were divided on the basis of test scores into low, medium, and high-risk groups for chronic excessive alcohol use. The protocol satisfied the international standards for selectivity, specificity, accuracy, precision, and calibration curve. There was no significant matrix effect. Limits of detection and quantification (LOD/LOQ) were set at 15 pg of EtG per mg of hair. The protocol was not able to detect EtG in low-risk subjects (n = 38). Detection rates for medium-risk (n = 42) and high-risk subjects (n = 40) were 14.3% and 85%, respectively. The median of EtG concentration between these two groups were significantly different. Sensitivity and specificity were both more than 90% when EtG concentrations of high-risk subjects were compared with the 30 pg/mg cutoff recommended by the Society of Hair Testing (SoHT) for diagnosing chronic excessive alcohol consumption, based on an average ethanol daily intake greater than 60 g. The in-house protocol for EtG analysis in hair was validated according to international standards. The protocol is a

  18. iLAP: a workflow-driven software for experimental protocol development, data acquisition and analysis

    Directory of Open Access Journals (Sweden)

    McNally James

    2009-01-01

    Full Text Available Abstract Background In recent years, the genome biology community has expended considerable effort to confront the challenges of managing heterogeneous data in a structured and organized way and developed laboratory information management systems (LIMS for both raw and processed data. On the other hand, electronic notebooks were developed to record and manage scientific data, and facilitate data-sharing. Software which enables both, management of large datasets and digital recording of laboratory procedures would serve a real need in laboratories using medium and high-throughput techniques. Results We have developed iLAP (Laboratory data management, Analysis, and Protocol development, a workflow-driven information management system specifically designed to create and manage experimental protocols, and to analyze and share laboratory data. The system combines experimental protocol development, wizard-based data acquisition, and high-throughput data analysis into a single, integrated system. We demonstrate the power and the flexibility of the platform using a microscopy case study based on a combinatorial multiple fluorescence in situ hybridization (m-FISH protocol and 3D-image reconstruction. iLAP is freely available under the open source license AGPL from http://genome.tugraz.at/iLAP/. Conclusion iLAP is a flexible and versatile information management system, which has the potential to close the gap between electronic notebooks and LIMS and can therefore be of great value for a broad scientific community.

  19. Caries risk assessment tool and prevention protocol for public health nurses in mother and child health centers, Israel.

    Science.gov (United States)

    Natapov, Lena; Dekel-Markovich, Dan; Granit-Palmon, Hadas; Aflalo, Efrat; Zusman, Shlomo Paul

    2018-01-01

    Dental caries is the most prevalent chronic disease in children. Caries risk assessment tools enable the dentists, physicians, and nondental health care providers to assess the individual's risk. Intervention by nurses in primary care settings can contribute to the establishment of oral health habits and prevention of dental disease. In Israel, Mother and Child Health Centers provide free preventive services for pregnant women and children by public health nurses. A caries prevention program in health centers started in 2015. Nurses underwent special training regarding caries prevention. A customized Caries Risk Assessment tool and Prevention Protocol for nurses, based on the AAPD tool, was introduced. A two-step evaluation was conducted which included a questionnaire and in-depth phone interviews. Twenty-eight (out of 46) health centers returned a completed questionnaire. Most nurses believed that oral health preventive services should be incorporated into their daily work. In the in-depth phone interviews, nurses stated that the integration of the program into their busy daily schedule was realistic and appropriate. The lack of specific dental module for computer program was mentioned as an implementation difficulty. The wide use of our tool by nurses supports its simplicity and feasibility which enables quick calculation and informed decision making. The nurses readily embraced the tool and it became an integral part of their toolkit. We provide public health nurses with a caries risk assessment tool and prevention protocol thus integrating oral health into general health of infants and toddlers. © 2017 Wiley Periodicals, Inc.

  20. The development and evaluation of an internal workplace violence risk assessment protocol: one organization's experience.

    Science.gov (United States)

    Heitt, Michael C; Tamburo, Melissa Back

    2005-01-01

    The creation and development of a Risk Assessment Team at a large urban university is presented as a case study, with particular focus on the role the Employee Assistance Program (EAP) plays in the multidisciplinary team. The structure of the team and differing roles and responsibilities of members will be discussed. A specific protocol for addressing incidents will be introduced, along with changes in the team ' response over time. Major lessons learned will be presented, as well as the challenges the team faces today, and discussion of areas for future research and evaluation.

  1. Analysis of limiting information characteristics of quantum-cryptography protocols

    International Nuclear Information System (INIS)

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-01

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  2. Allowing Students to Select Deliverables for Peer Review: Analysis of a Free-Selection Protocol

    DEFF Research Database (Denmark)

    Papadopoulos, Pantelis M.; Lagkas, Thomas; Demetriadis, Stavros

    2011-01-01

    This study analyzes the benefits and limitations of a “free-selection” peer assignment protocol by comparing them to the widely implemented “assigned-pair” protocol. The primary motivation was to circumvent the issues that often appear to the instructors implementing peer review activities with pre......-Selection, where students were able to explore and select peer work for review. Result analysis showed a very strong tendency in favor of the Free-Selection students regarding both domain specific (conceptual) and domain-general (reviewing) knowledge....

  3. Evaluation of a Low-risk Mild Traumatic Brain Injury and Intracranial Hemorrhage Emergency Department Observation Protocol.

    Science.gov (United States)

    Yun, Brian J; Borczuk, Pierre; Wang, Lulu; Dorner, Stephen; White, Benjamin A; Raja, Ali S

    2017-11-20

    ] = 0.25-0.82, p = 0.009) in the observation unit. After a stay in the EDOU, 26% (37/143) of patients required an inpatient admission before implementation of the protocol and 13% (20/153) of patients required an inpatient admission after protocol implementation. There was no statistically significant difference in log transformed EDOU length of stay (LOS) between the groups after adjusting for propensity score (p = 0.34). While there was no difference in EDOU LOS, implementing a low-risk mild TBI and ICH protocol in the EDOU may decrease the rate of inpatient admissions from the EDOU. A protocol-driven observation unit may help physicians by standardizing eligibility criteria and by providing guidance on management. As the propensity score method limits our ability to create a straightforward predictive model, a future larger study should validate the results. © 2017 by the Society for Academic Emergency Medicine.

  4. A secure distributed logistic regression protocol for the detection of rare adverse drug events.

    Science.gov (United States)

    El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat

    2013-05-01

    There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through

  5. Risk analysis: opening the process

    International Nuclear Information System (INIS)

    Hubert, Ph.; Mays, C.

    1998-01-01

    This conference on risk analysis took place in Paris, 11-14 october 1999. Over 200 paper where presented in the seven following sessions: perception; environment and health; persuasive risks; objects and products; personal and collective involvement; assessment and valuation; management. A rational approach to risk analysis has been developed in the three last decades. Techniques for risk assessment have been thoroughly enhanced, risk management approaches have been developed, decision making processes have been clarified, the social dimensions of risk perception and management have been investigated. Nevertheless this construction is being challenged by recent events which reveal how deficits in stakeholder involvement, openness and democratic procedures can undermine risk management actions. Indeed, the global process most components of risk analysis may be radically called into question. Food safety has lately been a prominent issue, but now debates appear, or old debates are revisited in the domains of public health, consumer products safety, waste management, environmental risks, nuclear installations, automobile safety and pollution. To meet the growing pressures for efficiency, openness, accountability, and multi-partner communication in risk analysis, institutional changes are underway in many European countries. However, the need for stakeholders to develop better insight into the process may lead to an evolution of all the components of risks analysis, even in its most (technical' steps. For stakeholders of different professional background, political projects, and responsibilities, risk identification procedures must be rendered understandable, quantitative risk assessment must be intelligible and accommodated in action proposals, ranging from countermeasures to educational programs to insurance mechanisms. Management formats must be open to local and political input and other types of operational feedback. (authors)

  6. Protocol: An updated integrated methodology for analysis of metabolites and enzyme activities of ethylene biosynthesis

    Directory of Open Access Journals (Sweden)

    Geeraerd Annemie H

    2011-06-01

    Full Text Available Abstract Background The foundations for ethylene research were laid many years ago by researchers such as Lizada, Yang and Hoffman. Nowadays, most of the methods developed by them are still being used. Technological developments since then have led to small but significant improvements, contributing to a more efficient workflow. Despite this, many of these improvements have never been properly documented. Results This article provides an updated, integrated set of protocols suitable for the assembly of a complete picture of ethylene biosynthesis, including the measurement of ethylene itself. The original protocols for the metabolites 1-aminocyclopropane-1-carboxylic acid and 1-(malonylaminocyclopropane-1-carboxylic acid have been updated and downscaled, while protocols to determine in vitro activities of the key enzymes 1-aminocyclopropane-1-carboxylate synthase and 1-aminocyclopropane-1-carboxylate oxidase have been optimised for efficiency, repeatability and accuracy. All the protocols described were optimised for apple fruit, but have been proven to be suitable for the analysis of tomato fruit as well. Conclusions This work collates an integrated set of detailed protocols for the measurement of components of the ethylene biosynthetic pathway, starting from well-established methods. These protocols have been optimised for smaller sample volumes, increased efficiency, repeatability and accuracy. The detailed protocol allows other scientists to rapidly implement these methods in their own laboratories in a consistent and efficient way.

  7. Adversarial risk analysis

    CERN Document Server

    Banks, David L; Rios Insua, David

    2015-01-01

    Flexible Models to Analyze Opponent Behavior A relatively new area of research, adversarial risk analysis (ARA) informs decision making when there are intelligent opponents and uncertain outcomes. Adversarial Risk Analysis develops methods for allocating defensive or offensive resources against intelligent adversaries. Many examples throughout illustrate the application of the ARA approach to a variety of games and strategic situations. The book shows decision makers how to build Bayesian models for the strategic calculation of their opponents, enabling decision makers to maximize their expected utility or minimize their expected loss. This new approach to risk analysis asserts that analysts should use Bayesian thinking to describe their beliefs about an opponent's goals, resources, optimism, and type of strategic calculation, such as minimax and level-k thinking. Within that framework, analysts then solve the problem from the perspective of the opponent while placing subjective probability distributions on a...

  8. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  9. Analysis of Intracellular Metabolites from Microorganisms: Quenching and Extraction Protocols.

    Science.gov (United States)

    Pinu, Farhana R; Villas-Boas, Silas G; Aggio, Raphael

    2017-10-23

    Sample preparation is one of the most important steps in metabolome analysis. The challenges of determining microbial metabolome have been well discussed within the research community and many improvements have already been achieved in last decade. The analysis of intracellular metabolites is particularly challenging. Environmental perturbations may considerably affect microbial metabolism, which results in intracellular metabolites being rapidly degraded or metabolized by enzymatic reactions. Therefore, quenching or the complete stop of cell metabolism is a pre-requisite for accurate intracellular metabolite analysis. After quenching, metabolites need to be extracted from the intracellular compartment. The choice of the most suitable metabolite extraction method/s is another crucial step. The literature indicates that specific classes of metabolites are better extracted by different extraction protocols. In this review, we discuss the technical aspects and advancements of quenching and extraction of intracellular metabolite analysis from microbial cells.

  10. Hypersensitivity Reactions to Oxaliplatin: Identifying the Risk Factors and Judging the Efficacy of a Desensitization Protocol.

    Science.gov (United States)

    Okayama, Tetsuya; Ishikawa, Takeshi; Sugatani, Kazuko; Yoshida, Naohisa; Kokura, Satoshi; Matsuda, Kiyomi; Tsukamoto, Shigeru; Ihara, Norihiko; Kuriu, Yoshiaki; Nakanishi, Masayoshi; Nakamura, Terukazu; Kamada, Kazuhiro; Katada, Kazuhiro; Uchiyama, Kazuhiko; Takagi, Tomohisa; Handa, Osamu; Konishi, Hideyuki; Yagi, Nobuaki; Naito, Yuji; Otsuji, Eigo; Hosoi, Hajime; Miki, Tsuneharu; Itoh, Yoshito

    2015-06-01

    We examined the clinical data of patients treated with oxaliplatin to determine the risk factors of oxaliplatin-related hypersensitivity reaction (HSR). In addition, we evaluated the efficacy of rechallenging patients with HSRs with oxaliplatin using prophylactic agents or desensitization procedures. This study consisted of 162 patients with colorectal cancer (88 men and 74 women) who were treated consecutively at the outpatient chemotherapy department at University Hospital, Kyoto Prefectural University of Medicine. Patients underwent chemotherapy, including oxaliplatin, between March 2006 and June 2012. We analyzed the patients' clinical backgrounds (eg, age, sex, performance status, disease stage, and allergic history) to uncover any connections to the development of HSR to oxaliplatin. In addition, we rechallenged 10 patients who had oxaliplatin-related HSR using prophylactic agents or desensitization procedures. Of 162 patients, 28 (17.2%) developed oxaliplatin-related HSRs (16, 2, 9 and 1 patient had grade 1, 2, 3, and 4 HSRs, respectively). The total cumulative dose of oxaliplatin at the onset of the HSR was 301 to 1126 mg/m(2) (median, 582 mg/m(2)), and the first reactions developed in these patients after 5 to 17 infusions of oxaliplatin (median, 8 infusions). Logistic regression analysis indicated that sex (male: odds ratio = 3.624; 95% CI, 1.181-11.122; P = 0.024) and eosinophil count in peripheral blood (odds ratio = 35.118; 95% CI, 1.058-1166.007; P = 0.046) were independent variables for oxaliplatin-related HSRs. Rechallenging patients with prophylactic agents was successful in 2 (28.6%) of 7 patients who successfully completed their treatment. On the other hand, all 3 patients rechallenged with oxaliplatin using a desensitization protocol successfully completed their treatment without new HSRs. In this retrospective study, we observed that being male and having higher counts of peripheral eosinophil could be predictors for HSR to oxaliplatin. In

  11. Financial incentive policies at workplace cafeterias for preventing obesity--a systematic review and meta-analysis (Protocol).

    Science.gov (United States)

    Sawada, Kimi; Ota, Erika; Shahrook, Sadequa; Mori, Rintaro

    2014-10-28

    Various studies are currently investigating ways to prevent lifestyle-related diseases and obesity among workers through interventions using incentive strategies, including price discounts for low-fat snacks and sugar-free beverages at workplace cafeterias or vending machines, and the provision of a free salad bar in cafeterias. Rather than assessing individual or group interventions, we will focus on the effectiveness of nutrition education programs at the population level, which primarily incorporate financial incentive strategies to prevent obesity. This paper describes the protocol of a systematic review that will examine the effectiveness of financial incentive programs at company cafeterias in improving dietary habits, nutrient intake, and obesity prevention. We will conduct searches in the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, Embase, and PsycINFO. Interventions will be assessed using data from randomized control trials (RCTs) and cluster RCTs. However, if few such trials exist, we will include quasi-RCTs. We will exclude controlled before-and-after studies and crossover RCTs. We will assess food-based interventions that include financial incentive strategies (discount strategies or social marketing) for workplace cafeterias, vending machines, and kiosks. Two authors will independently review studies for inclusion and will resolve differences by discussion and, if required, through consultation with a third author. We will assess the risk of bias of included studies according to the Cochrane Collaboration's "risk of bias" tool. The purpose of this paper is to outline the study protocol for a systematic review and meta-analysis that will investigate the effectiveness of population-level, incentive-focused interventions at the workplace cafeteria that aim to promote and prevent obesity. This review will give an important overview of the available evidence about the effectiveness of incentive-based environmental interventions to

  12. Avian influenza transmission risks: analysis of biosecurity measures and contact structure in Dutch poultry farming.

    Science.gov (United States)

    Ssematimba, A; Hagenaars, T J; de Wit, J J; Ruiterkamp, F; Fabri, T H; Stegeman, J A; de Jong, M C M

    2013-04-01

    In the 2003 epidemic of highly pathogenic avian influenza in Dutch poultry, between-farm virus transmission continued for considerable time despite control measures. Gaining more insight into the mechanisms of this spread is necessary for the possible development of better control strategies. We carried out an in-depth interview study aiming to systematically explore all the poultry production activities to identify the activities that could potentially be related to virus introduction and transmission. One of the between-farm contact risks that were identified is the movement of birds between farms during thinning with violations of on-farm biosecurity protocols. In addition, several other risky management practices, risky visitor behaviours and biosecurity breaches were identified. They include human and fomite contacts that occurred without observing biosecurity protocols, poor waste management practices, presence of other animal species on poultry farms, and poor biosecurity against risks from farm neighbourhood activities. Among the detailed practices identified, taking cell phones and jewellery into poultry houses, not observing shower-in protocols and the exchange of unclean farm equipment were common. Also, sometimes certain protocols or biosecurity facilities were lacking. We also asked the interviewed farmers about their perception of transmission risks and found that they had divergent opinions about the visitor- and neighbourhood-associated risks. We performed a qualitative assessment of contact risks (as transmission pathways) based on contact type, corresponding biosecurity practices, and contact frequency. This assessment suggests that the most risky contact types are bird movements during thinning and restocking, most human movements accessing poultry houses and proximity to other poultry farms. The overall risk posed by persons and equipment accessing storage rooms and the premises-only contacts was considered to be medium. Most of the exposure

  13. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  14. Thromboprophylaxis in Abdominoplasty: Efficacy and Safety of a Complete Perioperative Protocol

    Directory of Open Access Journals (Sweden)

    Giovanni Francesco Marangi

    2016-07-01

    Full Text Available BackgroundVenous thromboembolism, a spectrum of diseases ranging from deep venous thrombosis to pulmonary embolism, is a major source of morbidity and mortality. The majority of cases described in plastic surgery involve abdominoplasty. Risk assessment and prophylaxis are paramount in such patients. General recommendations were recently developed, but the evidence in the literature was insufficient to prepare exhaustive guidelines regarding the medication, dosage, timing, or length of the prophylaxis.MethodsA thromboprophylaxis protocol was developed for patients undergoing abdominoplasty. The protocol consisted of preoperative, intraoperative, and postoperative measures. Enoxaparin was administered as chemoprophylaxis in selected patients. The study involved 253 patients. The patients were analyzed for age, body mass index, enoxaparin dosage, risk factors, and complications.ResultsDeep venous thrombosis was documented in two cases (0.8%. No pulmonary embolism occurred. Three patients (1.2% presented mild subcutaneous abdominal hematoma within the first postoperative week that spontaneously resorbed with neither aesthetic nor functional complications. Two patients (0.8% presented severe hematoma requiring surgical re-intervention for drainage and hemostasis revision. Statistical analysis showed no significant correlation between enoxaparin dosage and hematoma (P=0.18 or deep venous thrombosis (P=0.61.ConclusionsThe described thromboprophylaxis protocol proved to be effective in the prevention of thrombotic events, with an acceptable risk of hemorrhagic complications. Furthermore, it provides new evidence regarding the currently debated variables of chemoprophylaxis, namely type, dosage, timing, and length.

  15. Evaluation of Extraction Protocols for Simultaneous Polar and Non-Polar Yeast Metabolite Analysis Using Multivariate Projection Methods

    Directory of Open Access Journals (Sweden)

    Nicolas P. Tambellini

    2013-07-01

    Full Text Available Metabolomic and lipidomic approaches aim to measure metabolites or lipids in the cell. Metabolite extraction is a key step in obtaining useful and reliable data for successful metabolite studies. Significant efforts have been made to identify the optimal extraction protocol for various platforms and biological systems, for both polar and non-polar metabolites. Here we report an approach utilizing chemoinformatics for systematic comparison of protocols to extract both from a single sample of the model yeast organism Saccharomyces cerevisiae. Three chloroform/methanol/water partitioning based extraction protocols found in literature were evaluated for their effectiveness at reproducibly extracting both polar and non-polar metabolites. Fatty acid methyl esters and methoxyamine/trimethylsilyl derivatized aqueous compounds were analyzed by gas chromatography mass spectrometry to evaluate non-polar or polar metabolite analysis. The comparative breadth and amount of recovered metabolites was evaluated using multivariate projection methods. This approach identified an optimal protocol consisting of 64 identified polar metabolites from 105 ion hits and 12 fatty acids recovered, and will potentially attenuate the error and variation associated with combining metabolite profiles from different samples for untargeted analysis with both polar and non-polar analytes. It also confirmed the value of using multivariate projection methods to compare established extraction protocols.

  16. On the Bayes risk in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2008-01-01

    Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability

  17. Proton Beam Therapy for Hepatocellular Carcinoma: A Comparison of Three Treatment Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Mizumoto, Masashi; Okumura, Toshiyuki; Hashimoto, Takayuki [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Fukuda, Kuniaki [Department of Gastroenterology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Oshiro, Yoshiko; Fukumitsu, Nobuyoshi [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Abei, Masato [Department of Gastroenterology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Kawaguchi, Atsushi [Biostatistics Center, Kurume University, Fukuoka (Japan); Hayashi, Yasutaka; Ookawa, Ayako; Hashii, Haruko; Kanemoto, Ayae [Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Moritake, Takashi [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Tohno, Eriko [Department of Diagnostic Radiology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Tsuboi, Koji [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Sakae, Takeji [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Sakurai, Hideyuki, E-mail: hsakurai@pmrc.tsukuba.ac.jp [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan)

    2011-11-15

    Background: Our previous results for treatment of hepatocellular carcinoma (HCC) with proton beam therapy revealed excellent local control with low toxicity. Three protocols were used to avoid late complications such as gastrointestinal ulceration and bile duct stenosis. In this study, we examined the efficacy of these protocols. Methods and Materials: The subjects were 266 patients (273 HCCs) treated by proton beam therapy at University of Tsukuba between January 2001 and December 2007. Three treatment protocols (A, 66 GyE in 10 fractions; B, 72.6 GyE in 22 fractions; and C, 77 GyE in 35 fractions) were used, depending on the tumor location. Results: Of the 266 patients, 104, 95, and 60 patients were treated with protocols A, B, and C, respectively. Seven patients with double lesions underwent two different protocols. The overall survival rates after 1, 3 and 5 years were 87%, 61%, and 48%, respectively (median survival, 4.2 years). Multivariate analysis showed that better liver function, small clinical target volume, and no prior treatment (outside the irradiated field) were associated with good survival. The local control rates after 1, 3, and 5 years were 98%, 87%, and 81%, respectively. Multivariate analysis did not identify any factors associated with good local control. Conclusions: This study showed that proton beam therapy achieved good local control for HCC using each of three treatment protocols. This suggests that selection of treatment schedules based on tumor location may be used to reduce the risk of late toxicity and maintain good treatment efficacy.

  18. New method development in prehistoric stone tool research: evaluating use duration and data analysis protocols.

    Science.gov (United States)

    Evans, Adrian A; Macdonald, Danielle A; Giusca, Claudiu L; Leach, Richard K

    2014-10-01

    Lithic microwear is a research field of prehistoric stone tool (lithic) analysis that has been developed with the aim to identify how stone tools were used. It has been shown that laser scanning confocal microscopy has the potential to be a useful quantitative tool in the study of prehistoric stone tool function. In this paper, two important lines of inquiry are investigated: (1) whether the texture of worn surfaces is constant under varying durations of tool use, and (2) the development of rapid objective data analysis protocols. This study reports on the attempt to further develop these areas of study and results in a better understanding of the complexities underlying the development of flexible analytical algorithms for surface analysis. The results show that when sampling is optimised, surface texture may be linked to contact material type, independent of use duration. Further research is needed to validate this finding and test an expanded range of contact materials. The use of automated analytical protocols has shown promise but is only reliable if sampling location and scale are defined. Results suggest that the sampling protocol reports on the degree of worn surface invasiveness, complicating the ability to investigate duration related textural characterisation. Copyright © 2014. Published by Elsevier Ltd.

  19. Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.

    Science.gov (United States)

    Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C

    Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.

  20. [Professional divers: analysis of critical issues and proposal of a health protocol for work fitness].

    Science.gov (United States)

    Pedata, Paola; Corvino, Anna Rita; Napolitano, Raffaele Carmine; Garzillo, Elpidio Maria; Furfaro, Ciro; Lamberti, Monica

    2016-01-20

    From many years now, thanks to the development of modern diving techniques, there has been a rapid spread of diving activities everywhere. In fact, divers are ever more numerous both among the Armed Forces and civilians who dive for work, like fishing, biological research and archeology. The aim of the study was to propose a health protocol for work fitness of professional divers keeping in mind the peculiar work activity, existing Italian legislation that is almost out of date and the technical and scientific evolution in this occupational field. We performed an analysis of the most frequently occurring diseases among professional divers and of the clinical investigation and imaging techniques used for work fitness assessment of professional divers. From analysis of the health protocol recommended by D.M. 13 January 1979 (Ministerial Decree), that is most used by occupational health physician, several critical issues emerged. Very often the clinical investigation and imaging techniques still used are almost obsolete, ignoring the execution of simple and inexpensive investigations that are more useful for work fitness assessment. Considering the out-dated legislation concerning diving disciplines, it is necessary to draw up a common health protocol that takes into account clinical and scientific knowledge and skills acquired in this area. This protocol's aim is to propose a useful tool for occupational health physicians who work in this sector.

  1. Analysis of Intracellular Metabolites from Microorganisms: Quenching and Extraction Protocols

    Directory of Open Access Journals (Sweden)

    Farhana R. Pinu

    2017-10-01

    Full Text Available Sample preparation is one of the most important steps in metabolome analysis. The challenges of determining microbial metabolome have been well discussed within the research community and many improvements have already been achieved in last decade. The analysis of intracellular metabolites is particularly challenging. Environmental perturbations may considerably affect microbial metabolism, which results in intracellular metabolites being rapidly degraded or metabolized by enzymatic reactions. Therefore, quenching or the complete stop of cell metabolism is a pre-requisite for accurate intracellular metabolite analysis. After quenching, metabolites need to be extracted from the intracellular compartment. The choice of the most suitable metabolite extraction method/s is another crucial step. The literature indicates that specific classes of metabolites are better extracted by different extraction protocols. In this review, we discuss the technical aspects and advancements of quenching and extraction of intracellular metabolite analysis from microbial cells.

  2. Mobility and increased risk of HIV acquisition in South Africa: a mixed-method systematic review protocol.

    Science.gov (United States)

    Dzomba, Armstrong; Govender, Kaymarlin; Mashamba-Thompson, Tivani P; Tanser, Frank

    2018-02-27

    In South Africa (home of the largest HIV epidemic globally), there are high levels of mobility. While studies produced in the recent past provide useful perspectives to the mobility-HIV risk linkage, systematic analyses are needed for in-depth understanding of the complex dynamics between mobility and HIV risk. We plan to undertake an evidence-based review of existing literature connecting mobility and increased risky sexual behavior as well as risk of HIV acquisition in South Africa. We will conduct a mixed-method systematic review of peer-reviewed studies published between 2000 and 2015. In particular, we will search for relevant South African studies from the following databases: MEDLINE, EMBASE, Web of Science, and J-STOR databases. Studies explicitly examining HIV and labor migration will be eligible for inclusion, while non-empirical work and other studies on key vulnerable populations such as commercial sex workers (CSW) and men who have sex with men (MSM) will be excluded. The proposed mixed-method systematic review will employ a three-phase sequential approach [i.e., (i) identifying relevant studies through data extraction (validated by use of Distiller-SR data management software), (ii) qualitative synthesis, and (iii) quantitative synthesis including meta-analysis data]. Recurrent ideas and conclusions from syntheses will be compiled into key themes and further processed into categories and sub-themes constituting the primary and secondary outcomes of this study. Synthesis of main findings from different studies examining the subject issue here may uncover important research gaps in this literature, laying a strong foundation for research and development of sustainable localized migrant-specific HIV prevention strategies in South Africa. Our protocol was registered with PROSPERO under registration number: CRD 42017055580. ( https://www.crd.york.ac.uk/PROSPERO/display_record.asp?ID=CRD42017055580 ).

  3. A background to risk analysis. Vol. 3

    International Nuclear Information System (INIS)

    Taylor, J.R.

    1979-01-01

    This 4-volumes report gives a background of ideas, principles, and examples which might be of use in developing practical methods for risk analysis. Some of the risk analysis techniques described are somewhat experimental. The report is written in an introductory style, but where some point needs further justifi- cation or evaluation, this is given in the form of a chapter appenix. In this way, it is hoped that the report can serve two purposes, - as a basis for starting risk analysis work and as a basis for discussing effectiveness of risk analysis procedures. The report should be seen as a preliminary stage, prior to a program of industrial trials of risk analysis methods. Vol. 3 contains chapters on quantification of risk, failure and accident probability, risk analysis and design, and examles of risk analysis for process plant. (BP)

  4. The effects of rhythm control strategies versus rate control strategies for atrial fibrillation and atrial flutter: a protocol for a systematic review with meta-analysis and Trial Sequential Analysis.

    Science.gov (United States)

    Sethi, Naqash J; Safi, Sanam; Nielsen, Emil E; Feinberg, Joshua; Gluud, Christian; Jakobsen, Janus C

    2017-03-06

    Atrial fibrillation is the most common arrhythmia of the heart with a prevalence of approximately 2% in the western world. Atrial flutter, another arrhythmia, occurs less often with an incidence of approximately 200,000 new patients per year in the USA. Patients with atrial fibrillation and atrial flutter have an increased risk of death and morbidities. The management of atrial fibrillation and atrial flutter is often based on interventions aiming at either a rhythm control strategy or a rate control strategy. The evidence on the comparable effects of these strategies is unclear. This protocol for a systematic review aims at identifying the best overall treatment strategy for atrial fibrillation and atrial flutter. This protocol for a systematic review was performed following the recommendations of the Cochrane Collaboration and the eight-step assessment procedure suggested by Jakobsen and colleagues. We plan to include all relevant randomised clinical trials assessing the effects of any rhythm control strategy versus any rate control strategy. We plan to search the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE, LILACS, Science Citation Index Expanded on Web of Science, and BIOSIS to identify relevant trials. Any eligible trial will be assessed and classified as either high risk of bias or low risk of bias, and our conclusions will be based on trials with low risk of bias. The analyses of the extracted data will be performed using Review Manager 5 and Trial Sequential Analysis. For both our primary and secondary outcomes, we will create a 'Summary of Findings' table and use GRADE assessment to assess the quality of the evidence. The results of this systematic review have the potential to benefit thousands of patients worldwide as well as healthcare systems and healthcare economy. PROSPERO CRD42016051433.

  5. Analysis of 213 currently used rehabilitation protocols in foot and ankle fractures.

    Science.gov (United States)

    Pfeifer, Christian G; Grechenig, Stephan; Frankewycz, Borys; Ernstberger, Antonio; Nerlich, Michael; Krutsch, Werner

    2015-10-01

    Fractures of the ankle, hind- and midfoot are amongst the five most common fractures. Besides initial operative or non-operative treatment, rehabilitation of the patients plays a crucial role for fracture union and long term functional outcome. Limited evidence is available with regard to what a rehabilitation regimen should include and what guidelines should be in place for the initial clinical course of these patients. This study therefore investigated the current rehabilitation concepts after fractures of the ankle, hind- and midfoot. Written rehabilitation protocols provided by orthopedic and trauma surgery institutions in terms of recommendations for weight bearing, range of motion (ROM), physiotherapy and choice of orthosis were screened and analysed. All protocols for lateral ankle fractures type AO 44A1, AO 44B1 and AO 44C1, for calcaneal fractures and fractures of the metatarsal as well as other not specific were included. Descriptive analysis was carried out and statistical analysis applied where appropriate. 209 rehabilitation protocols for ankle fractures type AO 44B1 and AO 44C1, 98 for AO 44A1, 193 for metatarsal fractures, 142 for calcaneal fractures, 107 for 5(th) metatarsal base fractures and 70 for 5(th) metatarsal Jones fractures were evaluated. The mean time recommended for orthosis treatment was 6.04 (SD 0.04) weeks. While the majority of protocols showed a trend towards increased weight bearing and increased ROM over time, the best consensus was noted for weight bearing recommendations. Our study shows that there exists a huge variability in rehabilitation of fractures of the ankle-, hind- and midfoot. This may be contributed to a lack of consensus (e.g. missing publication of guidelines), individualized patient care (e.g. in fragility fractures) or lack of specialization. This study might serve as basis for prospective randomized controlled trials in order to optimize rehabilitation for these common fractures. Copyright © 2015 Elsevier Ltd

  6. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  7. Implementation of a Rapid, Protocol-based TIA Management Pathway.

    Science.gov (United States)

    Jarhult, Susann J; Howell, Melissa L; Barnaure-Nachbar, Isabelle; Chang, Yuchiao; White, Benjamin A; Amatangelo, Mary; Brown, David F; Singhal, Aneesh B; Schwamm, Lee H; Silverman, Scott B; Goldstein, Joshua N

    2018-03-01

    Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED) with symptoms of transient ischemic attack (TIA). We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6-12 months after implementation. Outcomes included ED length of stay (LOS), hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18). Following the intervention, the inpatient admission rate decreased from 62% to 24% (pTIA among those with final diagnosis of TIA was 3% for both periods. Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  8. Subtypes of Benign Breast Disease as a Risk Factor for Breast Cancer: A Systematic Review and Meta-Analysis Protocol

    Directory of Open Access Journals (Sweden)

    Manoosh Zendehdel

    2018-01-01

    Full Text Available Breast cancer is a multifactorial disease. Benign breast disease (BBD is one of the most important risk factors for breast cancer. The etiology of BBD is unknown. It is divided into nonproliferative and proliferative diseases. The selection of studies will be based on titles, abstract screening, inclusion and exclusion criteria, and quality assessment. Previous studies have shown that all types of BBD increase the risk of breast cancer, but the risk degree is different for each one. Accurate risk estimation of breast cancer in each category can be very important for proper clinical management. This systematic review and meta-analysis will be conducted on observational studies (traditional case control, nested case control, case cohort, and cohort published in the Web of Science (ISI, PubMed (MEDLINE, Scopus, Google Scholar, and the key journals of this field such as Breast Cancer Research and Treatment and Cancer Research from January 2000 to June 2015. Reference lists and gray literature will be reviewed too. All the initial retrievals will be performed by 2 researchers independently. The data extraction form will consist of general information concerning the studies, study eligibility, method, risk of bias assessment, and results—including odds ratios, risk ratios, rate ratios, and hazard ratios. The PRISMA and MOOSE guidelines will be used to report our findings. Registration Details: PROSPERO-42016035243

  9. Subtypes of Benign Breast Disease as a Risk Factor for Breast Cancer: A Systematic Review and Meta-Analysis Protocol.

    Science.gov (United States)

    Zendehdel, Manoosh; Niakan, Babak; Keshtkar, Abbasali; Rafiei, Elahe; Salamat, Fatemeh

    2018-01-01

    Breast cancer is a multifactorial disease. Benign breast disease (BBD) is one of the most important risk factors for breast cancer. The etiology of BBD is unknown. It is divided into nonproliferative and proliferative diseases. The selection of studies will be based on titles, abstract screening, inclusion and exclusion criteria, and quality assessment. Previous studies have shown that all types of BBD increase the risk of breast cancer, but the risk degree is different for each one. Accurate risk estimation of breast cancer in each category can be very important for proper clinical management. This systematic review and meta-analysis will be conducted on observational studies (traditional case control, nested case control, case cohort, and cohort) published in the Web of Science (ISI), PubMed (MEDLINE), Scopus, Google Scholar, and the key journals of this field such as Breast Cancer Research and Treatment and Cancer Research from January 2000 to June 2015. Reference lists and gray literature will be reviewed too. All the initial retrievals will be performed by 2 researchers independently. The data extraction form will consist of general information concerning the studies, study eligibility, method, risk of bias assessment, and results-including odds ratios, risk ratios, rate ratios, and hazard ratios. The PRISMA and MOOSE guidelines will be used to report our findings. Registration Details: PROSPERO-42016035243.

  10. Safe application of a restrictive transfusion protocol in moderate-risk patients undergoing cardiac operations.

    Science.gov (United States)

    Song, Howard K; von Heymann, Christian; Jespersen, Christian M; Karkouti, Keyvan; Korte, Wolfgang; Levy, Jerrold H; Ranucci, Marco; Saugstrup, Trine; Sellke, Frank W

    2014-05-01

    Perioperative red blood cell transfusion is associated with adverse outcomes after cardiac operations. Although restrictive transfusion protocols have been developed, their safety and efficacy are not well demonstrated, and considerable variation in transfusion practice persists. We report our experience with a restrictive transfusion protocol. We analyzed the outcomes in 409 patients undergoing cardiac operations enrolled in a trial conducted at 30 centers worldwide. Blood products were administered on the basis of a transfusion algorithm applied across all centers, with a restrictive transfusion trigger of hemoglobin less than or equal to 6 g/dL. Transfusion was acceptable but not mandatory for hemoglobin 6 to 8 g/dL. For hemoglobin 8 to 10 g/dL, transfusion was acceptable only with evidence for end-organ ischemia. The patient population was moderately complex, with 20.5% having combined procedures and 29.6% having nonelective operations. The mean EuroSCORE for the population was 4.3, which predicted a substantial incidence of morbidity and mortality. Actual outcomes were excellent, with observed mortality of 0.49% and rates of cerebrovascular accident, myocardial infarction, and acute renal failure 1.2%, 6.1%, and 0.98%, respectively. The frequency of red blood cell transfusion was 33.7%, which varied significantly by center. Most transfusions (71.9%) were administered for hemoglobin 6 to 8 g/dL; 21.4% were administered for hemoglobin 8 to 10 g/dL with evidence for end-organ ischemia; 65.0% of patients avoided allogeneic transfusion altogether. A restrictive transfusion protocol can be safely applied in the care of moderate-risk patients undergoing cardiac operations. This strategy has significant potential to reduce transfusion and resource utilization in these patients, standardize transfusion practices across institutions, and increase the safety of cardiac operations. Copyright © 2014 The Society of Thoracic Surgeons. Published by Elsevier Inc. All rights

  11. TH-C-18A-08: A Management Tool for CT Dose Monitoring, Analysis, and Protocol Review

    International Nuclear Information System (INIS)

    Wang, J; Chan, F; Newman, B; Larson, D; Leung, A; Fleischmann, D; Molvin, L; Marsh, D; Zorich, C; Phillips, L

    2014-01-01

    Purpose: To develop a customizable tool for enterprise-wide managing of CT protocols and analyzing radiation dose information of CT exams for a variety of quality control applications Methods: All clinical CT protocols implemented on the 11 CT scanners at our institution were extracted in digital format. The original protocols had been preset by our CT management team. A commercial CT dose tracking software (DoseWatch,GE healthcare,WI) was used to collect exam information (exam date, patient age etc.), scanning parameters, and radiation doses for all CT exams. We developed a Matlab-based program (MathWorks,MA) with graphic user interface which allows to analyze the scanning protocols with the actual dose estimates, and compare the data to national (ACR,AAPM) and internal reference values for CT quality control. Results: The CT protocol review portion of our tool allows the user to look up the scanning and image reconstruction parameters of any protocol on any of the installed CT systems among about 120 protocols per scanner. In the dose analysis tool, dose information of all CT exams (from 05/2013 to 02/2014) was stratified on a protocol level, and within a protocol down to series level, i.e. each individual exposure event. This allows numerical and graphical review of dose information of any combination of scanner models, protocols and series. The key functions of the tool include: statistics of CTDI, DLP and SSDE, dose monitoring using user-set CTDI/DLP/SSDE thresholds, look-up of any CT exam dose data, and CT protocol review. Conclusion: our inhouse CT management tool provides radiologists, technologists and administration a first-hand near real-time enterprise-wide knowledge on CT dose levels of different exam types. Medical physicists use this tool to manage CT protocols, compare and optimize dose levels across different scanner models. It provides technologists feedback on CT scanning operation, and knowledge on important dose baselines and thresholds

  12. Environmental risk analysis

    International Nuclear Information System (INIS)

    Lima-e-Silva, Pedro Paulo de

    1996-01-01

    The conventional Risk Analysis (RA) relates usually a certain undesired event frequency with its consequences. Such technique is used nowadays in Brazil to analyze accidents and their consequences strictly under the human approach, valuing loss of human equipment, human structures and human lives, without considering the damage caused to natural resources that keep life possible on Earth. This paradigm was developed primarily because of the Homo sapiens' lack of perception upon the natural web needed to sustain his own life. In reality, the Brazilian professionals responsible today for licensing, auditing and inspecting environmental aspects of human activities face huge difficulties in making technical specifications and procedures leading to acceptable levels of impact, furthermore considering the intrinsic difficulties to define those levels. Therefore, in Brazil the RA technique is a weak tool for licensing for many reasons, and of them are its short scope (only accident considerations) and wrong a paradigm (only human direct damages). A paper from the author about the former was already proposed to the 7th International Conference on Environmetrics, past July'96, USP-SP. This one discusses the extension of the risk analysis concept to take into account environmental consequences, transforming the conventional analysis into a broader methodology named here as Environmental Risk Analysis. (author)

  13. Pharmacotherapies for fatigue in chronic liver disease (CLD): a systematic review and meta-analysis (protocol).

    Science.gov (United States)

    Effiong, Andem; Kumari, Prerna

    2018-02-14

    This is the protocol for a systematic review (and meta-analysis) of an intervention. The primary objective of this systematic review will be to assess the benefits and harms of pharmacological therapies (pharmacotherapies) for the management of fatigue in adults with CLD of any etiology. The effects of pharmacological therapies on fatigue in CLD will be compared against those of placebo, no intervention, or non-pharmacological interventions. Specifically, this review will examine whether pharmacological therapies improve CLD-associated fatigue, and if they do, what key elements are associated with their effectiveness. The results of this systematic review will assist clinicians, policy-makers, researchers, and people with CLD in decision-making on how best to manage fatigue and its associated symptoms. MEDLINE, SCOPUS, EMBASE, EU Clinical Trials Register, WHO International Clinical Trials Registry Platform, CENTRAL (The Cochrane Library), ClinicalTrials.gov, reference lists of articles and conference proceedings will be searched for relevant studies. No language or date restrictions will be applied. Eligible studies will include adults with CLD of any etiology. Included studies will be randomized controlled trials. From included studies, data on participant characteristics, study design, setting, research ethics compliance, and intervention outcomes will be extracted. Risk of bias in included studies will be assessed using the Cochrane Risk of Bias Tool. A random-effects meta-analysis will be conducted. If substantial or considerable levels of heterogeneity are detected, analysis will be limited to a narrative synthesis. This systematic review will examine the effectiveness of pharmacological therapies on fatigue reduction in people with CLD. Such therapies may be more effective than non-pharmacological interventions in treating fatigue symptoms in CLD. Evidence derived from the findings of this study will guide future practice, policy, and research. PROSPERO, CRD

  14. A problem-solving intervention for cardiovascular disease risk reduction in veterans: Protocol for a randomized controlled trial.

    Science.gov (United States)

    Nieuwsma, Jason A; Wray, Laura O; Voils, Corrine I; Gierisch, Jennifer M; Dundon, Margaret; Coffman, Cynthia J; Jackson, George L; Merwin, Rhonda; Vair, Christina; Juntilla, Karen; White-Clark, Courtney; Jeffreys, Amy S; Harris, Amy; Owings, Michael; Marr, Johnpatrick; Edelman, David

    2017-09-01

    Health behaviors related to diet, tobacco usage, physical activity, medication adherence, and alcohol use are highly determinative of risk for developing cardiovascular disease. This paper describes a study protocol to evaluate a problem-solving intervention that aims to help patients at risk for developing cardiovascular disease address barriers to adopting positive health behaviors in order to reduce cardiovascular risk. Eligible patients are adults enrolled in Veterans Affairs (VA) health care who have not experienced a cardiovascular event but are at elevated risk based on their Framingham Risk Score (FRS). Participants in this two-site study are randomized to either the intervention or care as usual, with a target of 400 participants. The study intervention, Healthy Living Problem-Solving (HELPS), consists of six group sessions conducted approximately monthly interspersed with individualized coaching calls to help participants apply problem-solving principles. The primary outcome is FRS, analyzed at the beginning and end of the study intervention (6months). Participants also complete measures of physical activity, caloric intake, self-efficacy, group cohesion, problem-solving capacities, and demographic characteristics. Results of this trial will inform behavioral interventions to change health behaviors in those at risk for cardiovascular disease and other health conditions. ClinicalTrials.gov identifier NCT01838226. Published by Elsevier Inc.

  15. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature...... of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a process algebra model and deriving from this process models analysable by the Imperial PEPA Compiler and the LySatool....

  16. Modelling and analysis of distributed simulation protocols with distributed graph transformation

    OpenAIRE

    Lara, Juan de; Taentzer, Gabriele

    2005-01-01

    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. J. de Lara, and G. Taentzer, "Modelling and analysis of distributed simulation protocols with distributed graph transformation...

  17. Component of the risk analysis

    International Nuclear Information System (INIS)

    Martinez, I.; Campon, G.

    2013-01-01

    The power point presentation reviews issues like analysis of risk (Codex), management risk, preliminary activities manager, relationship between government and industries, microbiological danger and communication of risk

  18. Credit Risk Evaluation : Modeling - Analysis - Management

    OpenAIRE

    Wehrspohn, Uwe

    2002-01-01

    An analysis and further development of the building blocks of modern credit risk management: -Definitions of default -Estimation of default probabilities -Exposures -Recovery Rates -Pricing -Concepts of portfolio dependence -Time horizons for risk calculations -Quantification of portfolio risk -Estimation of risk measures -Portfolio analysis and portfolio improvement -Evaluation and comparison of credit risk models -Analytic portfolio loss distributions The thesis contributes to the evaluatio...

  19. Performance analysis of simultaneous dense coding protocol under decoherence

    Science.gov (United States)

    Huang, Zhiming; Zhang, Cai; Situ, Haozhen

    2017-09-01

    The simultaneous dense coding (SDC) protocol is useful in designing quantum protocols. We analyze the performance of the SDC protocol under the influence of noisy quantum channels. Six kinds of paradigmatic Markovian noise along with one kind of non-Markovian noise are considered. The joint success probability of both receivers and the success probabilities of one receiver are calculated for three different locking operators. Some interesting properties have been found, such as invariance and symmetry. Among the three locking operators we consider, the SWAP gate is most resistant to noise and results in the same success probabilities for both receivers.

  20. A critical analysis of a locally agreed protocol for clinical practice

    International Nuclear Information System (INIS)

    Owen, A.; Hogg, P.; Nightingale, J.

    2004-01-01

    Within the traditional scope of radiographic practice (including advanced practice) there is a need to demonstrate effective patient care and management. Such practice should be set within a context of appropriate evidence and should also reflect peer practice. In order to achieve such practice the use of protocols is encouraged. Effective protocols can maximise care and management by minimising inter- and intra-professional variation; they can also allow for detailed procedural records to be kept in case of legal claims. However, whilst literature exists to encourage the use of protocols there is little published material available to indicate how to create, manage and archive them. This article uses an analytical approach to propose a suitable method for protocol creation and archival, it also offers suggestions on the scope and content of a protocol. To achieve this an existing clinical protocol for radiographer reporting barium enemas is analysed to draw out the general issues. Proposals for protocol creation, management, and archival were identified. The clinical practice described or inferred in the protocol should be drawn from evidence, such evidence could include peer-reviewed material, national standards and peer practice. The protocol should include an explanation of how to proceed when the radiographers reach the limit of their ability. It should refer to the initial training required to undertake the clinical duties as well as the on-going continual professional updating required to maintain competence. Audit of practice should be indicated, including the preferred audit methodology, and associated with this should be a clear statement about standards and what to do if standards are not adequately met. Protocols should be archived, in a paper-based form, for lengthy periods in case of legal claims. On the archived protocol the date it was in clinical use should be included

  1. Organ donation in the ICU: A document analysis of institutional policies, protocols, and order sets.

    Science.gov (United States)

    Oczkowski, Simon J W; Centofanti, John E; Durepos, Pamela; Arseneau, Erika; Kelecevic, Julija; Cook, Deborah J; Meade, Maureen O

    2018-04-01

    To better understand how local policies influence organ donation rates. We conducted a document analysis of our ICU organ donation policies, protocols and order sets. We used a systematic search of our institution's policy library to identify documents related to organ donation. We used Mindnode software to create a publication timeline, basic statistics to describe document characteristics, and qualitative content analysis to extract document themes. Documents were retrieved from Hamilton Health Sciences, an academic hospital system with a high volume of organ donation, from database inception to October 2015. We retrieved 12 active organ donation documents, including six protocols, two policies, two order sets, and two unclassified documents, a majority (75%) after the introduction of donation after circulatory death in 2006. Four major themes emerged: organ donation process, quality of care, patient and family-centred care, and the role of the institution. These themes indicate areas where documented institutional standards may be beneficial. Further research is necessary to determine the relationship of local policies, protocols, and order sets to actual organ donation practices, and to identify barriers and facilitators to improving donation rates. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Risk Analysis in Road Tunnels – Most Important Risk Indicators

    DEFF Research Database (Denmark)

    Berchtold, Florian; Knaust, Christian; Thöns, Sebastian

    2016-01-01

    Methodologies on fire risk analysis in road tunnels consider numerous factors affecting risks (risk indicators) and express the results by risk measures. But only few comprehensive studies on effects of risk indicators on risk measures are available. For this reason, this study quantifies...... the effects and highlights the most important risk indicators with the aim to support further developments in risk analysis. Therefore, a system model of a road tunnel was developed to determine the risk measures. The system model can be divided into three parts: the fire part connected to the fire model Fire...... Dynamics Simulator (FDS); the evacuation part connected to the evacuation model FDS+Evac; and the frequency part connected to a model to calculate the frequency of fires. This study shows that the parts of the system model (and their most important risk indicators) affect the risk measures in the following...

  3. Risk analysis in radiosurgery treatments using risk matrices

    International Nuclear Information System (INIS)

    Delgado, J. M.; Sanchez Cayela, C.; Ramirez, M. L.; Perez, A.

    2011-01-01

    The aim of this study is the risk analysis process stereotactic single-dose radiotherapy and evaluation of those initiating events that lead to increased risk and a possible solution in the design of barriers.

  4. Design and analysis of communication protocols for quantum repeater networks

    International Nuclear Information System (INIS)

    Jones, Cody; Kim, Danny; Rakher, Matthew T; Ladd, Thaddeus D; Kwiat, Paul G

    2016-01-01

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on entanglement-distribution rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol (‘MidpointSource’) delivers the highest entanglement-distribution rate for typical cases where there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network. (paper)

  5. Performance Analysis of Secure and Private Billing Protocols for Smart Metering

    Directory of Open Access Journals (Sweden)

    Tom Eccles

    2017-11-01

    Full Text Available Traditional utility metering is to be replaced by smart metering. Smart metering enables fine-grained utility consumption measurements. These fine-grained measurements raise privacy concerns due to the lifestyle information which can be inferred from the precise time at which utilities were consumed. This paper outlines and compares two privacy-respecting time of use billing protocols for smart metering and investigates their performance on a variety of hardware. These protocols protect the privacy of customers by never transmitting the fine-grained utility readings outside of the customer’s home network. One protocol favors complexity on the trusted smart meter hardware while the other uses homomorphic commitments to offload computation to a third device. Both protocols are designed to operate on top of existing cryptographic secure channel protocols in place on smart meters. Proof of concept software implementations of these protocols have been written and their suitability for real world application to low-performance smart meter hardware is discussed. These protocols may also have application to other privacy conscious aggregation systems, such as electronic voting.

  6. Risk analysis of Odelouca cofferdam

    OpenAIRE

    Pimenta, L.; Caldeira, L.; Maranha das Neves, E.

    2009-01-01

    In this paper we present the risk analysis of Odelouca Cofferdam, using an event tree analysis. The initializing events, failure modes and analysed limit states are discussed based on an influence diagram. The constructed event trees and their interpretation are presented. The obtained risk values are represented in an FN plot superimposed to the acceptability and tolerability risk limits proposed for Portuguese dams. Initially, particular emphasis is placed on the main characteristic...

  7. UV Impacts Avoided by the Montreal Protocol

    Science.gov (United States)

    Newman, Paul; McKenzie, Richard

    2010-01-01

    Temporal and geographical variabilities in the future "World Expected" UV environment are compared with the "World Avoided", which would have occurred without the Montreal Protocol on protection of the ozone layer and its subsequent amendments and adjustments. Based on calculations of clear-sky UV irradiances, the effects of the Montreal Protocol have been hugely beneficial to avoid the health risks, such as skin cancer, which are associated with high UV, while there is only a small increase in health risks, such as vitamin D deficiency, that are associated with low UV. However, interactions with climate change may lead to changes in cloud and albedo, and possibly behavioural changes which could also be important.

  8. Enhanced Recovery After Surgery Protocols in Major Urologic Surgery

    Directory of Open Access Journals (Sweden)

    Natalija Vukovic

    2018-04-01

    Full Text Available The purpose of the reviewThe analysis of the components of enhanced recovery after surgery (ERAS protocols in urologic surgery.Recent findingsERAS protocols has been studied for over 20 years in different surgical procedures, mostly in colorectal surgery. The concept of improving patient care and reducing postoperative complications was also applied to major urologic surgery and especially procedure of radical cystectomy. This procedure is technically challenging, due to a major surgical resection and high postoperative complication rate that may reach 65%. Several clinical pathways were introduced to improve perioperative course and reduce the length of hospital stay. These protocols differ from ERAS modalities in other surgeries. The reasons for this are longer operative time, increased risk of perioperative transfusion and infection, and urinary diversion achieved using transposed intestinal segments. Previous studies in this area analyzed the need for mechanical bowel preparation, postoperative nasogastric tube decompression, as well as the duration of urinary drainage. Furthermore, the attention has also been drawn to perioperative fluid optimization, pain management, and bowel function.SummaryNotwithstanding partial resemblance between the pathways in major urologic surgery and other pelvic surgeries, there are still scarce guidelines for ERAS protocols in urology, which is why further studies should assess the importance of preoperative medical optimization, implementation of thoracic epidural anesthesia and analgesia, and perioperative nutritional management.

  9. A simple protocol for NMR analysis of the enantiomeric purity of chiral hydroxylamines.

    Science.gov (United States)

    Tickell, David A; Mahon, Mary F; Bull, Steven D; James, Tony D

    2013-02-15

    A practically simple three-component chiral derivatization protocol for determining the enantiopurity of chiral hydroxylamines by (1)H NMR spectroscopic analysis is described, involving their treatment with 2-formylphenylboronic acid and enantiopure BINOL to afford a mixture of diastereomeric nitrono-boronate esters whose ratio is an accurate reflection of the enantiopurity of the parent hydroxylamine.

  10. Fall risk assessment: retrospective analysis of Morse Fall Scale scores in Portuguese hospitalized adult patients.

    Science.gov (United States)

    Sardo, Pedro Miguel Garcez; Simões, Cláudia Sofia Oliveira; Alvarelhão, José Joaquim Marques; Simões, João Filipe Fernandes Lindo; Melo, Elsa Maria de Oliveira Pinheiro de

    2016-08-01

    The Morse Fall Scale is used in several care settings for fall risk assessment and supports the implementation of preventive nursing interventions. Our work aims to analyze the Morse Fall Scale scores of Portuguese hospitalized adult patients in association with their characteristics, diagnoses and length of stay. Retrospective cohort analysis of Morse Fall Scale scores of 8356 patients hospitalized during 2012. Data were associated to age, gender, type of admission, specialty units, length of stay, patient discharge, and ICD-9 diagnosis. Elderly patients, female, with emergency service admission, at medical units and/or with longer length of stays were more frequently included in the risk group for falls. ICD-9 diagnosis may also be an important risk factor. More than a half of hospitalized patients had "medium" to "high" risk of falling during the length of stay, which determines the implementation and maintenance of protocoled preventive nursing interventions throughout hospitalization. There are several fall risk factors not assessed by Morse Fall Scale. There were no statistical differences in Morse Fall Scale score between the first and the last assessment. Copyright © 2015 Elsevier Inc. All rights reserved.

  11. Generalized indices for radiation risk analysis

    International Nuclear Information System (INIS)

    Bykov, A.A.; Demin, V.F.

    1989-01-01

    A new approach to ensuring nuclear safety has begun forming since the early eighties. The approach based on the probabilistic safety analysis, the principles of acceptable risk, the optimization of safety measures, etc. has forced a complex of adequate quantitative methods of assessment, safety analysis and risk management to be developed. The method of radiation risk assessment and analysis hold a prominent place in the complex. National and international research and regulatory organizations ICRP, IAEA, WHO, UNSCEAR, OECD/NEA have given much attention to the development of the conceptual and methodological basis of those methods. Some resolutions of the National Commission of Radiological Protection (NCRP) and the Problem Commission on Radiation Hygiene of the USSR Ministry of Health should be also noted. Both CBA (cost benefit analysis) and other methods of radiation risk analysis and safety management use a system of natural and socio-economic indices characterizing the radiation risk or damage. There exist a number of problems associated with the introduction, justification and use of these indices. For example, the price, a, of radiation damage, or collective dose unit, is a noteworthy index. The difficulties in its qualitative and quantitative determination are still an obstacle for a wide application of CBA to the radiation risk analysis and management. During recent 10-15 years these problems have been a subject of consideration for many authors. The present paper also considers the issues of the qualitative and quantitative justification of the indices of radiation risk analysis

  12. The evaluation of MRI protocols for the quantification of adiposity in the obese

    International Nuclear Information System (INIS)

    Tagami, Hirotaka; Taki, Tomomi; Ueoro, Kouichi

    1998-01-01

    Obesity is a recognized risk factor for the development of diseases such as atherosclerosis, diabetes mellitus and hypertension. The individual risk of the obesity can not be evaluated merely by the body weight or body mass index. The fat distribution is a key to evaluate it. So far, the MRI protocols in the literature tested for the evaluation of the fat distribution were spin-echo and inversion-recovery images. We tested both protocols and couldn't get good images basically due to motion artifacts. Therefore, the field-echo (FE) protocol, a rapid scan protocol, was evaluated. The transverse fat distributions at umbilical level of 8 male obese volunteers were examined with MRI FE protocol and X-ray computed tomography (CT). The excellent images were obtained with FE protocol and correlation with CT images was also satisfactory. The FE protocols for the evaluation of the fat distribution is of use and reasonable tool for the clinical usage. (author)

  13. Comparative Analysis of Different Protocols to Manage Large Scale Networks

    OpenAIRE

    Anil Rao Pimplapure; Dr Jayant Dubey; Prashant Sen

    2013-01-01

    In recent year the numbers, complexity and size is increased in Large Scale Network. The best example of Large Scale Network is Internet, and recently once are Data-centers in Cloud Environment. In this process, involvement of several management tasks such as traffic monitoring, security and performance optimization is big task for Network Administrator. This research reports study the different protocols i.e. conventional protocols like Simple Network Management Protocol and newly Gossip bas...

  14. Performance analysis of signaling protocols on OBS switches

    Science.gov (United States)

    Kirci, Pinar; Zaim, A. Halim

    2005-10-01

    In this paper, Just-In-Time (JIT), Just-Enough-Time (JET) and Horizon signalling schemes for Optical Burst Switched Networks (OBS) are presented. These signaling schemes run over a core dWDM network and a network architecture based on Optical Burst Switches (OBS) is proposed to support IP, ATM and Burst traffic. In IP and ATM traffic several packets are assembled in a single packet called burst and the burst contention is handled by burst dropping. The burst length distribution in IP traffic is arbitrary between 0 and 1, and is fixed in ATM traffic at 0,5. Burst traffic on the other hand is arbitrary between 1 and 5. The Setup and Setup ack length distributions are arbitrary. We apply the Poisson model with rate λ and Self-Similar model with pareto distribution rate α to identify inter-arrival times in these protocols. We consider a communication between a source client node and a destination client node over an ingress and one or more multiple intermediate switches.We use buffering only in the ingress node. The communication is based on single burst connections in which, the connection is set up just before sending a burst and then closed as soon as the burst is sent. Our analysis accounts for several important parameters, including the burst setup, burst setup ack, keepalive messages and the optical switching protocol. We compare the performance of the three signalling schemes on the network under as burst dropping probability under a range of network scenarios.

  15. Reliability and validity of risk analysis

    International Nuclear Information System (INIS)

    Aven, Terje; Heide, Bjornar

    2009-01-01

    In this paper we investigate to what extent risk analysis meets the scientific quality requirements of reliability and validity. We distinguish between two types of approaches within risk analysis, relative frequency-based approaches and Bayesian approaches. The former category includes both traditional statistical inference methods and the so-called probability of frequency approach. Depending on the risk analysis approach, the aim of the analysis is different, the results are presented in different ways and consequently the meaning of the concepts reliability and validity are not the same.

  16. Safety analysis, risk assessment, and risk acceptance criteria

    International Nuclear Information System (INIS)

    Jamali, K.

    1997-01-01

    This paper discusses a number of topics that relate safety analysis as documented in the Department of Energy (DOE) safety analysis reports (SARs), probabilistic risk assessments (PRA) as characterized primarily in the context of the techniques that have assumed some level of formality in commercial nuclear power plant applications, and risk acceptance criteria as an outgrowth of PRA applications. DOE SARs of interest are those that are prepared for DOE facilities under DOE Order 5480.23 and the implementing guidance in DOE STD-3009-94. It must be noted that the primary area of application for DOE STD-3009 is existing DOE facilities and that certain modifications of the STD-3009 approach are necessary in SARs for new facilities. Moreover, it is the hazard analysis (HA) and accident analysis (AA) portions of these SARs that are relevant to the present discussions. Although PRAs can be qualitative in nature, PRA as used in this paper refers more generally to all quantitative risk assessments and their underlying methods. HA as used in this paper refers more generally to all qualitative risk assessments and their underlying methods that have been in use in hazardous facilities other than nuclear power plants. This discussion includes both quantitative and qualitative risk assessment methods. PRA has been used, improved, developed, and refined since the Reactor Safety Study (WASH-1400) was published in 1975 by the Nuclear Regulatory Commission (NRC). Much debate has ensued since WASH-1400 on exactly what the role of PRA should be in plant design, reactor licensing, 'ensuring' plant and process safety, and a large number of other decisions that must be made for potentially hazardous activities. Of particular interest in this area is whether the risks quantified using PRA should be compared with numerical risk acceptance criteria (RACs) to determine whether a facility is 'safe.' Use of RACs requires quantitative estimates of consequence frequency and magnitude

  17. A background to risk analysis. Vol. 2

    International Nuclear Information System (INIS)

    Taylor, J.R.

    1979-01-01

    This 4-volumes report gives a background of ideas, principles and examples which might be of use in developing practical methods for risk analysis. Some of the risk analysis techniques described are somewhat experimental. The report is written in an introductory style, but where some point needs further justification or evaluation, this is given in the form of a chapter appendix. In this way, it is hoped that the report can serve two purposes, - as a basis for starting risk analysis work and as a basis for discussing effectiveness of risk analysis procedures. The report should be seen as a preliminary stage, prior to a program of industrial trials of risk analysis methods. Vol. 2 treats generic methods of qualitative failure analysis. (BP)

  18. Information Security Risk Analysis

    CERN Document Server

    Peltier, Thomas R

    2010-01-01

    Offers readers with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment. This title demonstrates how to identify threats and then determine if those threats pose a real risk. It is suitable for industry and academia professionals.

  19. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  20. Developing pipeline risk methodology for environmental license permit; Metodologia para avaliacao do risco em dutos, no licenciamento ambiental

    Energy Technology Data Exchange (ETDEWEB)

    Arruda, Paulo; Naime, Andre [Instituto Brasileiro do Meio Ambiente e dos Recursos Naturais Renovaveis (IBAMA), Brasilia, DF (Brazil). Diretoria de Licenciamento e Qualidade Ambiental; Serpa, Ricardo [Companhia de Tecnologia de Saneamento Ambiental (CETESB), Sao Paulo, SP (Brazil). Setor de Analise de Riscos; Mendes, Renato F. [PETROBRAS Engenharia, RJ (Brazil); Ventura, Gilmar [TRANSPETRO - PETROBRAS Transportes, Rio de Janeiro, RJ (Brazil)

    2005-07-01

    Some new pipelines undertakings aim to establish connection between gas provinces in the Southeast and consumers in the Northeast of Brazil, in order to supply medium consuming centers and regions with minor potential of development. Consulting companies are carrying out Environmental Assessments studies and among them is the Risk Analyses of these pipeline transmission systems, in order to receive environmental permits by IBAMA, the Federal Brazilian Environmental Agency. In addition, existing interstate pipeline systems which are under IBAMA regulation will also require the same attention. For the purpose of defining a Pipeline Risk Analysis Protocol with methodology and risk criteria, with minimum risk analysis information on a comprehensive process, it has been decided for a 'tour de force' formed by experts from IBAMA and PETROBRAS engineers. The risk assessment protocol is focus on the risk to communities in the neighborhood of these pipelines and on the potential damage to the environment near and far from the ROW. The joined work ended up in two protocols, which attempt to provide environmental license permits for oil pipeline and gas pipelines with minimum contents for risk analysis studies. Another aspect is the environmental risk that has been focused on the contingency plan approach, since there are no consolidated environmental risk criteria for application as a common worldwide sense. The environmental risk mapping - MARA methodology will indicate areas with potential to be affected by leakages along a pipeline system. (author)

  1. Optimization of oligonucleotide arrays and RNA amplification protocols for analysis of transcript structure and alternative splicing.

    Science.gov (United States)

    Castle, John; Garrett-Engele, Phil; Armour, Christopher D; Duenwald, Sven J; Loerch, Patrick M; Meyer, Michael R; Schadt, Eric E; Stoughton, Roland; Parrish, Mark L; Shoemaker, Daniel D; Johnson, Jason M

    2003-01-01

    Microarrays offer a high-resolution means for monitoring pre-mRNA splicing on a genomic scale. We have developed a novel, unbiased amplification protocol that permits labeling of entire transcripts. Also, hybridization conditions, probe characteristics, and analysis algorithms were optimized for detection of exons, exon-intron edges, and exon junctions. These optimized protocols can be used to detect small variations and isoform mixtures, map the tissue specificity of known human alternative isoforms, and provide a robust, scalable platform for high-throughput discovery of alternative splicing.

  2. Bias in risk-benefit analysis

    International Nuclear Information System (INIS)

    Mazur, A.

    1985-01-01

    Risk-benefit analysis has become popular in the past decade as a means of improving decision making, especially in the area of technology policy. Here risk-benefit analysis is compared to other (equally defensible) approaches to decision making, showing how it favors some political interests more than others, and suggesting why it has recently come to the fore as a tool of political analysis. A considerable portion of the discussion concerns nuclear power. 6 references

  3. Meta Salud Diabetes study protocol: a cluster-randomised trial to reduce cardiovascular risk among a diabetic population of Mexico.

    Science.gov (United States)

    Sabo, Samantha; Denman Champion, Catalina; Bell, Melanie L; Cornejo Vucovich, Elsa; Ingram, Maia; Valenica, Celina; Castro Vasquez, Maria Del Carmen; Gonzalez-Fagoaga, Eduardo; Geurnsey de Zapien, Jill; Rosales, Cecilia B

    2018-03-12

    Northern Mexico has among the highest rates of cardiovascular disease (CVD) and diabetes in the world. This research addresses core gaps in implementation science to develop, test and scale-up CVD risk-reduction interventions in diabetics through a national primary care health system. The Meta Salud Diabetes (MSD) research project is a parallel two-arm cluster-randomised clinical behavioural trial based in 22 (n=22) health centres in Sonora, Mexico. MSD aims to evaluate the effectiveness of the MSD intervention for the secondary prevention of CVD risk factors among a diabetic population (n=320) compared with the study control of usual care. The MSD intervention consists of 2-hour class sessions delivered over a 13-week period providing educational information to encourage sustainable behavioural change to prevent disease complications including the adoption of physical activity. MSD is delivered within the context of Mexico's national primary care health centre system by health professionals, including nurses, physicians and community health workers via existing social support groups for individuals diagnosed with chronic disease. Mixed models are used to estimate the effect of MSD by comparing cardiovascular risk, as measured by the Framingham Risk Score, between the trial arms. Secondary outcomes include hypertension, behavioural risk factors and psychosocial factors. This work is supported by the National Institutes of Health, National Heart Lung and Blood Institute (1R01HL125996-01) and approved by the University of Arizona Research Institutional Review Board (Protocol 1508040144) and the Research Bioethics Committee at the University of Sonora. The first Internal Review Board approval date was 31 August 2015 with five subsequent approved amendments. This article refers to protocol V.0.2, dated 30 January 2017. Results will be disseminated via peer-reviewed publication and presentation at international conferences and will be shared through meetings with health

  4. Analysis of Security Protocols for Mobile Healthcare.

    Science.gov (United States)

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  5. Overall risk estimation for nonreactor nuclear facilities and implementation of safety goals

    International Nuclear Information System (INIS)

    Kim, Kyo S.; Bradley, R.F.

    1992-01-01

    A typical safety analysis report (SAR) contains estimated frequencies and consequences of various design basis accident (DBA) analyses. However, the results are organized and presented in such a way that they are not conducive for summing up with mathematical rigor to give total or overall risk. This paper describes a simple protocol and mathematical formalism to derive overall risk indicators. These indicators provide some insight into the capability of confinement barriers with characteristics of source terms, and provide comparison to the Safety Goals. The protocol makes maximum use of the results of DBA analyses typically available from an SAR. The mathematical formalism is based on the cumulative complementary distribution function (CCDF) or exceedance probability of radioactivity release fraction and individual radiation dose. An example case analysis is presented to illustrate how to use the proposed protocol and mathematical formalism. A discussion of the result is also presented in terms of confinement characteristic and compliance to Safety Goals

  6. A background to risk analysis. Vol. 4

    International Nuclear Information System (INIS)

    Taylor, J.R.

    1979-01-01

    This 4-volumes report gives a background of ideas, principles, and examples which might be of use in developing practical methods for risk analysis. Some of the risk analysis techniques described are somewhat experimental. The report is written in an introductory style, but where some point needs further justification or evaluation, this is given in the form of a chapter appendix. In this way, it is hoped that the report can serve two purposes, - as a basis for starting risk analysis work and as a basis for discussing effectiveness of risk analysis procedures. The report should be seen as a preliminary stage, prior to a program of industrial trials of risk analysis methods. Vol. 4 treats human error in plant operation. (BP)

  7. Protocol Analysis of Group Problem Solving in Mathematics: A Cognitive-Metacognitive Framework for Assessment.

    Science.gov (United States)

    Artzt, Alice F.; Armour-Thomas, Eleanor

    The roles of cognition and metacognition were examined in the mathematical problem-solving behaviors of students as they worked in small groups. As an outcome, a framework that links the literature of cognitive science and mathematical problem solving was developed for protocol analysis of mathematical problem solving. Within this framework, each…

  8. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  9. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  10. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.......e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful...... in this direction is to extend saturation-based techniques so that enough state information can be modelled and analysed. Finally, we present a methodology for proving the same security properties in the computational model, by means of typing protocol implementations....

  11. Advancing Risk Analysis for Nanoscale Materials: Report from an International Workshop on the Role of Alternative Testing Strategies for Advancement.

    Science.gov (United States)

    Shatkin, J A; Ong, Kimberly J; Beaudrie, Christian; Clippinger, Amy J; Hendren, Christine Ogilvie; Haber, Lynne T; Hill, Myriam; Holden, Patricia; Kennedy, Alan J; Kim, Baram; MacDonell, Margaret; Powers, Christina M; Sharma, Monita; Sheremeta, Lorraine; Stone, Vicki; Sultan, Yasir; Turley, Audrey; White, Ronald H

    2016-08-01

    The Society for Risk Analysis (SRA) has a history of bringing thought leadership to topics of emerging risk. In September 2014, the SRA Emerging Nanoscale Materials Specialty Group convened an international workshop to examine the use of alternative testing strategies (ATS) for manufactured nanomaterials (NM) from a risk analysis perspective. Experts in NM environmental health and safety, human health, ecotoxicology, regulatory compliance, risk analysis, and ATS evaluated and discussed the state of the science for in vitro and other alternatives to traditional toxicology testing for NM. Based on this review, experts recommended immediate and near-term actions that would advance ATS use in NM risk assessment. Three focal areas-human health, ecological health, and exposure considerations-shaped deliberations about information needs, priorities, and the next steps required to increase confidence in and use of ATS in NM risk assessment. The deliberations revealed that ATS are now being used for screening, and that, in the near term, ATS could be developed for use in read-across or categorization decision making within certain regulatory frameworks. Participants recognized that leadership is required from within the scientific community to address basic challenges, including standardizing materials, protocols, techniques and reporting, and designing experiments relevant to real-world conditions, as well as coordination and sharing of large-scale collaborations and data. Experts agreed that it will be critical to include experimental parameters that can support the development of adverse outcome pathways. Numerous other insightful ideas for investment in ATS emerged throughout the discussions and are further highlighted in this article. © 2016 Society for Risk Analysis.

  12. Minimal intervention dentistry: part 3. Paediatric dental care--prevention and management protocols using caries risk assessment for infants and young children.

    Science.gov (United States)

    Ramos-Gomez, F J; Crystal, Y O; Domejean, S; Featherstone, J D B

    2012-11-01

    Recent increases in caries prevalence in young children throughout the world highlight the need for a simple but effective infant oral care programme. This programme needs to include a medical disease prevention management model with an early establishment of a dental home and a treatment approach based on individual patient risk. This article presents an updated approach with practical forms and tools based on the principles of caries management by risk assessment, CAMBRA. This method will aid the general practitioner to develop and maintain a comprehensive protocol adequate for infant and young children oral care visits. Perinatal oral health is vitally important in preventing early childhood caries (ECC) in young children. Providing dental treatment to expectant mothers and their young children in a 'dual parallel track' is an effective innovative strategy and an efficient practice builder. It promotes prevention rather than intervention, and this may be the best way to achieve long-lasting oral health for young patients. General dental practice can adopt easy protocols that will promote early preventive visits and anticipatory guidance/counselling rather than waiting for the need for restorative treatment.

  13. Analiza protokola kvaliteta usluga telekomunikacionih mreža / Analysis of quality of service protocols in telecommunication networks

    Directory of Open Access Journals (Sweden)

    Milojko Jevtović

    2003-05-01

    Full Text Available Protokoli kvaliteta usluga (Quality of Service - QoS sadašnjih i budućih telekomunikacionih mreža razvijeni su, pored ostalog, sa ciljem da podrže različite klase usluga (Class of Service - CoS komunikaciju u realnom vremenu, kao i prenos multimedijalnih poruka preko paketskih IP (Internet Protocol mreža. U raduje dat pregled karakteristika tih protokola i ocena njihovih konkretnih mogućnosti u obezbeđenju kvaliteta usluga unutar sistema ('s vrha do dna', tj. vertikalno u OSI arhitekturi kao i 'horizontalno' odnosno s kraja na kraj veze, tj. između izvora i odredišta. / Today's and future telecommunication networks must enable transmission throughout heterogeneous environment, using different Quality of Service protocols, Quality of Service protocols use a variety of complementary mechanisms to enable deterministic end-to-end different data delivery. The analysis of these protocols and their efficiency in providing QoS and CoS has been given in this paper.

  14. Treatment results of the Tokai-POSG 8610HR pilot protocol for children with high-risk acute lymphoblastic leukemia

    Energy Technology Data Exchange (ETDEWEB)

    Hongo, Teruaki; Inoue, Noriko [Hamamatsu Medical Univ., Shizuoka (Japan); Horibe, Keizo [and others

    1997-10-01

    We reported the treatment results of Tokai-POSG 8610HR pilot protocol for children with high-risk acute lymphoblastic leukemia (ALL). From Oct. 1986 to Jan. 1991, 43 eligible children were enrolled, who had one or more following high-risk factors: age{>=}10 years old, initial white blood cell count (WBC) of 50,000/{mu}l or more, and extramedullary leukemia. All patients received induction therapy consisting of vincristine, dexamethasone, cyclophosphamide and daunorubicin, followed by central nervous system prophylaxis by 24 Gy cranial irradiation, consolidation therapy and cyclic maintenance by multidrugs for 3 years after diagnosis. Complete remission was achieved in 39 patients. The 5-year event-free survival (EFS) rate was 72.6{+-}7.1%. The only factor of an adverse association with EFS was a initial WBC of 10,000/{mu}l or more (p=0.002) in the 24 patients who were 10 years old or over. The factors related to a negative survival were male gender (p=0.031) and an initial WBC of 10,000/{mu}l or more (p=0.0012) in 43 patients. The major toxicities of the therapy were pancreatitis and allergic reaction due to{sub L}-ASP administration, and growth hormone deficiency due to cranial irradiation. Tokai 8610HR pilot protocol was a promising regimen, but further intensive chemotherapy was needed for improvement or the prognosis of the older patients with high initial WBC greater than 10,000/{mu}l. (author)

  15. Treatment results of the Tokai-POSG 8610HR pilot protocol for children with high-risk acute lymphoblastic leukemia

    International Nuclear Information System (INIS)

    Hongo, Teruaki; Inoue, Noriko; Horibe, Keizo

    1997-01-01

    We reported the treatment results of Tokai-POSG 8610HR pilot protocol for children with high-risk acute lymphoblastic leukemia (ALL). From Oct. 1986 to Jan. 1991, 43 eligible children were enrolled, who had one or more following high-risk factors: age≥10 years old, initial white blood cell count (WBC) of 50,000/μl or more, and extramedullary leukemia. All patients received induction therapy consisting of vincristine, dexamethasone, cyclophosphamide and daunorubicin, followed by central nervous system prophylaxis by 24 Gy cranial irradiation, consolidation therapy and cyclic maintenance by multidrugs for 3 years after diagnosis. Complete remission was achieved in 39 patients. The 5-year event-free survival (EFS) rate was 72.6±7.1%. The only factor of an adverse association with EFS was a initial WBC of 10,000/μl or more (p=0.002) in the 24 patients who were 10 years old or over. The factors related to a negative survival were male gender (p=0.031) and an initial WBC of 10,000/μl or more (p=0.0012) in 43 patients. The major toxicities of the therapy were pancreatitis and allergic reaction due to L -ASP administration, and growth hormone deficiency due to cranial irradiation. Tokai 8610HR pilot protocol was a promising regimen, but further intensive chemotherapy was needed for improvement or the prognosis of the older patients with high initial WBC greater than 10,000/μl. (author)

  16. The interventional effect of new drugs combined with the Stupp protocol on glioblastoma: A network meta-analysis.

    Science.gov (United States)

    Li, Mei; Song, Xiangqi; Zhu, Jun; Fu, Aijun; Li, Jianmin; Chen, Tong

    2017-08-01

    New therapeutic agents in combination with the standard Stupp protocol (a protocol about the temozolomide combined with radiotherapy treatment with glioblastoma was research by Stupp R in 2005) were assessed to evaluate whether they were superior to the Stupp protocol alone, to determine the optimum treatment regimen for patients with newly diagnosed glioblastoma. We implemented a search strategy to identify studies in the following databases: PubMed, Cochrane Library, EMBASE, CNKI, CBM, Wanfang, and VIP, and assessed the quality of extracted data from the trials included. Statistical software was used to perform network meta-analysis. The use of novel therapeutic agents in combination with the Stupp protocol were all shown to be superior than the Stupp protocol alone for the treatment of newly diagnosed glioblastoma, ranked as follows: cilengitide 2000mg/5/week, bevacizumab in combination with irinotecan, nimotuzumab, bevacizumab, cilengitide 2000mg/2/week, cytokine-induced killer cell immunotherapy, and the Stupp protocol. In terms of serious adverse effects, the intervention group showed a 29% increase in the incidence of adverse events compared with the control group (patients treated only with Stupp protocol) with a statistically significant difference (RR=1.29; 95%CI 1.17-1.43; P<0.001). The most common adverse events were thrombocytopenia, lymphopenia, neutropenia, pneumonia, nausea, and vomiting, none of which were significantly different between the groups except for neutropenia, pneumonia, and embolism. All intervention drugs evaluated in our study were superior to the Stupp protocol alone when used in combination with it. However, we could not conclusively confirm whether cilengitide 2000mg/5/week was the optimum regime, as only one trial using this protocol was included in our study. Copyright © 2017. Published by Elsevier B.V.

  17. Advances in probabilistic risk analysis

    International Nuclear Information System (INIS)

    Hardung von Hardung, H.

    1982-01-01

    Probabilistic risk analysis can now look back upon almost a quarter century of intensive development. The early studies, whose methods and results are still referred to occasionally, however, only permitted rough estimates to be made of the probabilities of recognizable accident scenarios, failing to provide a method which could have served as a reference base in calculating the overall risk associated with nuclear power plants. The first truly solid attempt was the Rasmussen Study and, partly based on it, the German Risk Study. In those studies, probabilistic risk analysis has been given a much more precise basis. However, new methodologies have been developed in the meantime, which allow much more informative risk studies to be carried out. They have been found to be valuable tools for management decisions with respect to backfitting, reinforcement and risk limitation. Today they are mainly applied by specialized private consultants and have already found widespread application especially in the USA. (orig.) [de

  18. WIPP fire hazards and risk analysis

    International Nuclear Information System (INIS)

    1991-05-01

    The purpose of this analysis was to conduct a fire hazards risk analysis of the Transuranic (TRU) contact-handled waste receipt, emplacement, and disposal activities at the Waste Isolation Pilot Plant (WIPP). The technical bases and safety envelope for these operations are defined in the approved WIPP Final Safety Analysis Report (FSAR). Although the safety documentation for the initial phase of the Test Program, the dry bin scale tests, has not yet been approved by the Department of Energy (DOE), reviews of the draft to date, including those by the Advisory Committee on Nuclear Facility Safety (ACNFS), have concluded that the dry bin scale tests present no significant risks in excess of those estimated in the approved WIPP FSAR. It is the opinion of the authors and reviewers of this analysis, based on sound engineering judgment and knowledge of the WIPP operations, that a Fire Hazards and Risk Analysis specific to the dry bin scale test program is not warranted prior to first waste receipt. This conclusion is further supported by the risk analysis presented in this document which demonstrates the level of risk to WIPP operations posed by fire to be extremely low. 15 refs., 41 figs., 48 tabs

  19. Factors that are associated with the risk of acquiring Plasmodium knowlesi malaria in Sabah, Malaysia: a case-control study protocol.

    Science.gov (United States)

    Grigg, M J; William, T; Drakeley, C J; Jelip, J; von Seidlein, L; Barber, B E; Fornace, K M; Anstey, N M; Yeo, T W; Cox, J

    2014-08-22

    Plasmodium knowlesi has long been present in Malaysia, and is now an emerging cause of zoonotic human malaria. Cases have been confirmed throughout South-East Asia where the ranges of its natural macaque hosts and Anopheles leucosphyrus group vectors overlap. The majority of cases are from Eastern Malaysia, with increasing total public health notifications despite a concurrent reduction in Plasmodium falciparum and P. vivax malaria. The public health implications are concerning given P. knowlesi has the highest risk of severe and fatal disease of all Plasmodium spp in Malaysia. Current patterns of risk and disease vary based on vector type and competence, with individual exposure risks related to forest and forest-edge activities still poorly defined. Clustering of cases has not yet been systematically evaluated despite reports of peri-domestic transmission and known vector competence for human-to-human transmission. A population-based case-control study will be conducted over a 2-year period at two adjacent districts in north-west Sabah, Malaysia. Confirmed malaria cases presenting to the district hospital sites meeting relevant inclusion criteria will be requested to enrol. Three community controls matched to the same village as the case will be selected randomly. Study procedures will include blood sampling and administration of household and individual questionnaires to evaluate potential exposure risks associated with acquisition of P. knowlesi malaria. Secondary outcomes will include differences in exposure variables between P. knowlesi and other Plasmodium spp, risk of severe P. knowlesi malaria, and evaluation of P. knowlesi case clustering. Primary analysis will be per protocol, with adjusted ORs for exposure risks between cases and controls calculated using conditional multiple logistic regression models. This study has been approved by the human research ethics committees of Malaysia, the Menzies School of Health Research, Australia, and the London

  20. A Protocol for the Comprehensive Flow Cytometric Analysis of Immune Cells in Normal and Inflamed Murine Non-Lymphoid Tissues

    Science.gov (United States)

    Yu, Yen-Rei A.; O’Koren, Emily G.; Hotten, Danielle F.; Kan, Matthew J.; Kopin, David; Nelson, Erik R.; Que, Loretta; Gunn, Michael D.

    2016-01-01

    Flow cytometry is used extensively to examine immune cells in non-lymphoid tissues. However, a method of flow cytometric analysis that is both comprehensive and widely applicable has not been described. We developed a protocol for the flow cytometric analysis of non-lymphoid tissues, including methods of tissue preparation, a 10-fluorochrome panel for cell staining, and a standardized gating strategy, that allows the simultaneous identification and quantification of all major immune cell types in a variety of normal and inflamed non-lymphoid tissues. We demonstrate that our basic protocol minimizes cell loss, reliably distinguishes macrophages from dendritic cells (DC), and identifies all major granulocytic and mononuclear phagocytic cell types. This protocol is able to accurately quantify 11 distinct immune cell types, including T cells, B cells, NK cells, neutrophils, eosinophils, inflammatory monocytes, resident monocytes, alveolar macrophages, resident/interstitial macrophages, CD11b- DC, and CD11b+ DC, in normal lung, heart, liver, kidney, intestine, skin, eyes, and mammary gland. We also characterized the expression patterns of several commonly used myeloid and macrophage markers. This basic protocol can be expanded to identify additional cell types such as mast cells, basophils, and plasmacytoid DC, or perform detailed phenotyping of specific cell types. In examining models of primary and metastatic mammary tumors, this protocol allowed the identification of several distinct tumor associated macrophage phenotypes, the appearance of which was highly specific to individual tumor cell lines. This protocol provides a valuable tool to examine immune cell repertoires and follow immune responses in a wide variety of tissues and experimental conditions. PMID:26938654

  1. Risk Characterization uncertainties associated description, sensitivity analysis

    International Nuclear Information System (INIS)

    Carrillo, M.; Tovar, M.; Alvarez, J.; Arraez, M.; Hordziejewicz, I.; Loreto, I.

    2013-01-01

    The power point presentation is about risks to the estimated levels of exposure, uncertainty and variability in the analysis, sensitivity analysis, risks from exposure to multiple substances, formulation of guidelines for carcinogenic and genotoxic compounds and risk subpopulations

  2. Advances in Risk Analysis with Big Data.

    Science.gov (United States)

    Choi, Tsan-Ming; Lambert, James H

    2017-08-01

    With cloud computing, Internet-of-things, wireless sensors, social media, fast storage and retrieval, etc., organizations and enterprises have access to unprecedented amounts and varieties of data. Current risk analysis methodology and applications are experiencing related advances and breakthroughs. For example, highway operations data are readily available, and making use of them reduces risks of traffic crashes and travel delays. Massive data of financial and enterprise systems support decision making under risk by individuals, industries, regulators, etc. In this introductory article, we first discuss the meaning of big data for risk analysis. We then examine recent advances in risk analysis with big data in several topic areas. For each area, we identify and introduce the relevant articles that are featured in the special issue. We conclude with a discussion on future research opportunities. © 2017 Society for Risk Analysis.

  3. Overcoming barriers to integrating economic analysis into risk assessment.

    Science.gov (United States)

    Hoffmann, Sandra

    2011-09-01

    Regulatory risk analysis is designed to provide decisionmakers with a clearer understanding of how policies are likely to affect risk. The systems that produce risk are biological, physical, and social and economic. As a result, risk analysis is an inherently interdisciplinary task. Yet in practice, risk analysis has been interdisciplinary in only limited ways. Risk analysis could provide more accurate assessments of risk if there were better integration of economics and other social sciences into risk assessment itself. This essay examines how discussions about risk analysis policy have influenced the roles of various disciplines in risk analysis. It explores ways in which integrated bio/physical-economic modeling could contribute to more accurate assessments of risk. It reviews examples of the kind of integrated economics-bio/physical modeling that could be used to enhance risk assessment. The essay ends with a discussion of institutional barriers to greater integration of economic modeling into risk assessment and provides suggestions on how these might be overcome. © 2011 Society for Risk Analysis.

  4. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  5. From human monocytes to genome-wide binding sites--a protocol for small amounts of blood: monocyte isolation/ChIP-protocol/library amplification/genome wide computational data analysis.

    Directory of Open Access Journals (Sweden)

    Sebastian Weiterer

    Full Text Available Chromatin immunoprecipitation in combination with a genome-wide analysis via high-throughput sequencing is the state of the art method to gain genome-wide representation of histone modification or transcription factor binding profiles. However, chromatin immunoprecipitation analysis in the context of human experimental samples is limited, especially in the case of blood cells. The typically extremely low yields of precipitated DNA are usually not compatible with library amplification for next generation sequencing. We developed a highly reproducible protocol to present a guideline from the first step of isolating monocytes from a blood sample to analyse the distribution of histone modifications in a genome-wide manner.The protocol describes the whole work flow from isolating monocytes from human blood samples followed by a high-sensitivity and small-scale chromatin immunoprecipitation assay with guidance for generating libraries compatible with next generation sequencing from small amounts of immunoprecipitated DNA.

  6. Maritime transportation risk analysis: Review and analysis in light of some foundational issues

    International Nuclear Information System (INIS)

    Goerlandt, Floris; Montewka, Jakub

    2015-01-01

    Many methods and applications for maritime transportation risk analysis have been presented in the literature. In parallel, there is a recent focus on foundational issues in risk analysis, with calls for intensified research on fundamental concepts and principles underlying the scientific field. This paper presents a review and analysis of risk definitions, perspectives and scientific approaches to risk analysis found in the maritime transportation application area, focusing on applications addressing accidental risk of shipping in a sea area. For this purpose, a classification of risk definitions, an overview of elements in risk perspectives and a classification of approaches to risk analysis science are applied. Results reveal that in the application area, risk is strongly tied to probability, both in definitions and perspectives, while alternative views exist. A diffuse situation is also found concerning the scientific approach to risk analysis, with realist, proceduralist and constructivist foundations co-existing. Realist approaches dominate the application area. Very few applications systematically account for uncertainty, neither concerning the evidence base nor in relation to the limitations of the risk model in relation to the space of possible outcomes. Some suggestions are made to improve the current situation, aiming to strengthen the scientific basis for risk analysis. - Highlights: • Risk analyses in maritime transportation analysed in light of foundational issues. • Focus on definitions, perspectives and scientific approaches to risk analysis. • Probability-based definitions and realist approaches dominate the field. • Findings support calls for increased focus on foundational issues in risk research. • Some suggestions are made to improve the current situation

  7. Suicide Risk Protocols: Addressing the Needs of High Risk Youths Identified through Suicide Prevention Efforts and in Clinical Settings

    Science.gov (United States)

    Heilbron, Nicole; Goldston, David; Walrath, Christine; Rodi, Michael; McKeon, Richard

    2013-01-01

    Several agencies have emphasized the importance of establishing clear protocols or procedures to address the needs of youths who are identified as suicidal through suicide prevention programs or in emergency department settings. What constitutes optimal guidelines for developing and implementing such protocols, however, is unclear. At the request…

  8. STOCHASTIC METHODS IN RISK ANALYSIS

    Directory of Open Access Journals (Sweden)

    Vladimíra OSADSKÁ

    2017-06-01

    Full Text Available In this paper, we review basic stochastic methods which can be used to extend state-of-the-art deterministic analytical methods for risk analysis. We can conclude that the standard deterministic analytical methods highly depend on the practical experience and knowledge of the evaluator and therefore, the stochastic methods should be introduced. The new risk analysis methods should consider the uncertainties in input values. We present how large is the impact on the results of the analysis solving practical example of FMECA with uncertainties modelled using Monte Carlo sampling.

  9. Risk factors for calcineurin inhibitor nephrotoxicity after renal transplantation: a systematic review and meta-analysis

    Directory of Open Access Journals (Sweden)

    Xia T

    2018-02-01

    Full Text Available Tianyi Xia, Sang Zhu, Yan Wen, Shouhong Gao, Mingming Li, Xia Tao, Feng Zhang, Wansheng Chen Department of Pharmacy, Changzheng Hospital, Second Military Medical University, Shanghai, People’s Republic of China Background: Nephrotoxicity of calcineurin inhibitors (CNIs is the major concern for long-term allograft survival despite its predominant role in current immunosuppressive regime after renal transplantation. CNI nephrotoxicity is multifactorial with demographic, environmental, and pharmacogenetic flexibility, whereas studies indicating risk factors for CNI nephrotoxicity obtained incomplete or conflicting results.Methods: A systematic review and meta-analysis of risk factors for CNI nephrotoxicity was performed on all retrieved studies through a comprehensive research of network database. Data were analyzed by Review Manager 5.2 with heterogeneity assessed using the Cochrane Q and I2 tests. CNI nephrotoxicity was primarily indicated with protocol biopsy or index-based clinical diagnosis, and the secondary outcome was defined as delayed graft function.Results: Twelve observational studies containing a total of 2,849 cases were identified. Donor age (odds ratio [OR], 1.01; 95% CI, 1.01–1.03; p=0.02, recipient zero-time arteriosclerosis (OR, 1.44; 95% CI, 1.04–1.99; p=0.03, and CYP3A5*3/*3 genotype (OR, 2.80; 95% CI, 2.63–2.98; p=0.00 were confirmed as risk factors for CNI nephrotoxicity. Subgroup and sensitivity analysis claimed donor age as a significant contributor in Asian and Caucasian areas.Conclusion: Older donor age, recipient zero-time arteriosclerosis, and CYP3A5*3/*3 genotype might add up the risk for CNI nephrotoxicity, which could be interpreted into a robust biomarker system. Keywords: calcineurin inhibitor, transplantation, nephrotoxicity, risk factor, systematic review, meta-analysis

  10. Risk Analysis of Telecom Enterprise Financing

    Institute of Scientific and Technical Information of China (English)

    YU Hua; SHU Hua-ying

    2005-01-01

    The main research objects in this paper are the causes searching and risk estimating method for telecom enterprises' financial risks. The multi-mode financing for telecom enterprises makes it flexible to induce the capital and obtain the profit by corresponding projects. But there are also potential risks going with these financing modes. After making analysis of categories and causes of telecom enterprises' financing risk, a method by Analytic Hierarchy Process (AHP) is put forward to estimating the financing risk. And the author makes her suggestion and opinion by example analysis, in order to provide some ideas and basis for telecom enterprise's financing decision-making.

  11. Eavesdropping on the two-way quantum communication protocols with invisible photons

    Energy Technology Data Exchange (ETDEWEB)

    Cai Qingyu [State Key Laboratory of Magnetics Resonance and Atomic and Molecular Physics, Wuhan Institution of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)]. E-mail: qycai@wipm.ac.cn

    2006-02-20

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed00.

  12. Eavesdropping on the two-way quantum communication protocols with invisible photons

    International Nuclear Information System (INIS)

    Cai Qingyu

    2006-01-01

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed

  13. [Perinatal bioethics: euthanasia or end-of-life decisions? Analysis of the Groningen Protocol].

    Science.gov (United States)

    Halac, Jacobo; Halac, Eduardo; Moya, Martín P; Olmas, José M; Dopazo, Silvina L; Dolagaray, Nora

    2009-12-01

    The so called "Groningen Protocol" was conceived as a framework to discuss the euthanasia in neonates. Originally, it presents three groups of babies who might be candidates to this option. We analyzed the protocol in its original context and that of the Dutch society in which it was created. The analysis started with a careful reading of the protocol in both English and Dutch versions, translated later into Spanish. The medical and nursing staff participated in discussing it. A final consensus was reached. The Institutional Ethics Committee at our hospital discussed it freely and made recommendations for its application as a guideline to honestly discuss with parents the clinical condition of their babies, without permitting the option included literally in the word euthanasia. We selected four extremely ill infants. Their parents were interviewed at least twice daily: three stages were identified: the initial one of promoting all possible treatments; a second one of guarded and cautious request for the staff to evaluate "suffering", and a last one where requests were made to reduce therapeutic efforts to provide dignified death. A week after the death of their infants, they were presented with the facts of the protocol and the limits of our legal system. In all four cases the parents suggested that they would have chosen ending the life of their infants, in order to avoid them undue suffering. They clearly pointed out that this option emerged as a viable one to them once the ultimate outcome was evident. The protocol must not be viewed as a guideline for euthanasia in newborns, but rather as a mean to discuss the critical condition of an infant with the parents. Its direct implementation in our setting remains difficult. As a clear limitation for its overall application remains the definition of what is considered "unbearable suffering" in newborns, and how to certify when the infant has "no prospect". We emphasize the benefits of securing the help of the Ethics

  14. Probabilistic risk analysis for nuclear power plants

    International Nuclear Information System (INIS)

    Hauptmanns, U.

    1988-01-01

    Risk analysis is applied if the calculation of risk from observed failures is not possible, because events contributing substantially to risk are too seldom, as in the case of nuclear reactors. The process of analysis provides a number of benefits. Some of them are listed. After this by no means complete enumeration of possible benefits to be derived from a risk analysis. An outline of risk studiesd for PWR's with some comments on the models used are given. The presentation is indebted to the detailed treatment of the subject given in the PRA Procedures Guide. Thereafter some results of the German Risk Study, Phase B, which is under way are communicated. The paper concludes with some remarks on probabilistic considerations in licensing procedures. (orig./DG)

  15. Single-shell tank interim stabilization risk analysis

    International Nuclear Information System (INIS)

    Basche, A.D.

    1998-01-01

    The purpose of the Single-Shell Tank (SST) Interim Stabilization Risk Analysis is to provide a cost and schedule risk analysis of HNF-2358, Rev. 1, Single-Shell Tank Interim Stabilization Project Plan (Project Plan) (Ross et al. 1998). The analysis compares the required cost profile by fiscal year (Section 4.2) and revised schedule completion date (Section 4.5) to the Project Plan. The analysis also evaluates the executability of the Project Plan and recommends a path forward for risk mitigation

  16. Performance Analysis of an Optical CDMA MAC Protocol With Variable-Size Sliding Window

    Science.gov (United States)

    Mohamed, Mohamed Aly A.; Shalaby, Hossam M. H.; Abdel-Moety El-Badawy, El-Sayed

    2006-10-01

    A media access control protocol for optical code-division multiple-access packet networks with variable length data traffic is proposed. This protocol exhibits a sliding window with variable size. A model for interference-level fluctuation and an accurate analysis for channel usage are presented. Both multiple-access interference (MAI) and photodetector's shot noise are considered. Both chip-level and correlation receivers are adopted. The system performance is evaluated using a traditional average system throughput and average delay. Finally, in order to enhance the overall performance, error control codes (ECCs) are applied. The results indicate that the performance can be enhanced to reach its peak using the ECC with an optimum number of correctable errors. Furthermore, chip-level receivers are shown to give much higher performance than that of correlation receivers. Also, it has been shown that MAI is the main source of signal degradation.

  17. Multiple Sclerosis Increases Fracture Risk: A Meta-Analysis

    Directory of Open Access Journals (Sweden)

    Guixian Dong

    2015-01-01

    Full Text Available Purpose. The association between multiple sclerosis (MS and fracture risk has been reported, but results of previous studies remain controversial and ambiguous. To assess the association between MS and fracture risk, a meta-analysis was performed. Method. Based on comprehensive searches of the PubMed, Embase, and Web of Science, we identified outcome data from all articles estimating the association between MS and fracture risk. The pooled risk ratios (RRs with 95% confidence intervals (CIs were calculated. Results. A significant association between MS and fracture risk was found. This result remained statistically significant when the adjusted RRs were combined. Subgroup analysis stratified by the site of fracture suggested significant associations between MS and tibia fracture risk, femur fracture risk, hip fracture risk, pelvis fracture risk, vertebrae fracture risk, and humerus fracture risk. In the subgroup analysis by gender, female MS patients had increased fracture risk. When stratified by history of drug use, use of antidepressants, hypnotics/anxiolytics, anticonvulsants, and glucocorticoids increased the risk of fracture risk in MS patients. Conclusions. This meta-analysis demonstrated that MS was significantly associated with fracture risk.

  18. Clinical benefits after the implementation of a multimodal perioperative protocol in elderly patients.

    Science.gov (United States)

    Aguilar-Nascimento, José Eduardo de; Salomão, Alberto Bicudo; Caporossi, Cervantes; Diniz, Breno Nadaf

    2010-01-01

    Multimodal protocol of perioperative care may enhance recovery after surgery. Based on evidence these new routines of perioperative care changed conventional prescriptions in surgery. To evaluate the results of a multimodal protocol (ACERTO protocol) in elderly patients. Non-randomized historical cohort study was performed at the surgical ward of a tertiary university hospital. One hundred seventeen patients aged 60 and older were submitted to elective abdominal operations under either conventional (n = 42; conventional group, January 2004-June 2005) or a fast-track perioperative protocol named ACERTO (n = 75; ACERTO group, July 2005-December 2007). Main endpoints were preoperative fasting time, postoperative day of re-feeding, volume of intravenous fluids, length of hospital stay and morbidity. The implantation of the ACERTO protocol was followed by a decrease in both preoperative fasting (15 [8-20] vs 4 [2-20] hours, P<0.001) and postoperative day of refeeding (1st [1st-10th] vs 0 [0-5th] PO day; P<0.01), and intravenous fluids (10.7 [2.5-57.5] vs 2.5 [0.5-82] L, P<0.001). The changing of protocols reduced the mean length of hospital stay by 4 days (6[1-43] vs 2[1-97] days; P = 0.002) and surgical site infection rate by 85.7% (19%; 8/42 vs 2.7%; 2/75, P<0.001; relative risk = 1.20; 95% confidence interval = 1.03-1.39). Per-protocol analysis showed that hospital stay in major operations diminished only in patients who completed the protocol (P<0.01). The implementation of multidisciplinary routines of the ACERTO protocol diminished both hospitalization and surgical site infection in elderly patients submitted to abdominal operations.

  19. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  20. Behaviour change interventions for the management of Raynaud's phenomenon: a systematic review protocol.

    Science.gov (United States)

    Daniels, Jo; Pauling, John D; Eccelston, Christopher

    2017-08-04

    Raynaud's phenomenon (RP) describes excessive peripheral vasospasm to cold exposure and/or emotional stress. RP episodes are associated with digital colour changes, pain and reduced quality of life. Pharmacological interventions are of low to moderate efficacy and often result in adverse effects such as facial flushing and headaches. Recommended lifestyle and behavioural interventions have not been evaluated. The objectives of the proposed systematic review are to assess the comparative safety and efficacy of behaviour change interventions for RP and identify what we can learn to inform future interventions. Studies eligible for inclusion include randomised controlled trials testing behaviour change interventions with a control comparator. A comprehensive search strategy will include peer review and grey literature up until 30 April 2017. Search databases will include Medline, Embase, PsychINFO and Cochrane. Initial sifting, eligibility, data extraction, risk of bias and quality assessment will be subject to review by two independent reviewers with a third reviewer resolving discrepancies. Risk of bias assessment will be performed using Cochrane risk of a bias assessment tool with quality of evidence assessed using Grading of Recommendations Assessment, Development and Evaluation(GRADE). A meta-analysis will be performed if there are sufficient data. Two subgroup analyses are planned: primary versus secondary RP outcomes; comparison of theoretically informed interventions with pragmatic interventions. This review does not require ethical approval as it will summarise published studies with non-identifiable data. This protocol complies with the Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA-P) guidelines. Findings will be disseminated in peer-reviewed articles and reported according to PRISMA. This review will make a significant contribution to the management of RP where no review of behaviour-change interventions currently exist

  1. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  2. Results of a protocol of transfusion threshold and surgical technique on transfusion requirements in burn patients.

    Science.gov (United States)

    O'Mara, Michael S; Hayetian, Fernando; Slater, Harvey; Goldfarb, I William; Tolchin, Eric; Caushaj, Philip F

    2005-08-01

    Blood loss and high rates of transfusion in burn centers remains an area of ongoing concern. Blood use brings the risk of infection, adverse reaction, and immunosuppression. A protocol to reduce blood loss and blood use was implemented. Analysis included 3-year periods before and after institution of the protocol. All patients were transfused for a hemoglobin below 8.0 gm/dL. Operations per admission did not change during the two time periods (0.78 in each). Overall units transfused per operation decreased from 1.56+/-0.06 to 1.25+/-0.14 units after instituting the protocol (pburns of less than 20% surface area, declining from 386 to 46 units after protocol institution, from 0.37 to 0.04 units per admission, and from 0.79 to 0.08 units per operation in this group of smallest burns. There was no change noted in the larger burns. This study suggests that a defined protocol of hemostasis, technique, and transfusion trigger should be implemented in the process of burn excision and grafting. This will help especially those patients with the smallest burns, essentially eliminating transfusion need in that group.

  3. 38 CFR 75.115 - Risk analysis.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Risk analysis. 75.115 Section 75.115 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS (CONTINUED) INFORMATION SECURITY MATTERS Data Breaches § 75.115 Risk analysis. If a data breach involving sensitive personal information that is processed or...

  4. Cassandra - D6.3 - final protocol : Seventh Framework Programme THEME Monitoring and Tracking of Shipping Containers Security

    NARCIS (Netherlands)

    Malenstein, J.; Schewe, W.; Zomer, G.; Klievink, A.J.; Nijdam, M.; Visscher, W.

    2014-01-01

    The Cassandra project addressed procedures and methods (protocols) for government supervision of international trade lanes. Specifically, it looked at the impact of the Cassandra innovations on the procedures and methods to assess risks (risk assessment protocols). This covers the way in which the

  5. The Intergovernmental Marine Bioenergy and Carbon Sequestration Protocol: Environmental and Political Risk Reduction of Global Carbon Management (The IMBECS Protocol Draft)

    Science.gov (United States)

    Hayes, M.

    2014-12-01

    The IMBECS Protocol concept employs large cultivation and biorefinery installations, within the five Subtropical Convergence Zones (STCZs), to support the production of commodities such as carbon negative biofuels, seafood, organic fertilizer, polymers and freshwater, as a flexible and cost effective means of Global Warming Mitigation (GWM) with the primary objective being the global scale replacement of fossil fuels (FF). This governance approach is categorically distinct from all other large scale GWM governance concepts. Yet, many of the current marine related GWM technologies are adaptable to this proposals. The IMBECS technology would be managed by an intergovernmentally sanctioned non-profit foundation which would have the following functions/mission: Synthesises relevant treaty language Performs R&D activities and purchases relevant patents Under intergovernmental commission, functions as the primary responsible international actorfor environmental standards, production quotas and operational integrity Licence technology to for-profit actors under strict production/environmental standards Enforce production and environmental standards along with production quotas Provide a high level of transparency to all stakeholders Provide legal defence The IMBECS Protocol is conceptually related to the work found in the following documents/links. This list is not exhaustive: Climate Change Geoengineering The Science and Politics of Global Climate Change: A guide to the debate IPCC Special Report on Renewable Energy and Climate Change Mitigation DoE Roadmap for Algae Biofuels PodEnergy Ocean Agronomy development leaders and progenitor of this proposal. Artificial Upwelling of Deep Seawater Using the Perpetual Salt Fountain for Cultivation of Ocean Desert NASAs' OMEGA study. Cool Planet; Land based version of a carbon negative biofuel concept. Cellana; Leading developer of algae based bioproducts. The State of World Fisheries and Aquaculture Mariculture: A global analysis

  6. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  7. Common approach of risks analysis

    International Nuclear Information System (INIS)

    Noviello, L.; Naviglio, A.

    1996-01-01

    Although, following the resolutions of the High German Court, the protection level of the human beings is an objective which can change in time, it is obvious that it is an important point when there is a risk for the population. This is true more particularly for the industrial plants whose possible accidents could affect the population. The accidents risk analysis indicates that there is no conceptual difference between the risks of a nuclear power plant and those of the other industrial plants as chemical plants, the gas distribution system and the hydraulic dams. A legislation analysis induced by the Seveso Directive for the industrial risks give some important indications which should always be followed. This work analyses more particularly the legislative situation in different European countries and identifies some of the most important characteristics. Indeed, for most of the countries, the situation is different and it is a later difficulties source for nuclear power plants. In order to strengthen this reasoning, this paper presents some preliminary results of an analysis of a nuclear power plant following the approach of other industrial plants. In conclusion, it will be necessary to analyse again the risks assessment approach for nuclear power plants because the real protection level of human beings in a country is determined by the less regulated of the dangerous industrial plants existing at the surroundings. (O.M.)

  8. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    ’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture......Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication...... the designer’s authentic line of reasoning. To illustrate how RPA can be used, the site planning case is briefly presented, and part of the replicated line of reasoning analysed. One result of the analysis is a glimpse of a ‘logic of design’; another is an insight which sheds new light on Darke’s classical...

  9. Standardised risk analysis as a communication tool

    International Nuclear Information System (INIS)

    Pluess, Ch.; Montanarini, M.; Bernauer, M.

    1998-01-01

    Full text of publication follows: several European countries require a risk analysis for the production, storage or transport a dangerous goods. This requirement imposes considerable administrative effort for some sectors of the industry. In order to minimize the effort of such studies, a generic risk analysis for an industrial sector proved to help. Standardised procedures can consequently be derived for efficient performance of the risk investigations. This procedure was successfully established in Switzerland for natural gas transmission lines and fossil fuel storage plants. The development process of the generic risk analysis involved an intense discussion between industry and authorities about methodology of assessment and the criteria of acceptance. This process finally led to scientific consistent modelling tools for risk analysis and to an improved communication from the industry to the authorities and the public. As a recent example, the Holland-Italy natural gas transmission pipeline is demonstrated, where this method was successfully employed. Although this pipeline traverses densely populated areas in Switzerland, using this established communication method, the risk problems could be solved without delaying the planning process. (authors)

  10. Introduction of the risk analysis

    International Nuclear Information System (INIS)

    Campon, G.; Martinez, I.

    2013-01-01

    An introduction of risks analysis was given in the exposition which main issues were: food innocuousness, world, regional and national food context,change of paradigms, health definition, risk, codex, standardization, food chain role, trade agreement, codex alimentarius, food transmission diseases cost impact

  11. Risk Analysis Group annual progress report 1984

    International Nuclear Information System (INIS)

    1985-06-01

    The activities of the Risk Analysis Group at Risoe during 1984 are presented. These include descriptions in some detail of work on general development topics and risk analysis performed as contractor. (author)

  12. Ocean fertilization, carbon credits and the Kyoto Protocol

    Science.gov (United States)

    Westley, M. B.; Gnanadesikan, A.

    2008-12-01

    are unlikely to meet the Kyoto Protocol's verification and accounting standards for trading carbon credits on the regulated market. The marketability of ocean fertilization in the voluntary carbon marketplace will likely depend on companies' efforts to minimize environmental risks and consumers' willingness to accept remaining risks.

  13. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  14. The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel

    International Nuclear Information System (INIS)

    Li Jian; Sun Feng-Qi; Pan Ze-Shi; Nie Jin-Rui; Chen Yan-Hua; Yuan Kai-Guo

    2015-01-01

    To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein–Podolsky–Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003) 042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Q 0 (M : (Q 0 , 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ϵ is, the larger the error rate Q is. When the noise level ϵ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q < 0.153. Similarly, if error rate Q > 0.153 = Q 0 , eavesdropping information I > 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. (paper)

  15. Analysis of protection spanning-tree protocol

    Directory of Open Access Journals (Sweden)

    Б.Я. Корнієнко

    2007-01-01

    Full Text Available  Extraordinary sweeping  of  IT – development  causes vulnerabilities and, thereafter, attacks that use these vulnerabilities. That is why one must post factum or even in advance speed up invention of new information  security systems as well as develop the old ones. The matter of article concerns Spanning-Tree Protocol  – the vivid example of the case, when the cure of the vulnerability creates dozen of new "weak spots".

  16. Risk-based decision analysis for groundwater operable units

    International Nuclear Information System (INIS)

    Chiaramonte, G.R.

    1995-01-01

    This document proposes a streamlined approach and methodology for performing risk assessment in support of interim remedial measure (IRM) decisions involving the remediation of contaminated groundwater on the Hanford Site. This methodology, referred to as ''risk-based decision analysis,'' also supports the specification of target cleanup volumes and provides a basis for design and operation of the groundwater remedies. The risk-based decision analysis can be completed within a short time frame and concisely documented. The risk-based decision analysis is more versatile than the qualitative risk assessment (QRA), because it not only supports the need for IRMs, but also provides criteria for defining the success of the IRMs and provides the risk-basis for decisions on final remedies. For these reasons, it is proposed that, for groundwater operable units, the risk-based decision analysis should replace the more elaborate, costly, and time-consuming QRA

  17. Assessing the Environmental Risks of Nanomaterials

    DEFF Research Database (Denmark)

    Grieger, Khara Deanne; Hansen, Steffen Foss; Baun, Anders

    to a wide range of technical limitations. For instance, serious knowledge gaps remain within e.g. the detection of NM in the environment, developing adequate testing equipment and protocols, and toxicity endpoints (Grieger et al., 2009). In the past few years, many scientists and organizations have...... considered. Furthermore, we recommend the use of biomonitoring in some environmental ‘hot spots’ to serve as early warning detectors while the field of NM environmental risk assessment matures, as recommended in our previous work. Ultimately, this analysis may aid the advancement of environmental risk...

  18. How to Perform an Ethical Risk Analysis (eRA).

    Science.gov (United States)

    Hansson, Sven Ove

    2018-02-26

    Ethical analysis is often needed in the preparation of policy decisions on risk. A three-step method is proposed for performing an ethical risk analysis (eRA). In the first step, the people concerned are identified and categorized in terms of the distinct but compatible roles of being risk-exposed, a beneficiary, or a decisionmaker. In the second step, a more detailed classification of roles and role combinations is performed, and ethically problematic role combinations are identified. In the third step, further ethical deliberation takes place, with an emphasis on individual risk-benefit weighing, distributional analysis, rights analysis, and power analysis. Ethical issues pertaining to subsidiary risk roles, such as those of experts and journalists, are also treated in this phase. An eRA should supplement, not replace, a traditional risk analysis that puts emphasis on the probabilities and severities of undesirable events but does not cover ethical issues such as agency, interpersonal relationships, and justice. © 2018 Society for Risk Analysis.

  19. A National Surveillance Survey on Noncommunicable Disease Risk Factors: Suriname Health Study Protocol

    Science.gov (United States)

    Smits, Christel CF; Jaddoe, Vincent WV; Hofman, Albert; Toelsie, Jerry R

    2015-01-01

    Background Noncommunicable diseases (NCDs) are the leading cause of death in low- and middle-income countries. Therefore, the surveillance of risk factors has become an issue of major importance for planning and implementation of preventive measures. Unfortunately, in these countries data on NCDs and their risk factors are limited. This also prevails in Suriname, a middle-income country of the Caribbean, with a multiethnic/multicultural population living in diverse residential areas. For these reasons, “The Suriname Health Study” was designed. Objective The main objective of this study is to estimate the prevalence of NCD risk factors, including metabolic syndrome, hypertension, and diabetes in Suriname. Differences between specific age groups, sexes, ethnic groups, and geographical areas will be emphasized. In addition, risk groups will be identified and targeted actions will be designed and evaluated. Methods In this study, several methodologies were combined. A stratified multistage cluster sample was used to select the participants of 6 ethnic groups (Hindustani, Creole, Javanese, Maroon, Chinese, Amerindians, and mixed) divided into 5 age groups (between 15 and 65 years) who live in urban/rural areas or the hinterland. A standardized World Health Organization STEPwise approach to surveillance questionnaire was adapted and used to obtain information about demographic characteristics, lifestyle, and risk factors. Physical examinations were performed to measure blood pressure, height, weight, and waist circumference. Biochemical analysis of collected blood samples evaluated the levels of glucose, high-density-lipoprotein cholesterol, total cholesterol, and triglycerides. Statistical analysis will be used to identify the burden of modifiable and unmodifiable risk factors in the aforementioned subgroups. Subsequently, tailor-made interventions will be prepared and their effects will be evaluated. Results The data as collected allow for national inference and

  20. A fresh look at the freeze-all protocol: a SWOT analysis.

    Science.gov (United States)

    Blockeel, Christophe; Drakopoulos, Panagiotis; Santos-Ribeiro, Samuel; Polyzos, Nikolaos P; Tournaye, Herman

    2016-03-01

    The 'freeze-all' strategy with the segmentation of IVF treatment, namely with the use of a GnRH antagonist protocol, GnRH agonist triggering, the elective cryopreservation of all embryos by vitrification and a frozen-thawed embryo transfer in a subsequent cycle, has become more popular. However, the approach still encounters drawbacks. In this opinion paper, a SWOT (strengths, weaknesses, opportunities and threats) analysis sheds light on the different aspects of this strategy. © The Author 2016. Published by Oxford University Press on behalf of the European Society of Human Reproduction and Embryology. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  1. RISK ANALYSIS IN INFORMATION TECHNOLOGY AND COMMUNICATION OUTSOURCING

    Directory of Open Access Journals (Sweden)

    Edmir Parada Vasques Prado

    2011-12-01

    Full Text Available This research aims at evaluating the risk analysis process in Information Technology and Communication (ICT outsourcing conducted by organizations of the private sector. The research is characterized by being a descriptive, quantitative and transversal type study, which was used the survey method. Data were collected through questionnaire, the sample is not random and we used a convenience sampling process. The research made contributions to understanding the risk analysis process in ICT services outsourcing, and identified statistically significant relationships between risk analysis, organization's size and its industry, and between risk analysis and diversity of outsourced services

  2. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  3. Risk-benefit analysis and public policy: a bibliography

    Energy Technology Data Exchange (ETDEWEB)

    Clark, E.M.; Van Horn, A.J.

    1976-11-01

    Risk-benefit analysis has been implicitly practiced whenever decision-makers are confronted with decisions involving risks to life, health, or to the environment. Various methodologies have been developed to evaluate relevant criteria and to aid in assessing the impacts of alternative projects. Among these have been cost-benefit analysis, which has been widely used for project evaluation. However, in many cases it has been difficult to assign dollar costs to those criteria involving risks and benefits which are not now assigned explicit monetary values in our economic system. Hence, risk-benefit analysis has evolved to become more than merely an extension of cost-benefit analysis, and many methods have been applied to examine the trade-offs between risks and benefits. In addition, new scientific and statistical techniques have been developed for assessing current and future risks. The 950 references included in this bibliography are meant to suggest the breadth of those methodologies which have been applied to decisions involving risk.

  4. Risk-benefit analysis and public policy: a bibliography

    International Nuclear Information System (INIS)

    Clark, E.M.; Van Horn, A.J.

    1976-11-01

    Risk-benefit analysis has been implicitly practiced whenever decision-makers are confronted with decisions involving risks to life, health, or to the environment. Various methodologies have been developed to evaluate relevant criteria and to aid in assessing the impacts of alternative projects. Among these have been cost-benefit analysis, which has been widely used for project evaluation. However, in many cases it has been difficult to assign dollar costs to those criteria involving risks and benefits which are not now assigned explicit monetary values in our economic system. Hence, risk-benefit analysis has evolved to become more than merely an extension of cost-benefit analysis, and many methods have been applied to examine the trade-offs between risks and benefits. In addition, new scientific and statistical techniques have been developed for assessing current and future risks. The 950 references included in this bibliography are meant to suggest the breadth of those methodologies which have been applied to decisions involving risk

  5. [Analysis of palliative sedation in hospitalised elderly patients: Effectiveness of a protocol].

    Science.gov (United States)

    Mateos-Nozal, Jesús; García-Cabrera, Lorena; Montero Errasquín, Beatriz; Cruz-Jentoft, Alfonso José; Rexach Cano, Lourdes

    2016-01-01

    To measure changes in the practice of palliative sedation during agony in hospitalised elderly patients before and after the implementation of a palliative sedation protocol. A retrospective before-after study was performed in hospitalised patients over 65 years old who received midazolam during hospital admission and died in the hospital in two 3-month periods, before and after the implementation of the protocol. Non-sedative uses of midazolam and patients in intensive care were excluded. Patient and admission characteristics, the consent process, withdrawal of life-sustaining treatments, and the sedation process (refractory symptom treated, drug doses, assessment and use of other drugs) were recorded. Association was analysed using the Chi(2) and Student t tests. A total of 143 patients were included, with no significant differences between groups in demographic characteristics or symptoms. Do not resuscitate (DNR) orders were recorded in approximately 70% of the subjects of each group, and informed consent for sedation was recorded in 91% before vs. 84% after the protocol. Induction and maintenance doses of midazolam followed protocol recommendations in 1.3% before vs 10.4% after the protocol was implemented (P=.02) and adequate rescue doses were used in 1.3% vs 11.9% respectively (P=.01). Midazolam doses were significantly lower (9.86mg vs 18.67mg, Psedation score was used in 8% vs. 12% and the Palliative Care Team was involved in 35.5% and 16.4% of the cases (P=.008) before and after the protocol, respectively. Use of midazolam slightly improved after the implementation of a hospital protocol on palliative sedation. The percentage of adequate sedations and the general process of sedation were mostly unchanged by the protocol. More education and further assessment is needed to gauge the effect of these measures in the future. Copyright © 2015 SEGG. Published by Elsevier Espana. All rights reserved.

  6. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  7. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  8. Analysis of the radius and diameter protocols in terms of pricing telecommunication services

    Directory of Open Access Journals (Sweden)

    Vesna M. Radonjić

    2013-06-01

    Full Text Available Accounting of telecommunication services is closely related to the functions of authentication and authorization. These functions are usually considered together and implemented within the same server using a common protocol. The most renowned protocols for authentication, authorization and accounting are the RADIUS and Diameter protocols.   AAA functions and related protocols   In this chapter, the accounting management architecture developed by IETF is presented. It includes the interaction between network elements, accounting servers and billing and charging servers. Accounting data can be used for management, planning and charging users as well as other (specific purposes. Authentication is the process of confirming a user's digital identity, usually through some type of identifiers and related data. Authorization determines whether a particular entity is authorized to perform an activity.   Basic Functions of the RADIUS Protocol   The RADIUS architecture is based on a client-server model. It uses UDP on the transport layer. Transactions between the client and the server are authenticated, which is achieved by using a common secret key that is never sent through the network. Given the limited resources available to network devices, RADIUS facilitates and centralizes charging end users, provides some protection against active attacks by unauthorized users and it has great support from different network equipment vendors. Although RADIUS is a widely accepted protocol for the mechanisms of authentication, authorization and accounting, it has certain shortcomings that may be caused by the protocol itself or by its poor implementation.   Architecture and Operation of the Diameter Protocol   Diameter is a scalable protocol designed by the IETF working group in order to eliminate shortcomings and functional limitations of the RADIUS protocol and eventually to replace it in the near future. Most of the basic Diameter mechanisms and its

  9. Methods for Risk Analysis

    International Nuclear Information System (INIS)

    Alverbro, Karin

    2010-01-01

    Many decision-making situations today affect humans and the environment. In practice, many such decisions are made without an overall view and prioritise one or other of the two areas. Now and then these two areas of regulation come into conflict, e.g. the best alternative as regards environmental considerations is not always the best from a human safety perspective and vice versa. This report was prepared within a major project with the aim of developing a framework in which both the environmental aspects and the human safety aspects are integrated, and decisions can be made taking both fields into consideration. The safety risks have to be analysed in order to be successfully avoided and one way of doing this is to use different kinds of risk analysis methods. There is an abundance of existing methods to choose from and new methods are constantly being developed. This report describes some of the risk analysis methods currently available for analysing safety and examines the relationships between them. The focus here is mainly on human safety aspects

  10. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  11. Flood Risk Assessment Based On Security Deficit Analysis

    Science.gov (United States)

    Beck, J.; Metzger, R.; Hingray, B.; Musy, A.

    Risk is a human perception: a given risk may be considered as acceptable or unac- ceptable depending on the group that has to face that risk. Flood risk analysis of- ten estimates economic losses from damages, but neglects the question of accept- able/unacceptable risk. With input from land use managers, politicians and other stakeholders, risk assessment based on security deficit analysis determines objects with unacceptable risk and their degree of security deficit. Such a risk assessment methodology, initially developed by the Swiss federal authorities, is illustrated by its application on a reach of the Alzette River (Luxembourg) in the framework of the IRMA-SPONGE FRHYMAP project. Flood risk assessment always involves a flood hazard analysis, an exposed object vulnerability analysis, and an analysis combing the results of these two previous analyses. The flood hazard analysis was done with the quasi-2D hydraulic model FldPln to produce flood intensity maps. Flood intensity was determined by the water height and velocity. Object data for the vulnerability analysis, provided by the Luxembourg government, were classified according to their potential damage. Potential damage is expressed in terms of direct, human life and secondary losses. A thematic map was produced to show the object classification. Protection goals were then attributed to the object classes. Protection goals are assigned in terms of an acceptable flood intensity for a certain flood frequency. This is where input from land use managers and politicians comes into play. The perception of risk in the re- gion or country influences the protection goal assignment. Protection goals as used in Switzerland were used in this project. Thematic maps showing the protection goals of each object in the case study area for a given flood frequency were produced. Com- parison between an object's protection goal and the intensity of the flood that touched the object determine the acceptability of the risk and the

  12. Samples and Sampling Protocols for Scientific Investigations | Joel ...

    African Journals Online (AJOL)

    ... from sampling, through sample preparation, calibration to final measurement and reporting. This paper, therefore offers useful information on practical guidance on sampling protocols in line with best practice and international standards. Keywords: Sampling, sampling protocols, chain of custody, analysis, documentation ...

  13. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    Science.gov (United States)

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  14. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  15. Analysis and management of risks experienced in tunnel construction

    Directory of Open Access Journals (Sweden)

    Cagatay Pamukcu

    2015-12-01

    Full Text Available In this study, first of all, the definitions of "risk", "risk analysis", "risk assessment" and "risk management" were made to avoid any confusions about these terms and significance of risk analysis and management in engineering projects was emphasized. Then, both qualitative and quantitative risk analysis techniques were mentioned and within the scope of the study, Event Tree Analysis method was selected in order to analyze the risks regarding TBM (Tunnel Boring Machine operations in tunnel construction. After all hazards that would be encountered during tunnel construction by TBM method had been investigated, those hazards were undergoing a Preliminary Hazard Analysis to sort out and prioritize the risks with high scores. When the risk scores were taken into consideration, it was seen that the hazards with high risk scores could be classified into 4 groups which are excavation + support induced accidents, accidents stemming from geologic conditions, auxiliary works, and project contract. According to these four classified groups of initiating events, Event Tree Analysis was conducted by taking into care 4 countermeasures apart from each other. Finally, the quantitative and qualitative consequences of Event Tree Analyses, which were undertaken for all initiating events, were investigated and interpreted together by making comparisons and referring to previous studies.

  16. [Clinical outcomes and economic analysis of two ovulation induction protocols in patients undergoing repeated IVF/ICSI cycles].

    Science.gov (United States)

    Chen, Xiao; Geng, Ling; Li, Hong

    2014-04-01

    To compare the clinical outcomes and cost-effectiveness of luteal phase down-regulation with gonadotrophin-releasing hormone (GnRH) agonist protocol and GnRH antagonist protocol in patients undergoing repeated in vitro fertilization and intracytoplasmic sperm injection (IVF-ICSI) cycles. A retrospective analysis of clinical outcomes and costs was conducted among 198 patients undergoing repeated IVF-ICSI cycles, including 109 receiving luteal phase down-regulation with GnRH agonist protocol (group A) and 89 receiving GnRH antagonist protocol (group B). The numbers of oocytes retrieved and good embryos, clinical pregnancy rate, abortion rate, the live birth rate, mean total cost, and the cost-effective ratio were compared between the two groups. In patients undergoing repeated IVF-ICSI cycles, the two protocols produced no significant differences in the number of good embryos, clinical pregnancy rate, abortion rate, or twin pregnancy rate. Compared with group B, group A had better clinical outcomes though this difference was not statistically significant. The number of retrieved oocytes was significantly greater and live birth rate significantly higher in group A than in group B (9.13=4.98 vs 7.11=4.74, and 20.2% vs 9.0%, respectively). Compared with group B, group A had higher mean total cost per cycle but lower costs for each oocyte retrieved (2729.11 vs 3038.60 RMB yuan), each good embryo (8867.19 vs 9644.85 RMB yuan), each clinical pregnancy (77598.06 vs 96139.85 RMB yuan). For patients undergoing repeated IVF/ICSI cycle, luteal phase down-regulation with GnRH agonist protocol produces good clinical outcomes with also good cost-effectiveness in spite an unsatisfactory ovarian reserve.

  17. Effects of falls prevention interventions on falls outcomes for hospitalised adults: protocol for a systematic review with meta-analysis.

    Science.gov (United States)

    Slade, Susan C; Carey, David L; Hill, Anne-Marie; Morris, Meg E

    2017-11-12

    Falls are a major global public health problem and leading cause of accidental or unintentional injury and hospitalisation. Falls in hospital are associated with longer length of stay, readmissions and poor outcomes. Falls prevention is informed by knowledge of reversible falls risk factors and accurate risk identification. The extent to which hospital falls are prevented by evidence-based practice, patient self-management initiatives, environmental modifications and optimisation of falls prevention systems awaits confirmation. Published reviews have mainly evaluated community settings and residential care facilities. A better understanding of hospital falls and the most effective strategies to prevent them is vital to keeping people safe. To evaluate the effectiveness of falls prevention interventions on reducing falls in hospitalised adults (acute and subacute wards, rehabilitation, mental health, operating theatre and emergency departments). We also summarise components of effective falls prevention interventions. This protocol has been registered. The systematic review will be informed by Cochrane guidelines and reported according to the Preferred Reporting Items for Systematic review and Meta-Analysis statement. randomised controlled trials, quasi-randomised trials or controlled clinical trials that evaluate falls prevention interventions for use by hospitalised adults or employees. Electronic databases will be searched using key terms including falls, accidental falls, prevention, hospital, rehabilitation, emergency, mental health, acute and subacute. Pairs of independent reviewers will conduct all review steps. Included studies will be evaluated for risk of bias. Data for variables such as age, participant characteristics, settings and interventions will be extracted and analysed with descriptive statistics and meta-analysis where possible. The results will be presented textually, with flow charts, summary tables, statistical analysis (and meta-analysis

  18. New View of Ping-Pong Protocol Security

    International Nuclear Information System (INIS)

    Zawadzki Piotr

    2012-01-01

    The ping-pong protocol offers confidential transmission of classic information without a prior key agreement. It is believed that it is quasi secure in lossless quantum channels. Serious doubts related to the analysis paradigm which has been used so far are presented in the study. The security of the protocol is reconsidered. (general)

  19. Identification of a research protocol to study orthodontic tooth movement

    Directory of Open Access Journals (Sweden)

    Annalisa Dichicco

    2014-06-01

    Full Text Available Aim: The orthodontic movement is associated with a process of tissue remodeling together with the release of several chemical mediators in periodontal tissues. Each mediator is a potential marker of tooth movement and expresses biological processes as: tissue inflammation and bone remodeling. Different amounts of every mediator are present in several tissues and fluids of the oral cavity. Therefore, there are different methods that allow sampling with several degrees of invasiveness. Chemical mediators are also substances of different molecular nature, and multiple kind of analysis methods allow detection. The purpose of this study was to draft the best research protocol for an optimal study on orthodontic movement efficiency. Methods: An analysis of the international literature have been made, to identify the gold standard of each aspect of the protocol: type of mediator, source and method of sampling and analysis method. Results: From the analysis of the international literature was created an original research protocol for the study and the assessment of the orthodontic movement, by using the biomarkers of the tooth movement. Conclusions: The protocol created is based on the choice of the gold standard of every aspect already analyzed in the literature and in existing protocols for the monitoring of orthodontic tooth movement through the markers of tooth movement. Clinical trials re required for the evaluation and validation of the protocol created.

  20. Security Enhanced EMV-Based Mobile Payment Protocol

    Directory of Open Access Journals (Sweden)

    Ming-Hour Yang

    2014-01-01

    Full Text Available Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer’s credits for risk control, and users can have online-equivalent credits in offline transactions.

  1. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  2. Evaluation of the appropriate use of a CIWA-Ar alcohol withdrawal protocol in the general hospital setting.

    Science.gov (United States)

    Eloma, Amanda S; Tucciarone, Jason M; Hayes, Edmund M; Bronson, Brian D

    2018-01-01

    The Clinical Institute Withdrawal Assessment-Alcohol, Revised (CIWA-Ar) is an assessment tool used to quantify alcohol withdrawal syndrome (AWS) severity and inform benzodiazepine treatment for alcohol withdrawal. To evaluate the prescribing patterns and appropriate use of the CIWA-Ar protocol in a general hospital setting, as determined by the presence or absence of documented AWS risk factors, patients' ability to communicate, and provider awareness of the CIWA-Ar order. This retrospective chart review included 118 encounters of hospitalized patients placed on a CIWA-Ar protocol during one year. The following data were collected for each encounter: patient demographics, admitting diagnosis, ability to communicate, and admission blood alcohol level; and medical specialty of the clinician ordering CIWA-Ar, documentation of the presence or absence of established AWS risk factors, specific parameters of the protocol ordered, service admitted to, provider documentation of awareness of the active protocol within 48 h of initial order, total benzodiazepine dose equivalents administered and associated adverse events. 57% of patients who started on a CIWA-Ar protocol had either zero or one documented risk factor for AWS (19% and 38% respectively). 20% had no documentation of recent alcohol use. 14% were unable to communicate. 19% of medical records lacked documentation of provider awareness of the ordered protocol. Benzodiazepine associated adverse events were documented in 15% of encounters. The judicious use of CIWA-Ar protocols in general hospitals requires mechanisms to ensure assessment of validated alcohol withdrawal risk factors, exclusion of patients who cannot communicate, and continuity of care during transitions.

  3. Implementation of a Rapid, Protocol-based TIA Management Pathway

    Directory of Open Access Journals (Sweden)

    Susann J. Jarhult

    2018-02-01

    Full Text Available Introduction: Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED with symptoms of transient ischemic attack (TIA. Methods: We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6–12 months after implementation. Outcomes included ED length of stay (LOS, hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. Results: From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18. Following the intervention, the inpatient admission rate decreased from 62% to 24% (p<0.001, median ED LOS decreased by 1.2 hours (5.7 to 4.9 hours, p=0.027, and median total hospital LOS from 29.4 hours to 23.1 hours (p=0.019. The proportion of patients receiving head computed tomography (CT went from 68% to 58% (p=0.087; brain magnetic resonance (MR imaging from 83% to 88%, (p=0.44 neck CT angiography from 32% to 22% (p=0.039; and neck MR angiography from 61% to 72% (p=0.046. Ninety-day stroke or recurrent TIA among those with final diagnosis of TIA was 3% for both periods. Conclusion: Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  4. 49 CFR 260.17 - Credit risk premium analysis.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Credit risk premium analysis. 260.17 Section 260... Financial Assistance § 260.17 Credit risk premium analysis. (a) When Federal appropriations are not available to cover the total subsidy cost, the Administrator will determine the Credit Risk Premium...

  5. Aromatherapy for managing menopausal symptoms: A protocol for systematic review and meta-analysis.

    Science.gov (United States)

    Choi, Jiae; Lee, Hye Won; Lee, Ju Ah; Lim, Hyun-Ja; Lee, Myeong Soo

    2018-02-01

    Aromatherapy is often used as a complementary therapy for women's health. This systematic review aims to evaluate the therapeutic effects of aromatherapy as a management for menopausal symptoms. Eleven electronic databases will be searched from inception to February 2018. Randomized controlled trials that evaluated any type of aromatherapy against any type of control in individuals with menopausal symptoms will be eligible. The methodological quality will be assessed using the Cochrane risk of bias tool. Two authors will independently assess each study for eligibility and risk of bias and to extract data. This study will provide a high quality synthesis of current evidence of aromatherapy for menopausal symptoms measured with Menopause Rating Scale, the Kupperman Index, the Greene Climacteric Scale, or other validated questionnaires. The conclusion of our systematic review will provide evidence to judge whether aromatherapy is an effective intervention for patient with menopausal women. Ethical approval will not be required, given that this protocol is for a systematic review. The systematic review will be published in a peer-reviewed journal. The review will also be disseminated electronically and in print. PROSPERO CRD42017079191.

  6. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  7. A Hybrid Analysis for Security Protocols with State

    Science.gov (United States)

    2014-07-16

    http://www.mitre.org/publications/ technical-papers/completeness-of-cpsa. [19] Simon Meier, Cas Cremers , and David Basin. Efficient construction of...7] Cas Cremers and Sjouke Mauw. Operational semantics and verification of security protocols. Springer, 2012. [8] Anupam Datta, Ante Derek, John C

  8. Using concurrent think-aloud and protocol analysis to explore student nurses' social learning information communication technology knowledge and skill development.

    Science.gov (United States)

    Todhunter, Fern

    2015-06-01

    Observations obtained through concurrent think-aloud and protocol analysis offer new understanding about the influence of social learning on student nurses' acquisition of Information and Communication Technology (ICT) knowledge and skills. The software used provides a permanent record of the underpinning study method, events and analyses. The emerging themes reflect the dimensions of social engagement, and the characteristics of positive and negative reactions to ICT. The evidence shows that given the right conditions, stronger learners will support and guide their peers. To explore the use of concurrent think-aloud and protocol analysis as a method to examine how student nurses approach ICT. To identify the benefits and challenges of using observational technology to capture learning behaviours. To show the influence of small group arrangement and student interactions on their ICT knowledge and skills development. Previous studies examining social interaction between students show how they work together and respond to interactive problem solving. Social interaction has been shown to enhance skills in both ICT and collaborative decision making. Structured observational analysis using concurrent think-aloud and protocol analysis. Students displayed varying degrees of pastoral support and emotional need, leadership, reflection, suggestion and experimentation skills. Encouraging student nurses to work in small mixed ability groups can be conducive for social and ICT skill and knowledge development. Observational software gives a permanent record of the proceedings. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  10. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  11. Development and validation of the Emergency Department Assessment of Chest pain Score and 2 h accelerated diagnostic protocol

    NARCIS (Netherlands)

    Than, Martin; Flaws, Dylan; Sanders, Sharon; Doust, Jenny; Glasziou, Paul; Kline, Jeffery; Aldous, Sally; Troughton, Richard; Reid, Christopher; Parsonage, William A.; Frampton, Christopher; Greenslade, Jaimi H.; Deely, Joanne M.; Hess, Erik; Sadiq, Amr Bin; Singleton, Rose; Shopland, Rosie; Vercoe, Laura; Woolhouse-Williams, Morgana; Ardagh, Michael; Bossuyt, Patrick; Bannister, Laura; Cullen, Louise

    2014-01-01

    Risk scores and accelerated diagnostic protocols can identify chest pain patients with low risk of major adverse cardiac event who could be discharged early from the ED, saving time and costs. We aimed to derive and validate a chest pain score and accelerated diagnostic protocol (ADP) that could

  12. Quantitative assessment of in-solution digestion efficiency identifies optimal protocols for unbiased protein analysis

    DEFF Research Database (Denmark)

    Leon, Ileana R; Schwämmle, Veit; Jensen, Ole N

    2013-01-01

    a combination of qualitative and quantitative LC-MS/MS methods and statistical data analysis. In contrast to previous studies we employed both standard qualitative as well as data-independent quantitative workflows to systematically assess trypsin digestion efficiency and bias using mitochondrial protein...... conditions (buffer, RapiGest, deoxycholate, urea), and two methods for removal of detergents prior to analysis of peptides (acid precipitation or phase separation with ethyl acetate). Our data-independent quantitative LC-MS/MS workflow quantified over 3700 distinct peptides with 96% completeness between all...... protocols and replicates, with an average 40% protein sequence coverage and an average of 11 peptides identified per protein. Systematic quantitative and statistical analysis of physicochemical parameters demonstrated that deoxycholate-assisted in-solution digestion combined with phase transfer allows...

  13. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  14. Computational Aspects of Dam Risk Analysis: Findings and Challenges

    Directory of Open Access Journals (Sweden)

    Ignacio Escuder-Bueno

    2016-09-01

    Full Text Available In recent years, risk analysis techniques have proved to be a useful tool to inform dam safety management. This paper summarizes the outcomes of three themes related to dam risk analysis discussed in the Benchmark Workshops organized by the International Commission on Large Dams Technical Committee on “Computational Aspects of Analysis and Design of Dams.” In the 2011 Benchmark Workshop, estimation of the probability of failure of a gravity dam for the sliding failure mode was discussed. Next, in 2013, the discussion focused on the computational challenges of the estimation of consequences in dam risk analysis. Finally, in 2015, the probability of sliding and overtopping in an embankment was analyzed. These Benchmark Workshops have allowed a complete review of numerical aspects for dam risk analysis, showing that risk analysis methods are a very useful tool to analyze the risk of dam systems, including downstream consequence assessments and the uncertainty of structural models.

  15. Integrating Household Risk Mitigation Behavior in Flood Risk Analysis: An Agent-Based Model Approach.

    Science.gov (United States)

    Haer, Toon; Botzen, W J Wouter; de Moel, Hans; Aerts, Jeroen C J H

    2017-10-01

    Recent studies showed that climate change and socioeconomic trends are expected to increase flood risks in many regions. However, in these studies, human behavior is commonly assumed to be constant, which neglects interaction and feedback loops between human and environmental systems. This neglect of human adaptation leads to a misrepresentation of flood risk. This article presents an agent-based model that incorporates human decision making in flood risk analysis. In particular, household investments in loss-reducing measures are examined under three economic decision models: (1) expected utility theory, which is the traditional economic model of rational agents; (2) prospect theory, which takes account of bounded rationality; and (3) a prospect theory model, which accounts for changing risk perceptions and social interactions through a process of Bayesian updating. We show that neglecting human behavior in flood risk assessment studies can result in a considerable misestimation of future flood risk, which is in our case study an overestimation of a factor two. Furthermore, we show how behavior models can support flood risk analysis under different behavioral assumptions, illustrating the need to include the dynamic adaptive human behavior of, for instance, households, insurers, and governments. The method presented here provides a solid basis for exploring human behavior and the resulting flood risk with respect to low-probability/high-impact risks. © 2016 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.

  16. Integrative Application of Life Cycle Assessment and Risk Assessment to Environmental Impacts of Anthropogenic Pollutants at a Watershed Scale.

    Science.gov (United States)

    Lin, Xiaodan; Yu, Shen; Ma, Hwongwen

    2018-01-01

    Intense human activities have led to increasing deterioration of the watershed environment via pollutant discharge, which threatens human health and ecosystem function. To meet a need of comprehensive environmental impact/risk assessment for sustainable watershed development, a biogeochemical process-based life cycle assessment and risk assessment (RA) integration for pollutants aided by geographic information system is proposed in this study. The integration is to frame a conceptual protocol of "watershed life cycle assessment (WLCA) for pollutants". The proposed WLCA protocol consists of (1) geographic and environmental characterization mapping; (2) life cycle inventory analysis; (3) integration of life-cycle impact assessment (LCIA) with RA via characterization factor of pollutant of interest; and (4) result analysis and interpretation. The WLCA protocol can visualize results of LCIA and RA spatially for the pollutants of interest, which might be useful for decision or policy makers for mitigating impacts of watershed development.

  17. Successful implementation of a perioperative glycemic control protocol in cardiac surgery: barrier analysis and intervention using lean six sigma.

    Science.gov (United States)

    Martinez, Elizabeth A; Chavez-Valdez, Raul; Holt, Natalie F; Grogan, Kelly L; Khalifeh, Katherine W; Slater, Tammy; Winner, Laura E; Moyer, Jennifer; Lehmann, Christoph U

    2011-01-01

    Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU) in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period.

  18. Successful Implementation of a Perioperative Glycemic Control Protocol in Cardiac Surgery: Barrier Analysis and Intervention Using Lean Six Sigma

    Science.gov (United States)

    Martinez, Elizabeth A.; Chavez-Valdez, Raul; Holt, Natalie F.; Grogan, Kelly L.; Khalifeh, Katherine W.; Slater, Tammy; Winner, Laura E.; Moyer, Jennifer; Lehmann, Christoph U.

    2011-01-01

    Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU) in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period. PMID:22091218

  19. Successful Implementation of a Perioperative Glycemic Control Protocol in Cardiac Surgery: Barrier Analysis and Intervention Using Lean Six Sigma

    Directory of Open Access Journals (Sweden)

    Elizabeth A. Martinez

    2011-01-01

    Full Text Available Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period.

  20. Putting problem formulation at the forefront of GMO risk analysis.

    Science.gov (United States)

    Tepfer, Mark; Racovita, Monica; Craig, Wendy

    2013-01-01

    When applying risk assessment and the broader process of risk analysis to decisions regarding the dissemination of genetically modified organisms (GMOs), the process has a tendency to become remarkably complex. Further, as greater numbers of countries consider authorising the large-scale dissemination of GMOs, and as GMOs with more complex traits reach late stages of development, there has been increasing concern about the burden posed by the complexity of risk analysis. We present here an improved approach for GMO risk analysis that gives a central role to problem formulation. Further, the risk analysis strategy has been clarified and simplified in order to make rigorously scientific risk assessment and risk analysis more broadly accessible to diverse stakeholder groups.

  1. Clinical Simulation: A Protocol for Evaluation of Mobile Technology.

    Science.gov (United States)

    Mather, Carey; Jensen, Sanne; Cummings, Elizabeth

    2017-01-01

    For mobile technology to be accepted at point of care in healthcare environments there is a need to demonstrate benefits whilst ameliorating the risks and challenges. To provide a standardised approach to evaluation of mobile technology a simulation protocol was developed to provide guidance for its use in healthcare environments. Simulated conditions provide the opportunity to assess intended and unintended consequences and identify potential workarounds when using technology. The protocol can also be used to demonstrate the importance of the development of digital professionalism by end-users prior to students entering the clinical practice setting. The mobile technology protocol was adapted from a health information systems protocol developed and used at the ITX Lab, Denmark for use in other simulation laboratories. Use case scenarios were developed to enable evaluation of mobile technology for mobile learning of nurses, nurse supervisors, students and patients. The scenarios can be used in a range of simulated environments including hospital bedside, outpatient clinic or community settings. A case study exemplar of a nurse and patient is included to demonstrate how the mobile technology protocol can be applied.

  2. Streamlining project delivery through risk analysis.

    Science.gov (United States)

    2015-08-01

    Project delivery is a significant area of concern and is subject to several risks throughout Plan Development : Process (PDP). These risks are attributed to major areas of project development, such as environmental : analysis, right-of-way (ROW) acqu...

  3. Testing feedback message framing and comparators to address prescribing of high-risk medications in nursing homes: protocol for a pragmatic, factorial, cluster-randomized trial.

    Science.gov (United States)

    Ivers, Noah M; Desveaux, Laura; Presseau, Justin; Reis, Catherine; Witteman, Holly O; Taljaard, Monica K; McCleary, Nicola; Thavorn, Kednapa; Grimshaw, Jeremy M

    2017-07-14

    Audit and feedback (AF) interventions that leverage routine administrative data offer a scalable and relatively low-cost method to improve processes of care. AF interventions are usually designed to highlight discrepancies between desired and actual performance and to encourage recipients to act to address such discrepancies. Comparing to a regional average is a common approach, but more recipients would have a discrepancy if compared to a higher-than-average level of performance. In addition, how recipients perceive and respond to discrepancies may depend on how the feedback itself is framed. We aim to evaluate the effectiveness of different comparators and framing in feedback on high-risk prescribing in nursing homes. This is a pragmatic, 2 × 2 factorial, cluster-randomized controlled trial testing variations in the comparator and framing on the effectiveness of quarterly AF in changing high-risk prescribing in nursing homes in Ontario, Canada. We grouped homes that share physicians into clusters and randomized these clusters into the four experimental conditions. Outcomes will be assessed after 6 months; all primary analyses will be by intention-to-treat. The primary outcome (monthly number of high-risk medications received by each patient) will be analysed using a general linear mixed effects regression model. We will present both four-arm and factorial analyses. With 160 clusters and an average of 350 beds per cluster, assuming no interaction and similar effects for each intervention, we anticipate 90% power to detect an absolute mean difference of 0.3 high-risk medications prescribed. A mixed-methods process evaluation will explore potential mechanisms underlying the observed effects, exploring targeted constructs including intention, self-efficacy, outcome expectations, descriptive norms, and goal prioritization. An economic analysis will examine cost-effectiveness analysis from the perspective of the publicly funded health care system. This protocol

  4. A group randomized trial of a complexity-based organizational intervention to improve risk factors for diabetes complications in primary care settings: study protocol

    Directory of Open Access Journals (Sweden)

    Noel Polly H

    2008-03-01

    months. Primary hypotheses will be tested with 12-month outcome data. Sustainability of the intervention will be tested using 24 month data. Insights gained will be included in a delayed intervention conducted in control practices and evaluated in a pre-post design. Primary and secondary outcomes To test hypotheses, the unit of randomization will be the clinic. The unit of analysis will be the repeated measure of each risk factor for each patient, nested within the clinic. The repeated measure of glycosylated hemoglobin A1c will be the primary outcome, with BP and Low Density Lipoprotein (LDL cholesterol as secondary outcomes. To study change in risk factor level, a hierarchical or random effect model will be used to account for the nesting of repeated measurement of risk factor within patients and patients within clinics. This protocol follows the CONSORT guidelines and is registered per ICMJE guidelines: Clinical Trial Registration Number NCT00482768

  5. An investigation into current protocols and radiographer opinions on contrast extravasation in Irish CT departments

    International Nuclear Information System (INIS)

    Cleary, N.; McNulty, J.P.; Foley, S.J.; Kelly, E.

    2017-01-01

    Background: Iodinated contrast extravasation is a serious complication associated with intravenous administration in radiology. Departmental protocols and the radiographer's approach on both prevention techniques and treatment will affect the prevalence of extravasation, and the eventual outcome for the patient when it does occur. Aims: To examine contrast extravasation protocols in place in Irish CT departments for alignment with European Society of Urogenital Radiology (ESUR) Guidelines (2014); to establish radiographer's opinions on contrast extravasation; and to examine radiographer adherence to protocols. Methods: Contrast extravasation protocols from a purposively selected sample of CT departments across Ireland (n = 6) were compared to ESUR guidelines, followed by an online survey of CT radiographers practicing in the participating centres. Results: All participating CT departments (n = 5) had written protocols in place. High risk patients, such as elderly or unconscious, were identified in most protocols, however, children were mentioned in just one protocol and obese patients were not specified in any. The response rate of CT radiographers was 23% (n = 24). 58% (n = 14) of respondents indicated that contrast extravasation was more likely during CTA examinations. While high levels of confidence in managing extravasation were reported, suggested treatment approaches, and confidence in same, was more variable. Clinical workload in CT departments was also identified as a factor impacting on patient care and management. Conclusion: While contrast extravasation protocols were generally in line with ESUR Guidelines, high risk patients may not be getting sufficient attention. More radiographer awareness of patient monitoring needs, particularly in busy departments with a heavy workload may also reduce extravasation risk, and improve management of same. - Highlights: • Irish protocols on contrast extravasation are generally in line with

  6. Reliability and risk analysis methods research plan

    International Nuclear Information System (INIS)

    1984-10-01

    This document presents a plan for reliability and risk analysis methods research to be performed mainly by the Reactor Risk Branch (RRB), Division of Risk Analysis and Operations (DRAO), Office of Nuclear Regulatory Research. It includes those activities of other DRAO branches which are very closely related to those of the RRB. Related or interfacing programs of other divisions, offices and organizations are merely indicated. The primary use of this document is envisioned as an NRC working document, covering about a 3-year period, to foster better coordination in reliability and risk analysis methods development between the offices of Nuclear Regulatory Research and Nuclear Reactor Regulation. It will also serve as an information source for contractors and others to more clearly understand the objectives, needs, programmatic activities and interfaces together with the overall logical structure of the program

  7. Thermal/optical methods for elemental carbon quantification in soils and urban dusts: equivalence of different analysis protocols.

    Directory of Open Access Journals (Sweden)

    Yongming Han

    Full Text Available Quantifying elemental carbon (EC content in geological samples is challenging due to interferences of crustal, salt, and organic material. Thermal/optical analysis, combined with acid pretreatment, represents a feasible approach. However, the consistency of various thermal/optical analysis protocols for this type of samples has never been examined. In this study, urban street dust and soil samples from Baoji, China were pretreated with acids and analyzed with four thermal/optical protocols to investigate how analytical conditions and optical correction affect EC measurement. The EC values measured with reflectance correction (ECR were found always higher and less sensitive to temperature program than the EC values measured with transmittance correction (ECT. A high-temperature method with extended heating times (STN120 showed the highest ECT/ECR ratio (0.86 while a low-temperature protocol (IMPROVE-550, with heating time adjusted for sample loading, showed the lowest (0.53. STN ECT was higher than IMPROVE ECT, in contrast to results from aerosol samples. A higher peak inert-mode temperature and extended heating times can elevate ECT/ECR ratios for pretreated geological samples by promoting pyrolyzed organic carbon (PyOC removal over EC under trace levels of oxygen. Considering that PyOC within filter increases ECR while decreases ECT from the actual EC levels, simultaneous ECR and ECT measurements would constrain the range of EC loading and provide information on method performance. Further testing with standard reference materials of common environmental matrices supports the findings. Char and soot fractions of EC can be further separated using the IMPROVE protocol. The char/soot ratio was lower in street dusts (2.2 on average than in soils (5.2 on average, most likely reflecting motor vehicle emissions. The soot concentrations agreed with EC from CTO-375, a pure thermal method.

  8. Thermal/optical methods for elemental carbon quantification in soils and urban dusts: equivalence of different analysis protocols.

    Science.gov (United States)

    Han, Yongming; Chen, Antony; Cao, Junji; Fung, Kochy; Ho, Fai; Yan, Beizhan; Zhan, Changlin; Liu, Suixin; Wei, Chong; An, Zhisheng

    2013-01-01

    Quantifying elemental carbon (EC) content in geological samples is challenging due to interferences of crustal, salt, and organic material. Thermal/optical analysis, combined with acid pretreatment, represents a feasible approach. However, the consistency of various thermal/optical analysis protocols for this type of samples has never been examined. In this study, urban street dust and soil samples from Baoji, China were pretreated with acids and analyzed with four thermal/optical protocols to investigate how analytical conditions and optical correction affect EC measurement. The EC values measured with reflectance correction (ECR) were found always higher and less sensitive to temperature program than the EC values measured with transmittance correction (ECT). A high-temperature method with extended heating times (STN120) showed the highest ECT/ECR ratio (0.86) while a low-temperature protocol (IMPROVE-550), with heating time adjusted for sample loading, showed the lowest (0.53). STN ECT was higher than IMPROVE ECT, in contrast to results from aerosol samples. A higher peak inert-mode temperature and extended heating times can elevate ECT/ECR ratios for pretreated geological samples by promoting pyrolyzed organic carbon (PyOC) removal over EC under trace levels of oxygen. Considering that PyOC within filter increases ECR while decreases ECT from the actual EC levels, simultaneous ECR and ECT measurements would constrain the range of EC loading and provide information on method performance. Further testing with standard reference materials of common environmental matrices supports the findings. Char and soot fractions of EC can be further separated using the IMPROVE protocol. The char/soot ratio was lower in street dusts (2.2 on average) than in soils (5.2 on average), most likely reflecting motor vehicle emissions. The soot concentrations agreed with EC from CTO-375, a pure thermal method.

  9. Multi-hazard risk analysis for management strategies

    Science.gov (United States)

    Kappes, M.; Keiler, M.; Bell, R.; Glade, T.

    2009-04-01

    Risk management is very often operating in a reactive way, responding to an event, instead of proactive starting with risk analysis and building up the whole process of risk evaluation, prevention, event management and regeneration. Since damage and losses from natural hazards raise continuously more and more studies, concepts (e.g. Switzerland or South Tyrol-Bolozano) and software packages (e.g. ARMAGEDOM, HAZUS or RiskScape) are developed to guide, standardize and facilitate the risk analysis. But these approaches focus on different aspects and are mostly closely adapted to the situation (legislation, organization of the administration, specific processes etc.) of the specific country or region. We propose in this study the development of a flexible methodology for multi-hazard risk analysis, identifying the stakeholders and their needs, processes and their characteristics, modeling approaches as well as incoherencies occurring by combining all these different aspects. Based on this concept a flexible software package will be established consisting of ArcGIS as central base and being complemented by various modules for hazard modeling, vulnerability assessment and risk calculation. Not all modules will be developed newly but taken from the current state-of-the-art and connected or integrated into ArcGIS. For this purpose two study sites, Valtellina in Italy and Bacelonnette in France, were chosen and the hazards types debris flows, rockfalls, landslides, avalanches and floods are planned to be included in the tool for a regional multi-hazard risk analysis. Since the central idea of this tool is its flexibility this will only be a first step, in the future further processes and scales can be included and the instrument thus adapted to any study site.

  10. A Concise Protocol for the Validation of Language ENvironment Analysis (LENA) Conversational Turn Counts in Vietnamese

    Science.gov (United States)

    Ganek, Hillary V.; Eriks-Brophy, Alice

    2018-01-01

    The aim of this study was to present a protocol for the validation of the Language ENvironment Analysis (LENA) System's conversational turn count (CTC) for Vietnamese speakers. Ten families of children aged between 22 and 42 months, recruited near Ho Chi Minh City, participated in this project. Each child wore the LENA audio recorder for a full…

  11. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  12. Environmental risk analysis of hazardous material rail transportation

    Energy Technology Data Exchange (ETDEWEB)

    Saat, Mohd Rapik, E-mail: mohdsaat@illinois.edu [Department of Civil and Environmental Engineering, University of Illinois at Urbana-Champaign, 1243 Newmark Civil Engineering Laboratory, 205 North Mathews Avenue, Urbana, IL 61801 (United States); Werth, Charles J.; Schaeffer, David [Department of Civil and Environmental Engineering, University of Illinois at Urbana-Champaign, 1243 Newmark Civil Engineering Laboratory, 205 North Mathews Avenue, Urbana, IL 61801 (United States); Yoon, Hongkyu [Sandia National Laboratories, Albuquerque, NM 87123 (United States); Barkan, Christopher P.L. [Department of Civil and Environmental Engineering, University of Illinois at Urbana-Champaign, 1243 Newmark Civil Engineering Laboratory, 205 North Mathews Avenue, Urbana, IL 61801 (United States)

    2014-01-15

    Highlights: • Comprehensive, nationwide risk assessment of hazardous material rail transportation. • Application of a novel environmental (i.e. soil and groundwater) consequence model. • Cleanup cost and total shipment distance are the most significant risk factors. • Annual risk varies from $20,000 to $560,000 for different products. • Provides information on the risk cost associated with specific product shipments. -- Abstract: An important aspect of railroad environmental risk management involves tank car transportation of hazardous materials. This paper describes a quantitative, environmental risk analysis of rail transportation of a group of light, non-aqueous-phase liquid (LNAPL) chemicals commonly transported by rail in North America. The Hazardous Materials Transportation Environmental Consequence Model (HMTECM) was used in conjunction with a geographic information system (GIS) analysis of environmental characteristics to develop probabilistic estimates of exposure to different spill scenarios along the North American rail network. The risk analysis incorporated the estimated clean-up cost developed using the HMTECM, route-specific probability distributions of soil type and depth to groundwater, annual traffic volume, railcar accident rate, and tank car safety features, to estimate the nationwide annual risk of transporting each product. The annual risk per car-mile (car-km) and per ton-mile (ton-km) was also calculated to enable comparison between chemicals and to provide information on the risk cost associated with shipments of these products. The analysis and the methodology provide a quantitative approach that will enable more effective management of the environmental risk of transporting hazardous materials.

  13. Environmental risk analysis of hazardous material rail transportation

    International Nuclear Information System (INIS)

    Saat, Mohd Rapik; Werth, Charles J.; Schaeffer, David; Yoon, Hongkyu; Barkan, Christopher P.L.

    2014-01-01

    Highlights: • Comprehensive, nationwide risk assessment of hazardous material rail transportation. • Application of a novel environmental (i.e. soil and groundwater) consequence model. • Cleanup cost and total shipment distance are the most significant risk factors. • Annual risk varies from $20,000 to $560,000 for different products. • Provides information on the risk cost associated with specific product shipments. -- Abstract: An important aspect of railroad environmental risk management involves tank car transportation of hazardous materials. This paper describes a quantitative, environmental risk analysis of rail transportation of a group of light, non-aqueous-phase liquid (LNAPL) chemicals commonly transported by rail in North America. The Hazardous Materials Transportation Environmental Consequence Model (HMTECM) was used in conjunction with a geographic information system (GIS) analysis of environmental characteristics to develop probabilistic estimates of exposure to different spill scenarios along the North American rail network. The risk analysis incorporated the estimated clean-up cost developed using the HMTECM, route-specific probability distributions of soil type and depth to groundwater, annual traffic volume, railcar accident rate, and tank car safety features, to estimate the nationwide annual risk of transporting each product. The annual risk per car-mile (car-km) and per ton-mile (ton-km) was also calculated to enable comparison between chemicals and to provide information on the risk cost associated with shipments of these products. The analysis and the methodology provide a quantitative approach that will enable more effective management of the environmental risk of transporting hazardous materials

  14. Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P 2015 statement

    Directory of Open Access Journals (Sweden)

    Mireia Estarli

    2016-02-01

    Full Text Available Systematic reviews should build on a protocol that describes the rationale, hypothesis, and planned methods of the review; few reviews report whether a protocol exists. Detailed, well-described protocols can facilitate the understanding and appraisal of the review methods, as well as the detection of modifications to methods and selective reporting in completed reviews. We describe the development of a reporting guideline, the Preferred Reporting Items for Systematic reviews and Meta-Analyses for Protocols 2015 (PRISMA-P 2015. PRISMA-P consists of a 17-item checklist intended to facilitate the preparation and reporting of a robust protocol for the systematic review. Funders and those commissioning reviews might consider mandating the use of the checklist to facilitate the submission of relevant protocol information in funding applications. Similarly, peer reviewers and editors can use the guidance to gauge the completeness and transparency of a systematic review protocol submitted for publication in a journal or other medium. Translation with permission of the authors. The original authors have not revised and verified the Spanish translation, and they do not necessarily endorse it.

  15. Does modifying the timing of meal intake improve cardiovascular risk factors? Protocol of an Australian pilot intervention in night shift workers with abdominal obesity.

    Science.gov (United States)

    Bonham, Maxine P; Leung, Gloria K W; Davis, Rochelle; Sletten, Tracey L; Murgia, Chiara; Young, Morag J; Eikelis, Nina; Lambert, Elisabeth A; Huggins, Catherine E

    2018-03-14

    Shift work is an independent risk factor for cardiovascular disease (CVD). Shift workers who are awake overnight and sleep during the day are misaligned with their body's endogenous circadian rhythm. Eating at night contributes to this increased risk of CVD by forcing the body to actively break down and process nutrients at night. This pilot study aims to determine whether altering meal timing overnight, in a shift working population, will impact favourably on modifiable risk factors for CVD (postprandial bplasma lipids and glucose concentration). A randomised cross-over study with two 4-week test periods, separated by a minimum of a 2-week washout will be undertaken. The effectiveness of redistributing energy intake overnight versus ad libitum eating patterns on CVD risk factors will be examined in night shift workers (n=20), using a standard acute test meal challenge protocol. Primary outcomes (postprandial lipids and glucose) will be compared between the two conditions: post-intervention and post-control period using analysis of variance. Potential effect size estimates to inform sample size calculations for a main trial will also be generated. Ethics approval has been granted by the Monash University Human Research Ethics Committee (2017-8619-10329). Outcomes from this study will determine whether eliminating food intake for a defined period at night (1-6 am) impacts favourably on metabolic risk factors for CVD in night shift workers. Collective results from this novel trial will be disseminated through peer-reviewed journals, and national and international presentations. The results are essential to inform health promotion policies and guidelines for shift workers, especially those who aim to improve their metabolic health. ACTRN12617000791336; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  16. Establishing a protocol for element determination in human nail clippings by neutron activation analysis

    International Nuclear Information System (INIS)

    Sanches, Thalita Pinheiro; Saiki, Mitiko

    2011-01-01

    Human nail samples have been analyzed to evaluate occupational exposure, nutritional status and to diagnose certain diseases. However, sampling and washing protocols for nail analyses vary from study to study not allowing comparisons between studies. One of the difficulties in analyzing nail samples is to eliminate only surface contamination without removing elements of interest in this tissue. In the present study, a protocol was defined in order to obtain reliable results of element concentrations in human nail clippings. Nail clippings collected from all 10 fingers or toes were previously pre cleaned using an ethyl alcohol solution to eliminate microbes. Then, the clippings were cut in small pieces and submitted to different reagents for washing by shaking. Neutron activation analysis (NAA) was applied for nail samples analysis which consisted of irradiating aliquots of samples together with synthetic elemental standards in the IEA-R1 nuclear research reactor followed by gamma ray spectrometry. Comparisons made between the results obtained for nails submitted to different reagents for cleaning indicated that the procedure using acetone and Triton X100 solution is more effective than that of nitric acid solution. Analyses in triplicates of a nail sample indicated results with relative standard deviations lower than 15% for most of elements, showing the homogeneity of the prepared sample. Qualitative analyses of different nail polishes showed that the presence of elements determined in the present study is negligible in these products. Quality control of the analytical results indicated that the applied NAA procedure is adequate for human nail analysis. (author)

  17. Effectiveness of protocols for preventing occupational exposure to blood and body fluids in Dutch hospitals

    NARCIS (Netherlands)

    van Gemert-Pijnen, Julia E.W.C.; Hendrix, M.G.R.; van der Palen, Jacobus Adrianus Maria; Schellens, P.J.

    2006-01-01

    Compliance of different healthcare workers (HCWs) (nurses, physicians, laboratory technicians and cleaners) with protocols to prevent exposure to blood and body fluids (BBF) was studied. Questionnaires were used to assess perception of risks, familiarity with protocols, motivation and actual

  18. Protocol for the management of psychiatric patients with psychomotor agitation.

    Science.gov (United States)

    Vieta, Eduard; Garriga, Marina; Cardete, Laura; Bernardo, Miquel; Lombraña, María; Blanch, Jordi; Catalán, Rosa; Vázquez, Mireia; Soler, Victòria; Ortuño, Noélia; Martínez-Arán, Anabel

    2017-09-08

    Psychomotor agitation (PMA) is a state of motor restlessness and mental tension that requires prompt recognition, appropriate assessment and management to minimize anxiety for the patient and reduce the risk for escalation to aggression and violence. Standardized and applicable protocols and algorithms can assist healthcare providers to identify patients at risk of PMA, achieve timely diagnosis and implement minimally invasive management strategies to ensure patient and staff safety and resolution of the episode. Spanish experts in PMA from different disciplines (psychiatrists, psychologists and nurses) convened in Barcelona for a meeting in April 2016. Based on recently issued international consensus guidelines on the standard of care for psychiatric patients with PMA, the meeting provided the opportunity to address the complexities in the assessment and management of PMA from different perspectives. The attendees worked towards producing a consensus for a unified approach to PMA according to the local standards of care and current local legislations. The draft protocol developed was reviewed and ratified by all members of the panel prior to its presentation to the Catalan Society of Psychiatry and Mental Health, the Spanish Society of Biological Psychiatry (SEPB) and the Spanish Network Centre for Research in Mental Health (CIBERSAM) for input. The final protocol and algorithms were then submitted to these organizations for endorsement. The protocol presented here provides guidance on the appropriate selection and use of pharmacological agents (inhaled/oral/IM), seclusion, and physical restraint for psychiatric patients suspected of or presenting with PMA. The protocol is applicable within the Spanish healthcare system. Implementation of the protocol and the constituent algorithms described here should ensure the best standard of care of patients at risk of PMA. Episodes of PMA could be identified earlier in their clinical course and patients could be managed in

  19. RISK ANALYSIS APPLIED IN OIL EXPLORATION AND PRODUCTION

    African Journals Online (AJOL)

    ES Obe

    aDepartment of Civil Engineering, University of Nigeria, Nsukka, Enugu State, Nigeria. ... The analysis in this work is ... risk analysis, oil field, risk management, projects, investment opportunity. 1. .... own merit but since the company has limited.

  20. Blocking Optimality in Distributed Real-Time Locking Protocols

    Directory of Open Access Journals (Sweden)

    Björn Bernhard Brandenburg

    2014-09-01

    Full Text Available Lower and upper bounds on the maximum priority inversion blocking (pi-blocking that is generally unavoidable in distributed multiprocessor real-time locking protocols (where resources may be accessed only from specific synchronization processors are established. Prior work on suspension-based shared-memory multiprocessor locking protocols (which require resources to be accessible from all processors has established asymptotically tight bounds of Ω(m and Ω(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively, where m denotes the total number of processors and n denotes the number of tasks. In this paper, it is shown that, in the case of distributed semaphore protocols, there exist two different task allocation scenarios that give rise to distinct lower bounds. In the case of co-hosted task allocation, where application tasks may also be assigned to synchronization processors (i.e., processors hosting critical sections, Ω(Φ · n maximum pi-blocking is unavoidable for some tasks under any locking protocol under both suspension-aware and suspension-oblivious schedulability analysis, where Φ denotes the ratio of the maximum response time to the shortest period. In contrast, in the case of disjoint task allocation (i.e., if application tasks may not be assigned to synchronization processors, only Ω(m and Ω(n maximum pi-blocking is fundamentally unavoidable under suspension-oblivious and suspension-aware analysis, respectively, as in the shared-memory case. These bounds are shown to be asymptotically tight with the construction of two new distributed real-time locking protocols that ensure O(m and O(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively.

  1. Split bolus technique in polytrauma: a prospective study on scan protocols for trauma analysis

    NARCIS (Netherlands)

    Beenen, Ludo F. M.; Sierink, Joanne C.; Kolkman, Saskia; Nio, C. Yung; Saltzherr, Teun Peter; Dijkgraaf, Marcel G. W.; Goslings, J. Carel

    2015-01-01

    For the evaluation of severely injured trauma patients a variety of total body computed tomography (CT) scanning protocols exist. Frequently multiple pass protocols are used. A split bolus contrast protocol can reduce the number of passes through the body, and thereby radiation exposure, in this

  2. Risk and protective factors associated with being a victim of aggression in the health sector. Research protocol

    Directory of Open Access Journals (Sweden)

    Giovanna Parmigiani

    2016-09-01

    Full Text Available Background: aggression against healthcare workers is an alarming issue worldwide. However, there is lack of data on psychological vulnerability factors (such as personality traits, attachment style which can constitute a risk or a protective factor for being a victim of an episode of violence in the health sector. Methods/design: the present protocol is a cross-sectional study on prevalence and characteristics of violent episodes experienced by nursing students in the clinical setting. Its aim is to identify risk and protective factors for becoming a victim of verbal and/or physical aggression among healthcare workers. Participants will undergo an intensive battery of psychometric tests, dealing with episodes of aggression in the previous year, attachment style, personality traits, perceived stress, health related quality of life and job strain. Conclusions: the findings derived from this study may be of value in identifying vulnerability factors in experiencing an episode of aggression in the health sector. In this respect, it is a step towards the development of valid training and support focused on health workers, aimed at teaching them how to modulate and manage their vulnerability factors in an efficient way.

  3. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation. Revised

    Science.gov (United States)

    Fargion, Giulietta S.; Mueller, James L.

    2000-01-01

    The document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparison and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. This document supersedes the earlier version (Mueller and Austin 1995) published as Volume 25 in the SeaWiFS Technical Report Series. This document marks a significant departure from, and improvement on, theformat and content of Mueller and Austin (1995). The authorship of the protocols has been greatly broadened to include experts specializing in some key areas. New chapters have been added to provide detailed and comprehensive protocols for stability monitoring of radiometers using portable sources, abovewater measurements of remote-sensing reflectance, spectral absorption measurements for discrete water samples, HPLC pigment analysis and fluorometric pigment analysis. Protocols were included in Mueller and Austin (1995) for each of these areas, but the new treatment makes significant advances in each topic area. There are also new chapters prescribing protocols for calibration of sun photometers and sky radiance sensors, sun photometer and sky radiance measurements and analysis, and data archival. These topic areas were barely mentioned in Mueller and Austin (1995).

  4. Effect of Fatigue Protocols on Lower Limb Neuromuscular Function and Implications for Anterior Cruciate Ligament Injury Prevention Training: A Systematic Review.

    Science.gov (United States)

    Barber-Westin, Sue D; Noyes, Frank R

    2017-12-01

    Approximately two-thirds of anterior cruciate ligament (ACL) tears are sustained during noncontact situations when an athlete is cutting, pivoting, decelerating, or landing from a jump. Some investigators have postulated that fatigue may result in deleterious alterations in lower limb biomechanics during these activities that could increase the risk of noncontact ACL injuries. However, prior studies have noted a wide variation in fatigue protocols, athletic tasks studied, and effects of fatigue on lower limb kinetics and kinematics. First, to determine if fatigue uniformly alters lower limb biomechanics during athletic tasks that are associated with noncontact ACL injuries. Second, to determine if changes should be made in ACL injury prevention training programs to alter the deleterious effects of fatigue on lower limb kinetics and kinematics. Systematic review; Level of evidence, 4. A systematic review of the literature using MEDLINE was performed. Key terms were fatigue, neuromuscular, exercise, hop test, and single-legged function tests. Inclusion criteria were original research studies involving healthy participants, use of a fatigue protocol, study of at least 1 lower limb task that involved landing from a hop or jump or cutting, and analysis of at least 1 biomechanical variable. Thirty-seven studies involving 806 athletes (485 female, 321 male; mean age, 22.7 years) met the inclusion criteria. General fatigue protocols were used in 20 investigations, peripheral protocols were used in 17 studies, and 21 different athletic tasks were studied (13 single-legged, 8 double-legged). There was no consistency among investigations regarding the effects of fatigue on hip, knee, or ankle joint angles and moments or surface electromyography muscle activation patterns. The fatigue protocols typically did not produce statistically significant changes in ground-reaction forces. Published fatigue protocols did not uniformly produce alterations in lower limb neuromuscular

  5. Establishment of a protocol for the gene expression analysis of laser microdissected rat kidney samples with affymetrix genechips

    International Nuclear Information System (INIS)

    Stemmer, Kerstin; Ellinger-Ziegelbauer, Heidrun; Lotz, Kerstin; Ahr, Hans-J.; Dietrich, Daniel R.

    2006-01-01

    Laser microdissection in conjunction with microarray technology allows selective isolation and analysis of specific cell populations, e.g., preneoplastic renal lesions. To date, only limited information is available on sample preparation and preservation techniques that result in both optimal histomorphological preservation of sections and high-quality RNA for microarray analysis. Furthermore, amplification of minute amounts of RNA from microdissected renal samples allowing analysis with genechips has only scantily been addressed to date. The objective of this study was therefore to establish a reliable and reproducible protocol for laser microdissection in conjunction with microarray technology using kidney tissue from Eker rats p.o. treated for 7 days and 6 months with 10 and 1 mg Aristolochic acid/kg bw, respectively. Kidney tissues were preserved in RNAlater or snap frozen. Cryosections were cut and stained with either H and E or cresyl violet for subsequent morphological and RNA quality assessment and laser microdissection. RNA quality was comparable in snap frozen and RNAlater-preserved samples, however, the histomorphological preservation of renal sections was much better following cryopreservation. Moreover, the different staining techniques in combination with sample processing time at room temperature can have an influence on RNA quality. Different RNA amplification protocols were shown to have an impact on gene expression profiles as demonstrated with Affymetrix Rat Genome 230 2 .0 arrays. Considering all the parameters analyzed in this study, a protocol for RNA isolation from laser microdissected samples with subsequent Affymetrix chip hybridization was established that was also successfully applied to preneoplastic lesions laser microdissected from Aristolochic acid-treated rats

  6. Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies.

    Science.gov (United States)

    Paté-Cornell, M-Elisabeth; Kuypers, Marshall; Smith, Matthew; Keller, Philip

    2018-02-01

    Managing cyber security in an organization involves allocating the protection budget across a spectrum of possible options. This requires assessing the benefits and the costs of these options. The risk analyses presented here are statistical when relevant data are available, and system-based for high-consequence events that have not happened yet. This article presents, first, a general probabilistic risk analysis framework for cyber security in an organization to be specified. It then describes three examples of forward-looking analyses motivated by recent cyber attacks. The first one is the statistical analysis of an actual database, extended at the upper end of the loss distribution by a Bayesian analysis of possible, high-consequence attack scenarios that may happen in the future. The second is a systems analysis of cyber risks for a smart, connected electric grid, showing that there is an optimal level of connectivity. The third is an analysis of sequential decisions to upgrade the software of an existing cyber security system or to adopt a new one to stay ahead of adversaries trying to find their way in. The results are distributions of losses to cyber attacks, with and without some considered countermeasures in support of risk management decisions based both on past data and anticipated incidents. © 2017 Society for Risk Analysis.

  7. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  8. Inter-comparison of NIOSH and IMPROVE protocols for OC and EC determination: implications for inter-protocol data conversion

    Science.gov (United States)

    Wu, Cheng; Huang, X. H. Hilda; Ng, Wai Man; Griffith, Stephen M.; Zhen Yu, Jian

    2016-09-01

    Organic carbon (OC) and elemental carbon (EC) are operationally defined by analytical methods. As a result, OC and EC measurements are protocol dependent, leading to uncertainties in their quantification. In this study, more than 1300 Hong Kong samples were analyzed using both National Institute for Occupational Safety and Health (NIOSH) thermal optical transmittance (TOT) and Interagency Monitoring of Protected Visual Environment (IMPROVE) thermal optical reflectance (TOR) protocols to explore the cause of EC disagreement between the two protocols. EC discrepancy mainly (83 %) arises from a difference in peak inert mode temperature, which determines the allocation of OC4NSH, while the rest (17 %) is attributed to a difference in the optical method (transmittance vs. reflectance) applied for the charring correction. Evidence shows that the magnitude of the EC discrepancy is positively correlated with the intensity of the biomass burning signal, whereby biomass burning increases the fraction of OC4NSH and widens the disagreement in the inter-protocol EC determination. It is also found that the EC discrepancy is positively correlated with the abundance of metal oxide in the samples. Two approaches (M1 and M2) that translate NIOSH TOT OC and EC data into IMPROVE TOR OC and EC data are proposed. M1 uses direct relationship between ECNSH_TOT and ECIMP_TOR for reconstruction: M1 : ECIMP_TOR = a × ECNSH_TOT + b; while M2 deconstructs ECIMP_TOR into several terms based on analysis principles and applies regression only on the unknown terms: M2 : ECIMP_TOR = AECNSH + OC4NSH - (a × PCNSH_TOR + b), where AECNSH, apparent EC by the NIOSH protocol, is the carbon that evolves in the He-O2 analysis stage, OC4NSH is the carbon that evolves at the fourth temperature step of the pure helium analysis stage of NIOSH, and PCNSH_TOR is the pyrolyzed carbon as determined by the NIOSH protocol. The implementation of M1 to all urban site data (without considering seasonal specificity

  9. Urban flooding and health risk analysis by use of quantitative microbial risk assessment

    DEFF Research Database (Denmark)

    Andersen, Signe Tanja

    D thesis is to identify the limitations and possibilities for optimising microbial risk assessments of urban flooding through more evidence-based solutions, including quantitative microbial data and hydrodynamic water quality models. The focus falls especially on the problem of data needs and the causes......, but also when wading through a flooded area. The results in this thesis have brought microbial risk assessments one step closer to more uniform and repeatable risk analysis by using actual and relevant measured data and hydrodynamic water quality models to estimate the risk from flooding caused...... are expected to increase in the future. To ensure public health during extreme rainfall, solutions are needed, but limited knowledge on microbial water quality, and related health risks, makes it difficult to implement microbial risk analysis as a part of the basis for decision making. The main aim of this Ph...

  10. A pilot test of the new Swiss regulatory procedure for categorizing clinical trials by risk: A randomized controlled trial.

    Science.gov (United States)

    Cevallos, Myriam; Züllig, Stephanie; Christen, Andri; Meier, Brigitte E; Goetz, Martin; Coslovsky, Michael; Trelle, Sven

    2015-12-01

    Several countries are working to adapt clinical trial regulations to align the approval process to the level of risk for trial participants. The optimal framework to categorize clinical trials according to risk remains unclear, however. Switzerland is the first European country to adopt a risk-based categorization procedure in January 2014. We assessed how accurately and consistently clinical trials are categorized using two different approaches: an approach using criteria set forth in the new law (concept) or an intuitive approach (ad hoc). This was a randomized controlled trial with a method-comparison study nested in each arm. We used clinical trial protocols from eight Swiss ethics committees approved between 2010 and 2011. Protocols were randomly assigned to be categorized in one of three risk categories using the concept or the ad hoc approach. Each protocol was independently categorized by the trial's sponsor, a group of experts and the approving ethics committee. The primary outcome was the difference in categorization agreement between the expert group and sponsors across arms. Linear weighted kappa was used to quantify agreements, with the difference between kappas being the primary effect measure. We included 142 of 231 protocols in the final analysis (concept=78; ad hoc=64). Raw agreement between the expert group and sponsors was 0.74 in the concept and 0.78 in the ad hoc arm. Chance-corrected agreement was higher in the ad hoc (kappa: 0.34 (95% confidence interval=0.10-0.58)) than in the concept arm (0.27 (0.06-0.50)), but the difference was not significant (p=0.67). The main limitation was the large number of protocols excluded from the analysis mostly because they did not fit with the clinical trial definition of the new law. A structured risk categorization approach was not better than an ad hoc approach. Laws introducing risk-based approaches should provide guidelines, examples and templates to ensure correct application. © The Author(s) 2015.

  11. Evaluation of a Progressive Mobility Protocol in Postoperative Cardiothoracic Surgical Patients.

    Science.gov (United States)

    Floyd, Shawn; Craig, Sarah W; Topley, Darla; Tullmann, Dorothy

    2016-01-01

    Cardiothoracic surgical patients are at high risk for complications related to immobility, such as increased intensive care and hospital length of stay, intensive care unit readmission, pressure ulcer development, and deep vein thrombosis/pulmonary embolus. A progressive mobility protocol was started in the thoracic cardiovascular intensive care unit in a rural academic medical center. The purpose of the progressive mobility protocol was to increase mobilization of postoperative patients and decrease complications related to immobility in this unique patient population. A matched-pairs design was used to compare a randomly selected sample of the preintervention group (n = 30) to a matched postintervention group (n = 30). The analysis compared outcomes including intensive care unit and hospital length of stay, intensive care unit readmission occurrence, pressure ulcer prevalence, and deep vein thrombosis/pulmonary embolism prevalence between the 2 groups. Although this comparison does not achieve statistical significance (P mobility. This study has implications for nursing, hospital administration, and therapy services with regard to staffing and cost savings related to fewer complications of immobility. Future studies with a larger sample size and other populations are warranted.

  12. The accident of stereotaxic radiosurgery at the University hospital center of Toulouse. Expert report n.2. Dosimetric and clinical evaluation. Risk analysis

    International Nuclear Information System (INIS)

    2008-01-01

    The regional center of stereotaxic radiosurgery (C.R.R.S.) of the University hospital center (C.H.U.) of Toulouse is equipped since april 2006 with a Novalis accelerator (Brainlab) devoted to radiosurgery and intra skull stereotaxic radiotherapy.In april 2007, during an intercomparison of dosimetry files coming from various sites, the Brainlab society detects an anomaly. The analysis made by the society concludes to the use of an unsuited detector for the measurement of a dosimetry parameter during the accelerator initial calibration. Following this error, 145 patients (on 172 patients treated since the center opening) suffer of an overdose whom importance is variable. On the 26. june 2007 the Authority of nuclear safety (Asn) requires an expertise on the following points: checking of the experimental protocols of micro-beams calibration before and after correction of the dysfunction; analysis at the theoretical level of the neurological complications risk at long term for the exposed patients. The second point of this request is the subject of this report. It gives the synthesis of the whole of information, at the clinical and dosimetric level and outlines successively: the expertise methodology; the cohort of patients treated at the C.R.R.S.; the parameters of the risk analysis of neurological complications; the different risk analysis according the pathologies treated at the C.R.R.S.; the recommendations. (N.C.)

  13. Probabilistic risk analysis in chemical engineering

    International Nuclear Information System (INIS)

    Schmalz, F.

    1991-01-01

    In risk analysis in the chemical industry, recognising potential risks is considered more important than assessing their quantitative extent. Even in assessing risks, emphasis is not on the probability involved but on the possible extent. Qualitative assessment has proved valuable here. Probabilistic methods are used in individual cases where the wide implications make it essential to be able to assess the reliability of safety precautions. In this case, assessment therefore centres on the reliability of technical systems and not on the extent of a chemical risk. 7 figs

  14. Method for environmental risk analysis (MIRA) revision 2007

    International Nuclear Information System (INIS)

    2007-04-01

    OLF's instruction manual for carrying out environmental risk analyses provides a united approach and a common framework for environmental risk assessments. This is based on the best information available. The manual implies standardizations of a series of parameters, input data and partial analyses that are included in the environmental risk analysis. Environmental risk analyses carried out according to the MIRA method will thus be comparable between fields and between companies. In this revision an update of the text in accordance with today's practice for environmental risk analyses and prevailing regulations is emphasized. Moreover, method adjustments for especially protected beach habitats have been introduced, as well as a general method for estimating environmental risk concerning fish. Emphasis has also been put on improving environmental risk analysis' possibilities to contribute to a better management of environmental risk in the companies (ml)

  15. Comparison and analysis of reoperations in two different treatment protocols for trochanteric hip fractures - postoperative technical complications with dynamic hip screw, intramedullary nail and Medoff sliding plate.

    Science.gov (United States)

    Paulsson, Johnny; Stig, Josefine Corin; Olsson, Ola

    2017-08-24

    In treatment of unstable trochanteric fractures dynamic hip screw and Medoff sliding plate devices are designed to allow secondary fracture impaction, whereas intramedullary nails aim to maintain fracture alignment. Different treatment protocols are used by two similar Swedish regional emergency care hospitals. Dynamic hip screw is used for fractures considered as stable within the respective treatment protocol, whereas one treatment protocol (Medoff sliding plate/dynamic hip screw) uses biaxial Medoff sliding plate for unstable pertrochanteric fractures and uniaxial Medoff sliding plate for subtrochanteric fractures, the second (intramedullary nail/dynamic hip screw) uses intramedullary nail for subtrochanteric fractures and for pertrochanteric fractures with intertrochanteric comminution or subtrochanteric extension. All orthopedic surgeries are registered in a regional database. All consecutive trochanteric fracture operations during 2011-2012 (n = 856) and subsequent technical reoperations (n = 40) were derived from the database. Reoperations were analysed and classified into the categories adjustment (percutaneous removal of the locking screw of the Medoff sliding plate or the intramedullary nail, followed by fracture healing) or minor, intermediate (reosteosynthesis) or major (hip joint replacement, Girdlestone or persistent nonunion) technical complications. The relative risk of intermediate or major technical complications was 4.2 (1.2-14) times higher in unstable pertrochanteric fractures and 4.6 (1.1-19) times higher in subtrochanteric fractures with treatment protocol: intramedullary nail/dynamic hip screw, compared to treatment protocol: Medoff sliding plate/dynamic hip screw. Overall rates of intermediate and major technical complications in unstable pertrochanteric and subtrochanteric fractures were with biaxial Medoff sliding plate 0.68%, with uniaxial Medoff sliding plate 1.4%, with dynamic hip screw 3.4% and with intramedullary nail 7.2%. The

  16. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  17. Development of a Ground Test and Analysis Protocol for NASA's NextSTEP Phase 2 Habitation Concepts

    Science.gov (United States)

    Gernhardt, Michael L.; Beaton, Kara H.; Chappell, Steven P.; Bekdash, Omar S.; Abercromby, Andrew F. J.

    2018-01-01

    The NASA Next Space Technologies for Exploration Partnerships (NextSTEP) program is a public-private partnership model that seeks commercial development of deep space exploration capabilities to support human spaceflight missions around and beyond cislunar space. NASA first issued the Phase 1 NextSTEP Broad Agency Announcement to U.S. industries in 2014, which called for innovative cislunar habitation concepts that leveraged commercialization plans for low-Earth orbit. These habitats will be part of the Deep Space Gateway (DSG), the cislunar space station planned by NASA for construction in the 2020s. In 2016, Phase 2 of the NextSTEP program selected five commercial partners to develop ground prototypes. A team of NASA research engineers and subject matter experts (SMEs) have been tasked with developing the ground-test protocol that will serve as the primary means by which these Phase 2 prototypes will be evaluated. Since 2008, this core test team has successfully conducted multiple spaceflight analog mission evaluations utilizing a consistent set of operational tools, methods, and metrics to enable the iterative development, testing, analysis, and validation of evolving exploration architectures, operations concepts, and vehicle designs. The purpose of implementing a similar evaluation process for the Phase 2 Habitation Concepts is to consistently evaluate different commercial partner ground prototypes to provide data-driven, actionable recommendations for Phase 3. This paper describes the process by which the ground test protocol was developed and the objectives, methods, and metrics by which the NextSTEP Phase 2 Habitation Concepts will be rigorously and systematically evaluated. The protocol has been developed using both a top-down and bottom-up approach. Top-down development began with the Human Exploration and Operations Mission Directorate (HEOMD) exploration objectives and ISS Exploration Capability Study Team (IECST) candidate flight objectives. Strategic

  18. Evaluating the risks of clinical research: direct comparative analysis.

    Science.gov (United States)

    Rid, Annette; Abdoler, Emily; Roberson-Nay, Roxann; Pine, Daniel S; Wendler, David

    2014-09-01

    Many guidelines and regulations allow children and adolescents to be enrolled in research without the prospect of clinical benefit when it poses minimal risk. However, few systematic methods exist to determine when research risks are minimal. This situation has led to significant variation in minimal risk judgments, raising concern that some children are not being adequately protected. To address this concern, we describe a new method for implementing the widely endorsed "risks of daily life" standard for minimal risk. This standard defines research risks as minimal when they do not exceed the risks posed by daily life activities or routine examinations. This study employed a conceptual and normative analysis, and use of an illustrative example. Different risks are composed of the same basic elements: Type, likelihood, and magnitude of harm. Hence, one can compare the risks of research and the risks of daily life by comparing the respective basic elements with each other. We use this insight to develop a systematic method, direct comparative analysis, for implementing the "risks of daily life" standard for minimal risk. The method offers a way of evaluating research procedures that pose the same types of risk as daily life activities, such as the risk of experiencing anxiety, stress, or other psychological harm. We thus illustrate how direct comparative analysis can be applied in practice by using it to evaluate whether the anxiety induced by a respiratory CO2 challenge poses minimal or greater than minimal risks in children and adolescents. Direct comparative analysis is a systematic method for applying the "risks of daily life" standard for minimal risk to research procedures that pose the same types of risk as daily life activities. It thereby offers a method to protect children and adolescents in research, while ensuring that important studies are not blocked because of unwarranted concerns about research risks.

  19. Effectiveness of a healthy lifestyle intervention for low back pain and osteoarthritis of the knee: protocol and statistical analysis plan for two randomised controlled trials

    Directory of Open Access Journals (Sweden)

    Kate M. O’Brien

    Full Text Available ABSTRACT Background These trials are the first randomised controlled trials of telephone-based weight management and healthy lifestyle interventions for low back pain and knee osteoarthritis. This article describes the protocol and statistical analysis plan. Method These trials are parallel randomised controlled trials that investigate and compare the effect of a telephone-based weight management and healthy lifestyle intervention for improving pain intensity in overweight or obese patients with low back pain or knee osteoarthritis. The analysis plan was finalised prior to initiation of analyses. All data collected as part of the trial were reviewed, without stratification by group, and classified by baseline characteristics, process of care and trial outcomes. Trial outcomes were classified as primary and secondary outcomes. Appropriate descriptive statistics and statistical testing of between-group differences, where relevant, have been planned and described. Conclusions A protocol for standard analyses was developed for the results of two randomised controlled trials. This protocol describes the data, and the pre-determined statistical tests of relevant outcome measures. The plan demonstrates transparent and verifiable use of the data collected. This a priori protocol will be followed to ensure rigorous standards of data analysis are strictly adhered to.

  20. Effectiveness of a healthy lifestyle intervention for low back pain and osteoarthritis of the knee: protocol and statistical analysis plan for two randomised controlled trials

    Science.gov (United States)

    O’Brien, Kate M.; Williams, Amanda; Wiggers, John; Wolfenden, Luke; Yoong, Serene; Campbell, Elizabeth; Kamper, Steven J.; McAuley, James; Attia, John; Oldmeadow, Chris; Williams, Christopher M.

    2016-01-01

    ABSTRACT Background These trials are the first randomised controlled trials of telephone-based weight management and healthy lifestyle interventions for low back pain and knee osteoarthritis. This article describes the protocol and statistical analysis plan. Method These trials are parallel randomised controlled trials that investigate and compare the effect of a telephone-based weight management and healthy lifestyle intervention for improving pain intensity in overweight or obese patients with low back pain or knee osteoarthritis. The analysis plan was finalised prior to initiation of analyses. All data collected as part of the trial were reviewed, without stratification by group, and classified by baseline characteristics, process of care and trial outcomes. Trial outcomes were classified as primary and secondary outcomes. Appropriate descriptive statistics and statistical testing of between-group differences, where relevant, have been planned and described. Conclusions A protocol for standard analyses was developed for the results of two randomised controlled trials. This protocol describes the data, and the pre-determined statistical tests of relevant outcome measures. The plan demonstrates transparent and verifiable use of the data collected. This a priori protocol will be followed to ensure rigorous standards of data analysis are strictly adhered to. PMID:27683839

  1. Risk Analysis for Unintentional Slide Deployment During Airline Operations.

    Science.gov (United States)

    Ayra, Eduardo S; Insua, David Ríos; Castellanos, María Eugenia; Larbi, Lydia

    2015-09-01

    We present a risk analysis undertaken to mitigate problems in relation to the unintended deployment of slides under normal operations within a commercial airline. This type of incident entails relevant costs for the airline industry. After assessing the likelihood and severity of its consequences, we conclude that such risks need to be managed. We then evaluate the effectiveness of various countermeasures, describing and justifying the chosen ones. We also discuss several issues faced when implementing and communicating the proposed measures, thus fully illustrating the risk analysis process. © 2015 Society for Risk Analysis.

  2. SIMULATION AND ANALYSIS OF GREEDY ROUTING PROTOCOL IN VIEW OF ENERGY CONSUMPTION AND NETWORK LIFETIME IN THREE DIMENSIONAL UNDERWATER WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    SHEENA KOHLI

    2017-11-01

    Full Text Available Underwater Wireless Sensor Network (UWSN comprises of a number of miniature sized sensing devices deployed in the sea or ocean, connected by dint of acoustic links to each other. The sensors trap the ambient conditions and transmit the data from one end to another. For transmission of data in any medium, routing protocols play a crucial role. Moreover, being battery limited, an unavoidable parameter to be considered in operation and analysis of protocols is the network energy and the network lifetime. The paper discusses the greedy routing protocol for underwater wireless sensor networks. The simulation of this routing protocol also takes into consideration the characteristics of acoustic communication like attenuation, transmission loss, signal to noise ratio, noise, propagation delay. The results from these observations may be used to construct an accurate underwater communication model.

  3. Mare Risk Analysis monitor

    International Nuclear Information System (INIS)

    Fuente Prieto, I.; Alonso, P.; Carretero Fernandino, J. A.

    2000-01-01

    The Nuclear Safety Council's requirement that Spanish power plants comply with the requirements of the Maintenance Rule associated with plant risk assessment during power operation, arising from the partial unavailability of systems due to the maintenance activities, has led to need for additional tools to facilitate compliance with said requirements. While the impact on risk produced by individual equipment unavailabilities can easily be evaluated, either qualitatively or quantitatively, the process becomes more complicated when un programmed unavailabilities simultaneously occur in various systems, making it necessary to evaluate their functional impact. It is especially complex in the case of support systems that can affect the functionality of multiple systems. In view of the above, a computer application has been developed that is capable of providing the operator with quick answers based on the specific plant model in order to allow fast risk assessment using the information compiled as part of the Probabilistic Safety Analysis. The paper describes the most important characteristics of this application and the basic design requirements of the MARE Risk Monitor. (Author)

  4. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  5. Development of a systematic observation protocol of physical exposure of the back: a preliminary study.

    Science.gov (United States)

    Tousignant, M; Tougas, G; Rossignol, M; Goulet, L

    2002-04-01

    At present there is no systematic observation protocol for the assessment of the multi-factorial aspects of physical exposure related to the back used within the constraints of occupational epidemiological research. In this context, a new preliminary systematic observation protocol is proposed to assess exposure to physical loading of the back using nine categories of physical risk factors: the SOPE back protocol. The objective of this study was to investigate whether the new protocol can correctly identify the level of exposure related to measured physical loading of the back. The subjects of this closed cohort study were 451 manual workers at a natural gas distribution company. The assessment of exposure was made with the protocol using groups with different job titles. The workers were followed for a 2 yr period to establish the risk of a new occurrence of complete disability related to the back (NOCD back injury) in each job grouping. Based on the median of the total scores derived from the protocol, two levels of exposure were identified (high and low). Taking into account the limitations of this study, the protocol in development may be a good tool to establish two levels of exposure to physical loading of the back in large epidemiological studies of occupational low back pain. Further research is needed to replicate these results with larger samples and to test the reliability and predictive validity of the protocol.

  6. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  7. Bayesian-network-based safety risk analysis in construction projects

    International Nuclear Information System (INIS)

    Zhang, Limao; Wu, Xianguo; Skibniewski, Miroslaw J.; Zhong, Jingbing; Lu, Yujie

    2014-01-01

    This paper presents a systemic decision support approach for safety risk analysis under uncertainty in tunnel construction. Fuzzy Bayesian Networks (FBN) is used to investigate causal relationships between tunnel-induced damage and its influential variables based upon the risk/hazard mechanism analysis. Aiming to overcome limitations on the current probability estimation, an expert confidence indicator is proposed to ensure the reliability of the surveyed data for fuzzy probability assessment of basic risk factors. A detailed fuzzy-based inference procedure is developed, which has a capacity of implementing deductive reasoning, sensitivity analysis and abductive reasoning. The “3σ criterion” is adopted to calculate the characteristic values of a triangular fuzzy number in the probability fuzzification process, and the α-weighted valuation method is adopted for defuzzification. The construction safety analysis progress is extended to the entire life cycle of risk-prone events, including the pre-accident, during-construction continuous and post-accident control. A typical hazard concerning the tunnel leakage in the construction of Wuhan Yangtze Metro Tunnel in China is presented as a case study, in order to verify the applicability of the proposed approach. The results demonstrate the feasibility of the proposed approach and its application potential. A comparison of advantages and disadvantages between FBN and fuzzy fault tree analysis (FFTA) as risk analysis tools is also conducted. The proposed approach can be used to provide guidelines for safety analysis and management in construction projects, and thus increase the likelihood of a successful project in a complex environment. - Highlights: • A systemic Bayesian network based approach for safety risk analysis is developed. • An expert confidence indicator for probability fuzzification is proposed. • Safety risk analysis progress is extended to entire life cycle of risk-prone events. • A typical

  8. On the validation of risk analysis-A commentary

    International Nuclear Information System (INIS)

    Rosqvist, Tony

    2010-01-01

    Aven and Heide (2009) [1] provided interesting views on the reliability and validation of risk analysis. The four validation criteria presented are contrasted with modelling features related to the relative frequency-based and Bayesian approaches to risk analysis. In this commentary I would like to bring forth some issues on validation that partly confirm and partly suggest changes in the interpretation of the introduced validation criteria-especially, in the context of low probability-high consequence systems. The mental model of an expert in assessing probabilities is argued to be a key notion in understanding the validation of a risk analysis.

  9. Quantitative risk assessment using the capacity-demand analysis

    International Nuclear Information System (INIS)

    Morgenroth, M.; Donnelly, C.R.; Westermann, G.D.; Huang, J.H.S.; Lam, T.M.

    1999-01-01

    The hydroelectric industry's recognition of the importance of avoiding unexpected failure, or forced outages, led to the development of probabilistic, or risk-based, methods in order to attempt to quantify exposures. Traditionally, such analysis has been carried out by qualitative assessments, relying on experience and sound engineering judgment to determine the optimum time to maintain, repair or replace a part or system. Depending on the nature of the problem, however, and the level of experience of those included in the decision making process, it is difficult to find a balance between acting proactively and accepting some amount of risk. The development of a practical means for establishing the probability of failure of any part or system, based on the determination of the statistical distribution of engineering properties such as acting stresses, is discussed. The capacity-demand analysis methodology, coupled with probablistic, risk-based analysis, permits all the factors associated with a decision to rehabilitate or replace a part, including the risks associated with the timing of the decision, to be assessed in a transparent and defendable manner. The methodology does not eliminate judgment altogether, but does move it from the level of estimating the risk of failure to the lower level of estimating variability in material properties, uncertainty in loading, and the uncertainties inherent in any engineering analysis. The method was successfully used in 1998 to carry out a comprehensive, economic risk analysis for the entire water conveyance system of a 90 year old hydropower station. The analysis included a number of diverse parts ranging from rock slopes and aging steel and concrete conduits, and the method allowed a rational assessment of the risks associated with reach of these varied parts to be determined, permitting the essential remedial works to be prioritized. 14 refs., 4 figs

  10. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  11. Atlas-based analysis of cardiac shape and function: correction of regional shape bias due to imaging protocol for population studies.

    Science.gov (United States)

    Medrano-Gracia, Pau; Cowan, Brett R; Bluemke, David A; Finn, J Paul; Kadish, Alan H; Lee, Daniel C; Lima, Joao A C; Suinesiaputra, Avan; Young, Alistair A

    2013-09-13

    Cardiovascular imaging studies generate a wealth of data which is typically used only for individual study endpoints. By pooling data from multiple sources, quantitative comparisons can be made of regional wall motion abnormalities between different cohorts, enabling reuse of valuable data. Atlas-based analysis provides precise quantification of shape and motion differences between disease groups and normal subjects. However, subtle shape differences may arise due to differences in imaging protocol between studies. A mathematical model describing regional wall motion and shape was used to establish a coordinate system registered to the cardiac anatomy. The atlas was applied to data contributed to the Cardiac Atlas Project from two independent studies which used different imaging protocols: steady state free precession (SSFP) and gradient recalled echo (GRE) cardiovascular magnetic resonance (CMR). Shape bias due to imaging protocol was corrected using an atlas-based transformation which was generated from a set of 46 volunteers who were imaged with both protocols. Shape bias between GRE and SSFP was regionally variable, and was effectively removed using the atlas-based transformation. Global mass and volume bias was also corrected by this method. Regional shape differences between cohorts were more statistically significant after removing regional artifacts due to imaging protocol bias. Bias arising from imaging protocol can be both global and regional in nature, and is effectively corrected using an atlas-based transformation, enabling direct comparison of regional wall motion abnormalities between cohorts acquired in separate studies.

  12. System risk evolution analysis and risk critical event identification based on event sequence diagram

    International Nuclear Information System (INIS)

    Luo, Pengcheng; Hu, Yang

    2013-01-01

    During system operation, the environmental, operational and usage conditions are time-varying, which causes the fluctuations of the system state variables (SSVs). These fluctuations change the accidents’ probabilities and then result in the system risk evolution (SRE). This inherent relation makes it feasible to realize risk control by monitoring the SSVs in real time, herein, the quantitative analysis of SRE is essential. Besides, some events in the process of SRE are critical to system risk, because they act like the “demarcative points” of safety and accident, and this characteristic makes each of them a key point of risk control. Therefore, analysis of SRE and identification of risk critical events (RCEs) are remarkably meaningful to ensure the system to operate safely. In this context, an event sequence diagram (ESD) based method of SRE analysis and the related Monte Carlo solution are presented; RCE and risk sensitive variable (RSV) are defined, and the corresponding identification methods are also proposed. Finally, the proposed approaches are exemplified with an accident scenario of an aircraft getting into the icing region

  13. Instability risk analysis and risk assessment system establishment of underground storage caverns in bedded salt rock

    Science.gov (United States)

    Jing, Wenjun; Zhao, Yan

    2018-02-01

    Stability is an important part of geotechnical engineering research. The operating experiences of underground storage caverns in salt rock all around the world show that the stability of the caverns is the key problem of safe operation. Currently, the combination of theoretical analysis and numerical simulation are the mainly adopts method of reserve stability analysis. This paper introduces the concept of risk into the stability analysis of underground geotechnical structure, and studies the instability of underground storage cavern in salt rock from the perspective of risk analysis. Firstly, the definition and classification of cavern instability risk is proposed, and the damage mechanism is analyzed from the mechanical angle. Then the main stability evaluating indicators of cavern instability risk are proposed, and an evaluation method of cavern instability risk is put forward. Finally, the established cavern instability risk assessment system is applied to the analysis and prediction of cavern instability risk after 30 years of operation in a proposed storage cavern group in the Huai’an salt mine. This research can provide a useful theoretical base for the safe operation and management of underground storage caverns in salt rock.

  14. Analysis of risk factors and risk assessment for ischemic stroke recurrence

    Directory of Open Access Journals (Sweden)

    Xiu-ying LONG

    2016-08-01

    Full Text Available Objective To screen the risk factors for recurrence of ischemic stroke and to assess the risk of recurrence. Methods Essen Stroke Risk Score (ESRS was used to evaluate the risk of recurrence in 176 patients with ischemic stroke (96 cases of first onset and 80 cases of recurrence. Univariate and multivariate stepwise Logistic regression analysis was used to screen risk factors for recurrence of ischemic stroke.  Results There were significant differences between first onset group and recurrence group on age, the proportion of > 75 years old, hypertension, diabetes, coronary heart disease, peripheral angiopathy, transient ischemic attack (TIA or ischemic stroke, drinking and ESRS score (P < 0.05, for all. First onset group included one case of ESRS 0 (1.04%, 8 cases of 1 (8.33%, 39 cases of 2 (40.63%, 44 cases of 3 (45.83%, 4 cases of 4 (4.17%. Recurrence group included 2 cases of ESRS 3 (2.50%, 20 cases of 4 (25% , 37 cases of 5 (46.25% , 18 cases of 6 (22.50% , 3 cases of 7 (3.75% . There was significant difference between 2 groups (Z = -11.376, P = 0.000. Logistic regression analysis showed ESRS > 3 score was independent risk factor for recurrence of ischemic stroke (OR = 31.324, 95%CI: 3.934-249.430; P = 0.001.  Conclusions ESRS > 3 score is the independent risk factor for recurrence of ischemic stroke. It is important to strengthen risk assessment of recurrence of ischemic stroke. To screen and control risk factors is the key to secondary prevention of ischemic stroke. DOI: 10.3969/j.issn.1672-6731.2016.07.011

  15. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  16. Risk analysis of industrial plants operation

    International Nuclear Information System (INIS)

    Hubert, Philippe

    1989-12-01

    This study examines the possibilities of systematic technology risk analysis in view of territorial management (city, urban community, region), including chronic and accidental risks. The objective was to relate this evaluation with those done for permanent water and air pollution. Risk management for pollution are done for a long time. A number of studies were done in urban communities and regions both for air and water pollution. The second objective is related to management of industrial risks: nuclear, petrochemical, transport of hazardous material, pipelines, etc. At the beginning, three possibilities of effects are taken into account: human health, economic aspect and water, and possibilities of evaluation are identified. Elements of risk identification are presented for quantification of results [fr

  17. [Survival analysis with competing risks: estimating failure probability].

    Science.gov (United States)

    Llorca, Javier; Delgado-Rodríguez, Miguel

    2004-01-01

    To show the impact of competing risks of death on survival analysis. We provide an example of survival time without chronic rejection after heart transplantation, where death before rejection acts as a competing risk. Using a computer simulation, we compare the Kaplan-Meier estimator and the multiple decrement model. The Kaplan-Meier method overestimated the probability of rejection. Next, we illustrate the use of the multiple decrement model to analyze secondary end points (in our example: death after rejection). Finally, we discuss Kaplan-Meier assumptions and why they fail in the presence of competing risks. Survival analysis should be adjusted for competing risks of death to avoid overestimation of the risk of rejection produced with the Kaplan-Meier method.

  18. Quantitative risk analysis of a space shuttle subsystem

    International Nuclear Information System (INIS)

    Frank, M.V.

    1989-01-01

    This paper reports that in an attempt to investigate methods for risk management other than qualitative analysis techniques, NASA has funded pilot study quantitative risk analyses for space shuttle subsystems. The authors performed one such study of two shuttle subsystems with McDonnell Douglas Astronautics Company. The subsystems were the auxiliary power units (APU) on the orbiter, and the hydraulic power units on the solid rocket booster. The technology and results of the APU study are presented in this paper. Drawing from a rich in-flight database as well as from a wealth of tests and analyses, the study quantitatively assessed the risk of APU-initiated scenarios on the shuttle during all phases of a flight mission. Damage states of interest were loss of crew/vehicle, aborted mission, and launch scrub. A quantitative risk analysis approach to deciding on important items for risk management was contrasted with the current NASA failure mode and effects analysis/critical item list approach

  19. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  20. New algorithm for risk analysis in radiotherapy

    International Nuclear Information System (INIS)

    Torres, Antonio; Montes de Oca, Joe

    2015-01-01

    Risk analyses applied to radiotherapy treatments have become an undeniable necessity, considering the dangers generated by the combination of using powerful radiation fields on patients and the occurrence of human errors and equipment failures during these treatments. The technique par excellence to execute these analyses has been the risk matrix. This paper presents the development of a new algorithm to execute the task with wide graphic and analytic potentialities, thus transforming it into a very useful option for risk monitoring and the optimization of quality assurance. The system SECURE- MR, which is the basic software of this algorithm, has been successfully used in risk analysis regarding different kinds of radiotherapies. Compared to previous methods, It offers new possibilities of analysis considering risk controlling factors as the robustness of reducers of initiators frequency and its consequences. Their analytic capacities and graphs allow novel developments to classify risk contributing factors, to represent information processes as well as accidental sequences. The paper shows the application of the proposed system to a generic process of radiotherapy treatment using a lineal accelerator. (author)

  1. Modeling issues in nuclear plant fire risk analysis

    International Nuclear Information System (INIS)

    Siu, N.

    1989-01-01

    This paper discusses various issues associated with current models for analyzing the risk due to fires in nuclear power plants. Particular emphasis is placed on the fire growth and suppression models, these being unique to the fire portion of the overall risk analysis. Potentially significant modeling improvements are identified; also discussed are a variety of modeling issues where improvements will help the credibility of the analysis, without necessarily changing the computed risk significantly. The mechanistic modeling of fire initiation is identified as a particularly promising improvement for reducing the uncertainties in the predicted risk. 17 refs., 5 figs. 2 tabs

  2. Comparative risk analysis for the Rocky Flats Plant integrated project planning

    International Nuclear Information System (INIS)

    Jones, M.E.; Shain, D.I.

    1994-01-01

    The Rocky Flats Plant is developing, with active stakeholder participation, a comprehensive planning strategy that will support transition of the Rocky Flats Plant from a nuclear weapons production facility to site cleanup and final disposition. Consideration of the interrelated nature of sitewide problems, such as material movement and disposition, facility and land use endstates, costs, relative risks to workers and the public, and waste disposition are all needed. Comparative Risk Analysis employs both incremental risk and cumulative risk evaluations to compare risks from postulated options or endstates and is an analytical tool for the Rocky Flats Plant Integrated Project Planning which can assist a decision-maker in evaluating relative risks among proposed remediation activity. However, risks from all of the remediation activities, decontamination and decommissioning activities, and normal ongoing operations are imposed upon the Rocky Flats workers, the surrounding public, and the environment. Comparative Risk Analysis will provide risk information, both human health and ecological, to aid in reducing unnecessary resource and monetary expenditures by focusing these resources on the largest risks first. Comparative Risk Analysis has been developed to aggregate various incremental risk estimates to develop a site cumulative risk estimate. The Comparative Risk Analysis methodology Group, consisting of community stakeholders, was established. Early stakeholder involvement in the risk analysis methodology development provides an opportunity for stakeholders to influence the risk information delivered to a decision-maker. This paper discusses development of the Comparative Risk Analysis methodology, stakeholder participation and lessons learned from these challenges

  3. Is there an increased risk of post-operative surgical site infection after orthopaedic surgery in HIV patients? A systematic review and meta-analysis.

    Science.gov (United States)

    Kigera, James W M; Straetemans, Masja; Vuhaka, Simplice K; Nagel, Ingeborg M; Naddumba, Edward K; Boer, Kimberly

    2012-01-01

    There is dilemma as to whether patients infected with the Human Immunodeficiency Virus (HIV) requiring implant orthopaedic surgery are at an increased risk for post-operative surgical site infection (SSI). We conducted a systematic review to determine the effect of HIV on the risk of post-operative SSI and sought to determine if this risk is altered by antibiotic use beyond 24 hours. We searched electronic databases, manually searched citations from relevant articles, and reviewed conference proceedings. The risk of postoperative SSI was pooled using Mantel-Haenszel method. We identified 18 cohort studies with 16 mainly small studies, addressing the subject. The pooled risk ratio of infection in the HIV patients when compared to non-HIV patients was 1.8 (95% Confidence Interval [CI] 1.3-2.4), in studies in Africa this was 2.3 (95% CI 1.5-3.5). In a sensitivity analysis the risk ratio was reduced to 1.4 (95% CI 0.5-3.8). The risk ratio of infection in patients receiving prolonged antibiotics compared to patients receiving antibiotics for up to 24 hours was 0.7 (95% CI 0.1-4.2). The results may indicate an increased risk in HIV infected patients but these results are not robust and inconclusive after conducting the sensitivity analysis removing poor quality studies. There is need for larger good quality studies to provide conclusive evidence. To better develop surgical protocols, further studies should determine the effect of reduced CD4 counts, viral load suppression and prolonged antibiotics on the risk for infection.

  4. Risk analysis as a decision tool

    International Nuclear Information System (INIS)

    Yadigaroglu, G.; Chakraborty, S.

    1985-01-01

    From 1983 - 1985 a lecture series entitled ''Risk-benefit analysis'' was held at the Swiss Federal Institute of Technology (ETH), Zurich, in cooperation with the Central Department for the Safety of Nuclear Installations of the Swiss Federal Agency of Energy Economy. In that setting the value of risk-oriented evaluation models as a decision tool in safety questions was discussed on a broad basis. Experts of international reputation from the Federal Republic of Germany, France, Canada, the United States and Switzerland have contributed to report in this joint volume on the uses of such models. Following an introductory synopsis on risk analysis and risk assessment the book deals with practical examples in the fields of medicine, nuclear power, chemistry, transport and civil engineering. Particular attention is paid to the dialogue between analysts and decision makers taking into account the economic-technical aspects and social values. The recent chemical disaster in the Indian city of Bhopal again signals the necessity of such analyses. All the lectures were recorded individually. (orig./HP) [de

  5. Interactive verification of Markov chains: Two distributed protocol case studies

    Directory of Open Access Journals (Sweden)

    Johannes Hölzl

    2012-12-01

    Full Text Available Probabilistic model checkers like PRISM only check probabilistic systems of a fixed size. To guarantee the desired properties for an arbitrary size, mathematical analysis is necessary. We show for two case studies how this can be done in the interactive proof assistant Isabelle/HOL. The first case study is a detailed description of how we verified properties of the ZeroConf protocol, a decentral address allocation protocol. The second case study shows the more involved verification of anonymity properties of the Crowds protocol, an anonymizing protocol.

  6. Network theory-based analysis of risk interactions in large engineering projects

    International Nuclear Information System (INIS)

    Fang, Chao; Marle, Franck; Zio, Enrico; Bocquet, Jean-Claude

    2012-01-01

    This paper presents an approach based on network theory to deal with risk interactions in large engineering projects. Indeed, such projects are exposed to numerous and interdependent risks of various nature, which makes their management more difficult. In this paper, a topological analysis based on network theory is presented, which aims at identifying key elements in the structure of interrelated risks potentially affecting a large engineering project. This analysis serves as a powerful complement to classical project risk analysis. Its originality lies in the application of some network theory indicators to the project risk management field. The construction of the risk network requires the involvement of the project manager and other team members assigned to the risk management process. Its interpretation improves their understanding of risks and their potential interactions. The outcomes of the analysis provide a support for decision-making regarding project risk management. An example of application to a real large engineering project is presented. The conclusion is that some new insights can be found about risks, about their interactions and about the global potential behavior of the project. - Highlights: ► The method addresses the modeling of complexity in project risk analysis. ► Network theory indicators enable other risks than classical criticality analysis to be highlighted. ► This topological analysis improves project manager's understanding of risks and risk interactions. ► This helps project manager to make decisions considering the position in the risk network. ► An application to a real tramway implementation project in a city is provided.

  7. Risk analysis methodologies for the transportation of radioactive materials

    International Nuclear Information System (INIS)

    Geffen, C.A.

    1983-05-01

    Different methodologies have evolved for consideration of each of the many steps required in performing a transportation risk analysis. Although there are techniques that attempt to consider the entire scope of the analysis in depth, most applications of risk assessment to the transportation of nuclear fuel cycle materials develop specific methodologies for only one or two parts of the analysis. The remaining steps are simplified for the analyst by narrowing the scope of the effort (such as evaluating risks for only one material, or a particular set of accident scenarios, or movement over a specific route); performing a qualitative rather than a quantitative analysis (probabilities may be simply ranked as high, medium or low, for instance); or assuming some generic, conservative conditions for potential release fractions and consequences. This paper presents a discussion of the history and present state-of-the-art of transportation risk analysis methodologies. Many reports in this area were reviewed as background for this presentation. The literature review, while not exhaustive, did result in a complete representation of the major methods used today in transportation risk analysis. These methodologies primarily include the use of severity categories based on historical accident data, the analysis of specifically assumed accident sequences for the transportation activity of interest, and the use of fault or event tree analysis. Although the focus of this work has generally been on potential impacts to public groups, some effort has been expended in the estimation of risks to occupational groups in transportation activities

  8. Bayesian Inference for NASA Probabilistic Risk and Reliability Analysis

    Science.gov (United States)

    Dezfuli, Homayoon; Kelly, Dana; Smith, Curtis; Vedros, Kurt; Galyean, William

    2009-01-01

    This document, Bayesian Inference for NASA Probabilistic Risk and Reliability Analysis, is intended to provide guidelines for the collection and evaluation of risk and reliability-related data. It is aimed at scientists and engineers familiar with risk and reliability methods and provides a hands-on approach to the investigation and application of a variety of risk and reliability data assessment methods, tools, and techniques. This document provides both: A broad perspective on data analysis collection and evaluation issues. A narrow focus on the methods to implement a comprehensive information repository. The topics addressed herein cover the fundamentals of how data and information are to be used in risk and reliability analysis models and their potential role in decision making. Understanding these topics is essential to attaining a risk informed decision making environment that is being sought by NASA requirements and procedures such as 8000.4 (Agency Risk Management Procedural Requirements), NPR 8705.05 (Probabilistic Risk Assessment Procedures for NASA Programs and Projects), and the System Safety requirements of NPR 8715.3 (NASA General Safety Program Requirements).

  9. A Site Characterization Protocol for Evaluating the Potential for Triggered or Induced Seismicity Resulting from Wastewater Injection and Hydraulic Fracturing

    Science.gov (United States)

    Walters, R. J.; Zoback, M. D.; Gupta, A.; Baker, J.; Beroza, G. C.

    2014-12-01

    Regulatory and governmental agencies, individual companies and industry groups and others have recently proposed, or are developing, guidelines aimed at reducing the risk associated with earthquakes triggered by waste water injection or hydraulic fracturing. While there are a number of elements common to the guidelines proposed, not surprisingly, there are also some significant differences among them and, in a number of cases, important considerations that are not addressed. The goal of this work is to develop a comprehensive protocol for site characterization based on a rigorous scientific understanding of the responsible processes. Topics addressed will include the geologic setting (emphasizing faults that might be affected), historical seismicity, hydraulic characterization of injection and adjacent intervals, geomechanical characterization to identify potentially active faults, plans for seismic monitoring and reporting, plans for monitoring and reporting injection (pressure, volumes, and rates), other factors contributing to risk (potentially affected population centers, structures, and facilities), and implementing a modified Probabilistic Seismic Hazard Analysis (PSHA). The guidelines will be risk based and adaptable, rather than prescriptive, for a proposed activity and region of interest. They will be goal oriented and will rely, to the degree possible, on established best practice procedures, referring to existing procedures and recommendations. By developing a risk-based site characterization protocol, we hope to contribute to the development of rational and effective measures for reducing the risk posed by activities that potentially trigger earthquakes.

  10. Advanced uncertainty modelling for container port risk analysis.

    Science.gov (United States)

    Alyami, Hani; Yang, Zaili; Riahi, Ramin; Bonsall, Stephen; Wang, Jin

    2016-08-13

    Globalization has led to a rapid increase of container movements in seaports. Risks in seaports need to be appropriately addressed to ensure economic wealth, operational efficiency, and personnel safety. As a result, the safety performance of a Container Terminal Operational System (CTOS) plays a growing role in improving the efficiency of international trade. This paper proposes a novel method to facilitate the application of Failure Mode and Effects Analysis (FMEA) in assessing the safety performance of CTOS. The new approach is developed through incorporating a Fuzzy Rule-Based Bayesian Network (FRBN) with Evidential Reasoning (ER) in a complementary manner. The former provides a realistic and flexible method to describe input failure information for risk estimates of individual hazardous events (HEs) at the bottom level of a risk analysis hierarchy. The latter is used to aggregate HEs safety estimates collectively, allowing dynamic risk-based decision support in CTOS from a systematic perspective. The novel feature of the proposed method, compared to those in traditional port risk analysis lies in a dynamic model capable of dealing with continually changing operational conditions in ports. More importantly, a new sensitivity analysis method is developed and carried out to rank the HEs by taking into account their specific risk estimations (locally) and their Risk Influence (RI) to a port's safety system (globally). Due to its generality, the new approach can be tailored for a wide range of applications in different safety and reliability engineering and management systems, particularly when real time risk ranking is required to measure, predict, and improve the associated system safety performance. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Multivariate survival analysis and competing risks

    CERN Document Server

    Crowder, Martin J

    2012-01-01

    Multivariate Survival Analysis and Competing Risks introduces univariate survival analysis and extends it to the multivariate case. It covers competing risks and counting processes and provides many real-world examples, exercises, and R code. The text discusses survival data, survival distributions, frailty models, parametric methods, multivariate data and distributions, copulas, continuous failure, parametric likelihood inference, and non- and semi-parametric methods. There are many books covering survival analysis, but very few that cover the multivariate case in any depth. Written for a graduate-level audience in statistics/biostatistics, this book includes practical exercises and R code for the examples. The author is renowned for his clear writing style, and this book continues that trend. It is an excellent reference for graduate students and researchers looking for grounding in this burgeoning field of research.

  12. Refining Ovarian Cancer Test accuracy Scores (ROCkeTS): protocol for a prospective longitudinal test accuracy study to validate new risk scores in women with symptoms of suspected ovarian cancer

    Science.gov (United States)

    Sundar, Sudha; Rick, Caroline; Dowling, Francis; Au, Pui; Rai, Nirmala; Champaneria, Rita; Stobart, Hilary; Neal, Richard; Davenport, Clare; Mallett, Susan; Sutton, Andrew; Kehoe, Sean; Timmerman, Dirk; Bourne, Tom; Van Calster, Ben; Gentry-Maharaj, Aleksandra; Deeks, Jon

    2016-01-01

    Introduction Ovarian cancer (OC) is associated with non-specific symptoms such as bloating, making accurate diagnosis challenging: only 1 in 3 women with OC presents through primary care referral. National Institute for Health and Care Excellence guidelines recommends sequential testing with CA125 and routine ultrasound in primary care. However, these diagnostic tests have limited sensitivity or specificity. Improving accurate triage in women with vague symptoms is likely to improve mortality by streamlining referral and care pathways. The Refining Ovarian Cancer Test Accuracy Scores (ROCkeTS; HTA 13/13/01) project will derive and validate new tests/risk prediction models that estimate the probability of having OC in women with symptoms. This protocol refers to the prospective study only (phase III). Methods and analysis ROCkeTS comprises four parallel phases. The full ROCkeTS protocol can be found at http://www.birmingham.ac.uk/ROCKETS. Phase III is a prospective test accuracy study. The study will recruit 2450 patients from 15 UK sites. Recruited patients complete symptom and anxiety questionnaires, donate a serum sample and undergo ultrasound scored as per International Ovarian Tumour Analysis (IOTA) criteria. Recruitment is at rapid access clinics, emergency departments and elective clinics. Models to be evaluated include those based on ultrasound derived by the IOTA group and novel models derived from analysis of existing data sets. Estimates of sensitivity, specificity, c-statistic (area under receiver operating curve), positive predictive value and negative predictive value of diagnostic tests are evaluated and a calibration plot for models will be presented. ROCkeTS has received ethical approval from the NHS West Midlands REC (14/WM/1241) and is registered on the controlled trials website (ISRCTN17160843) and the National Institute of Health Research Cancer and Reproductive Health portfolios. PMID:27507231

  13. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    Science.gov (United States)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  14. Analysis of research ethics board approval times in an academic department of medicine.

    Science.gov (United States)

    Tsang, Teresa S M; Jones, Meaghan; Meneilly, Graydon S

    2015-04-01

    As part of an ongoing effort to better understand barriers to academic research, we reviewed and analyzed the process of research ethics applications, focusing on ethics approval time, within the Department of Medicine from 2006 to 2011. A total of 1,268 applications for approval to use human subjects in research were included in our analysis. Three variables, risk category (minimal vs. non-minimal risk), type of funding, and year of submission, were statistically significant for prediction of ethics approval time, with risk status being the most important of these. The covariate-adjusted mean time for approval for minimal risk studies (35.7 days) was less than half that of non-minimal risk protocols (76.5 days). Studies funded through a for-profit sponsor had significantly longer approval times than those funded through other means but were also predominantly (87%) non-minimal risk protocols. Further investigations of the reasons underlying the observed differences are needed to determine whether improved training for research ethics board (REB) members and/or greater dialogue with investigators may reduce the lengthy approval times associated with non-minimal risk protocols. © The Author(s) 2015.

  15. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  16. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  17. The precautionary principle as a provisional instrument in environmental policy: The Montreal Protocol case study

    International Nuclear Information System (INIS)

    Jacobs, J. Roger

    2014-01-01

    Highlights: • I examine whether a policy invoked under the Precautionary Principle can move beyond provisional status. • I review the certainty of conclusions based upon the Global Ozone Research and Monitoring Project. • There is high certainty that anthropogenic ozone depletion has health consequences in polar regions. • Current research focuses on long term projections of risk that perpetuates high uncertainty. • Establishment of a community to generate Assessments acts to perpetuate the period of uncertainty. - Abstract: Environmental studies identify possible threats to the health of the public or the environment when the scientific certainty of risk is low, but the potential cost is high. Governments may respond by invoking the Precautionary Principle, holding that scientific certainty is not required to take actions that reduce possible risk. EU guidelines suggest that precautionary measures remain provisional until sufficient scientific certainty is generated. Here I study the Scientific Assessments produced for the Montreal Protocol, and the scientific community that generates them, and ask whether a long-standing program of scientific investigation and monitoring can generate sufficient scientific certainty to move beyond dependence on the Precautionary Principle. When the Montreal Protocol was ratified, many scientists strongly suspected that anthropogenic substances like chlorofluorocarbons were depleting stratospheric ozone. Although the risk was uncertain, the perceived cost to public health of ozone depletion was high. A quarter century after formulating the Montreal Protocol, science can define the conditions for ozone depletion with great certainty, but uncertainty remains in determining the scale and distribution of the attributable increase in damaging ultra-violet (UV) radiation. Organisations, such as NASA, and scientists that contribute to the Scientific Assessments comprise the community in which the scientific consensus of risk is

  18. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  19. Implementation and Effects of Risk-Dependent Obstetric Care in the Netherlands (Expect Study II): Protocol for an Impact Study.

    Science.gov (United States)

    van Montfort, Pim; Willemse, Jessica Ppm; Dirksen, Carmen D; van Dooren, Ivo Ma; Meertens, Linda Je; Spaanderman, Marc Ea; Zelis, Maartje; Zwaan, Iris M; Scheepers, Hubertina Cj; Smits, Luc Jm

    2018-05-04

    Recently, validated risk models predicting adverse obstetric outcomes combined with risk-dependent care paths have been made available for early antenatal care in the southeastern part of the Netherlands. This study will evaluate implementation progress and impact of the new approach in obstetric care. The objective of this paper is to describe the design of a study evaluating the impact of implementing risk-dependent care. Validated first-trimester prediction models are embedded in daily clinical practice and combined with risk-dependent obstetric care paths. A multicenter prospective cohort study consisting of women who receive risk-dependent care is being performed from April 2017 to April 2018 (Expect Study II). Obstetric risk profiles will be calculated using a Web-based tool, the Expect prediction tool. The primary outcomes are the adherence of health care professionals and compliance of women. Secondary outcomes are patient satisfaction and cost-effectiveness. Outcome measures will be established using Web-based questionnaires. The secondary outcomes of the risk-dependent care cohort (Expect II) will be compared with the outcomes of a similar prospective cohort (Expect I). Women of this similar cohort received former care-as-usual and were prospectively included between July 1, 2013 and December 31, 2015 (Expect I). Currently, women are being recruited for the Expect Study II, and a total of 300 women are enrolled. This study will provide information about the implementation and impact of a new approach in obstetric care using prediction models and risk-dependent obstetric care paths. Netherlands Trial Register NTR4143; http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=4143 (Archived by WebCite at http://www.webcitation.org/6t8ijtpd9). ©Pim van Montfort, Jessica PPM Willemse, Carmen D Dirksen, Ivo MA van Dooren, Linda JE Meertens, Marc EA Spaanderman, Maartje Zelis, Iris M Zwaan, Hubertina CJ Scheepers, Luc JM Smits. Originally published in JMIR

  20. Toxoplasma gondii and pre-treatment protocols for polymerase chain reaction analysis of milk samples: a field trial in sheep from Southern Italy

    Directory of Open Access Journals (Sweden)

    Alice Vismarra

    2017-02-01

    Full Text Available Toxoplasmosis is a zoonotic disease caused by the protozoan Toxoplasma gondii. Ingestion of raw milk has been suggested as a risk for transmission to humans. Here the authors evaluated pre-treatment protocols for DNA extraction on T. gondii tachyzoite-spiked sheep milk with the aim of identifying the method that resulted in the most rapid and reliable polymerase chain reaction (PCR positivity. This protocol was then used to analyse milk samples from sheep of three different farms in Southern Italy, including real time PCR for DNA quantification and PCR-restriction fragment length polymorphism for genotyping. The pre-treatment protocol using ethylenediaminetetraacetic acid and Tris-HCl to remove casein gave the best results in the least amount of time compared to the others on spiked milk samples. One sample of 21 collected from sheep farms was positive on one-step PCR, real time PCR and resulted in a Type I genotype at one locus (SAG3. Milk usually contains a low number of tachyzoites and this could be a limiting factor for molecular identification. Our preliminary data has evaluated a rapid, cost-effective and sensitive protocol to treat milk before DNA extraction. The results of the present study also confirm the possibility of T. gondii transmission through consumption of raw milk and its unpasteurised derivatives.

  1. Flood risk analysis procedure for nuclear power plants

    International Nuclear Information System (INIS)

    Wagner, D.P.

    1982-01-01

    This paper describes a methodology and procedure for determining the impact of floods on nuclear power plant risk. The procedures are based on techniques of fault tree and event tree analysis and use the logic of these techniques to determine the effects of a flood on system failure probability and accident sequence occurrence frequency. The methodology can be applied independently or as an add-on analysis for an existing risk assessment. Each stage of the analysis yields useful results such as the critical flood level, failure flood level, and the flood's contribution to accident sequence occurrence frequency. The results of applications show the effects of floods on the risk from nuclear power plants analyzed in the Reactor Safety Study

  2. DreamTel; Diabetes risk evaluation and management tele-monitoring study protocol.

    Science.gov (United States)

    Tobe, Sheldon W; Wentworth, Joan; Ironstand, Laurie; Hartman, Susan; Hoppe, Jackie; Whiting, Judi; Kennedy, Janice; McAllister, Colin; Kiss, Alex; Perkins, Nancy; Vincent, Lloyd; Pylypchuk, George; Lewanczuk, Richard Z

    2009-05-09

    The rising prevalence of type 2 diabetes underlines the importance of secondary strategies for the prevention of target organ damage. While access to diabetes education centers and diabetes intensification management has been shown to improve blood glucose control, these services are not available to all that require them, particularly in rural and northern areas. The provision of these services through the Home Care team is an advance that can overcome these barriers. Transfer of blood glucose data electronically from the home to the health care provider may improve diabetes management. The study population will consist of patients with type 2 diabetes with uncontrolled A1c levels living on reserve in the Battlefords region of Saskatchewan, Canada. This pilot study will take place over three phases. In the first phase over three months the impact of the introduction of the Bluetooth enabled glucose monitor will be assessed. In the second phase over three months, the development of guidelines based treatment algorithms for diabetes intensification will be completed. In the third phase lasting 18 months, study subjects will have diabetes intensification according to the algorithms developed. The first phase will determine if the use of the Bluetooth enabled blood glucose devices which can transmit results electronically will lead to changes in A1c levels. It will also determine the feasibility of recruiting subjects to use this technology. The rest of the Diabetes Risk Evaluation and Management Tele-monitoring (DreamTel) study will determine if the delivery of a diabetes intensification management program by the Home Care team supported by the Bluetooth enabled glucose meters leads to improvements in diabetes management. Protocol NCT00325624.

  3. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  4. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  5. Performance Analysis of the Enhanced DSR Routing Protocol for the Short Time Disconnected MANET to the OPNET Modeler

    Directory of Open Access Journals (Sweden)

    PAPAJ Ján

    2013-05-01

    Full Text Available Disconnected mobile ad-hoc networks (MANET are very important areas of the research. In this article, the performance analysis of the enhanced dynamic source routing protocol (OPP_DSR is introduced. This modification enables the routing process in the case when there are no connections to other mobile nodes. It also will enable the routing mechanisms when the routes, selected by routing mechanisms, are disconnected for some time. Disconnection can be for a short time and standard routing protocol DSR cannot reflect on this situation.The main idea is based on opportunistic forwarding where the nodes not only forward data but it's stored in the cache during long time. The network parameters throughput, routing load and are analysed.

  6. Ontological Analysis of the Project Risk Management Concept ‘Risk’

    Directory of Open Access Journals (Sweden)

    Uzulāns Juris

    2018-02-01

    Full Text Available The aim of the current research series is to examine the definitions of the concept ‘risk’ and analyze the concepts used in the definitions of ‘risk’ in the sources of these definitions in order to perform the ontological analysis of the concept of ‘risk’. Ontological and epistemological analysis of the concepts in the definition of the concept ‘risk’ was used to answer the question what ‘risk’ means in project management. This investigation represents a part of the research series where the ontological, epistemological and methodological analysis of project risk is performed with the aim to improve risk registers and risk management as a whole. In the previous studies the author analyzed the concept of ‘event’ that defines the content of the concept ‘risk’. The use of ‘event’ was analyzed in different sources to find out how the concept should be used. The ontological, epistemological and methodological analysis of the definitions of the concept ‘risk’ is the theoretical foundation for risk register creation because it is possible to create complete and understandable register for the participants of the project risk management process. The author believes that the conducted research helps establish confidence that ontological analysis is the method that together with the epistemological and methodological analysis provides opportunity to perform analysis of risk management sources aimed at improving risk management. The results of the study cannot be considered sufficient for deriving valid conclusions about project risk management and developing recommendations for improving risk management with regard to the content of the risk register. For valid conclusions and recommendations, a deeper research is needed which, first of all, would analyze a larger number of sources.

  7. Risk analysis of alternative energy sources

    International Nuclear Information System (INIS)

    Kazmer, D.R.

    1982-01-01

    The author explores two points raised by Miller Spangler in a January 1981 issue: public perception of risks involving nuclear power plants relative to those of conventional plants and criteria for evaluating the way risk analyses are made. On the first point, he concludes that translating public attitudes into the experts' language of probability and risk could provide better information and understanding of both the attitudes and the risks. Viewing risk analysis methodologies as filters which help to test historical change, he suggests that the lack of information favors a lay jury approach for energy decisions. Spangler responds that Congress is an example of lay decision making, but that a lay jury, given public disinterest and polarization, would probably not improve social justice on the nuclear issue. 5 references, 4 figures

  8. Teaching Integrity in Empirical Research: A Protocol for Documenting Data Management and Analysis

    Science.gov (United States)

    Ball, Richard; Medeiros, Norm

    2012-01-01

    This article describes a protocol the authors developed for teaching undergraduates to document their statistical analyses for empirical research projects so that their results are completely reproducible and verifiable. The protocol is guided by the principle that the documentation prepared to accompany an empirical research project should be…

  9. The watchdog role of risk analysis

    International Nuclear Information System (INIS)

    Reijen, G. van; Vinck, W.

    1983-01-01

    The reason why the risks of large-scale technology attract more attention lies in the fact that accidents would have more disastrous results and in the fact that it is probably more attractive to study the risks of some large projects than to do the same for a greater number of smaller projects. Within this presentation there will be some opening remarks on the Role of the Commission of the European Community with regard to accident prevention. The development of the concept of quantitative risks is dealt with. This development leads to a combinded of deterministic and probabilistic methods. The presentation concludes with some critical remarks on quantitative risk analysis and its use. (orig./HP) [de

  10. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  11. Alcohol consumption and the risk of morbidity and mortality for different stroke types - a systematic review and meta-analysis

    Directory of Open Access Journals (Sweden)

    Roerecke Michael

    2010-05-01

    Full Text Available Abstract Background Observational studies have suggested a complex relationship between alcohol consumption and stroke, dependent on sex, type of stroke and outcome (morbidity vs. mortality. We undertook a systematic review and a meta-analysis of studies assessing the association between levels of average alcohol consumption and relative risks of ischemic and hemorrhagic strokes separately by sex and outcome. This meta-analysis is the first to explicitly separate morbidity and mortality of alcohol-attributable stroke and thus has implications for public health and prevention. Methods Using Medical Subject Headings (alcohol drinking, ethanol, cerebrovascular accident, cerebrovascular disorders, and intracranial embolism and thrombosis and the key word stroke, a literature search of MEDLINE, EMBASE, CINAHL, CABS, WHOlist, SIGLE, ETOH, and Web of Science databases between 1980 to June 2009 was performed followed by manual searches of bibliographies of key retrieved articles. From twenty-six observational studies (cohort or case-control with ischemic or hemorrhagic strokes the relative risk or odds ratios or hazard ratios of stroke associated with alcohol consumption were reported; alcohol consumption was quantified; and life time abstention (manually estimated where data for current abstainers were given was used as the reference group. Two reviewers independently extracted the information on study design, participant characteristics, level of alcohol consumption, stroke outcome, control for potential confounding factors, risk estimates and key criteria of study quality using a standardized protocol. Results The dose-response relationship for hemorrhagic stroke had monotonically increasing risk for increasing consumption, whereas ischemic stroke showed a curvilinear relationship, with a protective effect of alcohol for low to moderate consumption, and increased risk for higher exposure. For more than 3 drinks on average/day, in general women had

  12. The use of current risk analysis tools evaluated towards preventing external domino accidents

    NARCIS (Netherlands)

    Reniers, Genserik L L; Dullaert, W.; Ale, B. J.M.; Soudan, K.

    Risk analysis is an essential tool for company safety policy. Risk analysis consists of identifying and evaluating all possible risks. The efficiency of risk analysis tools depends on the rigueur of identifying and evaluating all possible risks. The diversity in risk analysis procedures is such that

  13. A standardised protocol for texture feature analysis of endoscopic images in gynaecological cancer

    Directory of Open Access Journals (Sweden)

    Pattichis Marios S

    2007-11-01

    Full Text Available Abstract Background In the development of tissue classification methods, classifiers rely on significant differences between texture features extracted from normal and abnormal regions. Yet, significant differences can arise due to variations in the image acquisition method. For endoscopic imaging of the endometrium, we propose a standardized image acquisition protocol to eliminate significant statistical differences due to variations in: (i the distance from the tissue (panoramic vs close up, (ii difference in viewing angles and (iii color correction. Methods We investigate texture feature variability for a variety of targets encountered in clinical endoscopy. All images were captured at clinically optimum illumination and focus using 720 × 576 pixels and 24 bits color for: (i a variety of testing targets from a color palette with a known color distribution, (ii different viewing angles, (iv two different distances from a calf endometrial and from a chicken cavity. Also, human images from the endometrium were captured and analysed. For texture feature analysis, three different sets were considered: (i Statistical Features (SF, (ii Spatial Gray Level Dependence Matrices (SGLDM, and (iii Gray Level Difference Statistics (GLDS. All images were gamma corrected and the extracted texture feature values were compared against the texture feature values extracted from the uncorrected images. Statistical tests were applied to compare images from different viewing conditions so as to determine any significant differences. Results For the proposed acquisition procedure, results indicate that there is no significant difference in texture features between the panoramic and close up views and between angles. For a calibrated target image, gamma correction provided an acquired image that was a significantly better approximation to the original target image. In turn, this implies that the texture features extracted from the corrected images provided for better

  14. Clinical outcomes and cost effectiveness of accelerated diagnostic protocol in a chest pain center compared with routine care of patients with chest pain.

    Science.gov (United States)

    Asher, Elad; Reuveni, Haim; Shlomo, Nir; Gerber, Yariv; Beigel, Roy; Narodetski, Michael; Eldar, Michael; Or, Jacob; Hod, Hanoch; Shamiss, Arie; Matetzky, Shlomi

    2015-01-01

    The aim of this study was to compare in patients presenting with acute chest pain the clinical outcomes and cost-effectiveness of an accelerated diagnostic protocol utilizing contemporary technology in a chest pain unit versus routine care in an internal medicine department. Hospital and 90-day course were prospectively studied in 585 consecutive low-moderate risk acute chest pain patients, of whom 304 were investigated in a designated chest pain center using a pre-specified accelerated diagnostic protocol, while 281 underwent routine care in an internal medicine ward. Hospitalization was longer in the routine care compared with the accelerated diagnostic protocol group (pdiagnostic protocol patients (98%) vs. 57 (20%) routine care patients underwent non-invasive testing, (pdiagnostic imaging testing was performed in 125 (44%) and 26 (9%) patients in the routine care and accelerated diagnostic protocol patients, respectively (pdiagnostic protocol patients compared with those receiving routine care was associated with a lower incidence of readmissions for chest pain [8 (3%) vs. 24 (9%), pdiagnostic protocol remained a predictor of lower acute coronary syndromes and readmissions after propensity score analysis [OR = 0.28 (CI 95% 0.14-0.59)]. Cost per patient was similar in both groups [($2510 vs. $2703 for the accelerated diagnostic protocol and routine care group, respectively, (p = 0.9)]. An accelerated diagnostic protocol is clinically superior and as cost effective as routine in acute chest pain patients, and may save time and resources.

  15. Dietary patterns and depression risk: A meta-analysis.

    Science.gov (United States)

    Li, Ye; Lv, Mei-Rong; Wei, Yan-Jin; Sun, Ling; Zhang, Ji-Xiang; Zhang, Huai-Guo; Li, Bin

    2017-07-01

    Although some studies have reported potential associations of dietary patterns with depression risk, a consistent perspective hasn't been estimated to date. Therefore, we conducted this meta-analysis to evaluate the relation between dietary patterns and the risk of depression. A literature research was conducted searching MEDLINE and EMBASE databases up to September 2016. In total, 21 studies from ten countries met the inclusion criteria and were included in the present meta-analysis. A dietary pattern characterized by a high intakes of fruit, vegetables, whole grain, fish, olive oil, low-fat dairy and antioxidants and low intakes of animal foods was apparently associated with a decreased risk of depression. A dietary pattern characterized by a high consumption of red and/or processed meat, refined grains, sweets, high-fat dairy products, butter, potatoes and high-fat gravy, and low intakes of fruits and vegetables is associated with an increased risk of depression. The results of this meta-analysis suggest that healthy pattern may decrease the risk of depression, whereas western-style may increase the risk of depression. However, more randomized controlled trails and cohort studies are urgently required to confirm this findings. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  16. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  17. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    Science.gov (United States)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  18. Risk of severe ovarian hyperstimulation syndrome in GnRH antagonist versus GnRH agonist protocol

    DEFF Research Database (Denmark)

    Toftager, M.; Bogstad, J; Bryndorf, T

    2016-01-01

    interval (CI): 0.33-0.57) compared with the traditional GnRH agonist protocol. Previous trials comparing the two protocols mainly included selected patient populations, a limited number of patients and the applied OHSS criteria differed, making direct comparisons difficult. In two recent large meta...... IV, dual-centre, open-label, RCT including 1050 women allocated to either short GnRH antagonist or long GnRH agonist protocol in a 1:1 ratio and enrolled over a 5-year period using a web-based concealed randomization code. This is a superiority study designed to detect a difference in severe OHSS...... between the two arms. None of the women had undergone previous ART treatment. PARTICIPANTS/MATERIALS, SETTING, METHODS: All infertile women referred for their first IVF/ICSI at two public fertility clinics, less than 40 years of age and with no uterine malformations were asked to participate. A total...

  19. Benefit-Risk Analysis for Decision-Making: An Approach.

    Science.gov (United States)

    Raju, G K; Gurumurthi, K; Domike, R

    2016-12-01

    The analysis of benefit and risk is an important aspect of decision-making throughout the drug lifecycle. In this work, the use of a benefit-risk analysis approach to support decision-making was explored. The proposed approach builds on the qualitative US Food and Drug Administration (FDA) approach to include a more explicit analysis based on international standards and guidance that enables aggregation and comparison of benefit and risk on a common basis and a lifecycle focus. The approach is demonstrated on six decisions over the lifecycle (e.g., accelerated approval, withdrawal, and traditional approval) using two case studies: natalizumab for multiple sclerosis (MS) and bedaquiline for multidrug-resistant tuberculosis (MDR-TB). © 2016 American Society for Clinical Pharmacology and Therapeutics.

  20. Methodology for risk-based analysis of technical specifications

    International Nuclear Information System (INIS)

    Vesely, W.E.; Gaertner, J.P.; Wagner, D.P.

    1985-01-01

    Part of the effort by EPRI to apply probabilistic risk assessment methods and results to the solution of utility problems involves the investigation of methods for risk-based analysis of technical specifications. The culmination of this investigation is the SOCRATES computer code developed by Battelle's Columbus Laboratories to assist in the evaluation of technical specifications of nuclear power plants. The program is designed to use information found in PRAs to re-evaluate risk for changes in component allowed outage times (AOTs) and surveillance test intervals (STIs). The SOCRATES program is a unique and important tool for technical specification evaluations. The detailed component unavailability model allows a detailed analysis of AOT and STI contributions to risk. Explicit equations allow fast and inexpensive calculations. Because the code is designed to accept ranges of parameters and to save results of calculations that do not change during the analysis, sensitivity studies are efficiently performed and results are clearly displayed

  1. Analysis of quality control protocol implementation of equipment in radiotherapy services

    International Nuclear Information System (INIS)

    Calcina, Carmen S. Guzman; Lima, Luciana P. de; Rubo, Rodrigo A.; Ferraz, Eduardo; Almeida, Adelaide de

    2000-01-01

    Considering the importance of the Quality Assurance in the radiotherapy services, there was an interest to make tests' evaluation for a Quality Control for the cobalt equipment, linear accelerator and simulator as a classification and comparison. The work proposed is a suggestion that can serve as tool for medical physicists that are starting to work in the radiotherapy area and for the most experts. The discussions were made by the gathering of local tests and official protocols, resulting in a minimum protocol as a suggestion for a routine work, emphasizing the periodicity and level of tolerance of each one of the tests. (author)

  2. Implementing the Bayesian paradigm in risk analysis

    International Nuclear Information System (INIS)

    Aven, T.; Kvaloey, J.T.

    2002-01-01

    The Bayesian paradigm comprises a unified and consistent framework for analyzing and expressing risk. Yet, we see rather few examples of applications where the full Bayesian setting has been adopted with specifications of priors of unknown parameters. In this paper, we discuss some of the practical challenges of implementing Bayesian thinking and methods in risk analysis, emphasizing the introduction of probability models and parameters and associated uncertainty assessments. We conclude that there is a need for a pragmatic view in order to 'successfully' apply the Bayesian approach, such that we can do the assignments of some of the probabilities without adopting the somewhat sophisticated procedure of specifying prior distributions of parameters. A simple risk analysis example is presented to illustrate ideas

  3. Protocol for sampling and analysis of bone specimens

    International Nuclear Information System (INIS)

    Aras, N.K.

    2000-01-01

    The iliac crest of hip bone was chosen as the most suitable sampling site for several reasons: Local variation in the elemental concentration along the iliac crest is minimal; Iliac crest biopsies are commonly taken clinically on patients; The cortical part of the sample is small (∼2 mm) and can be separated easily from the trabecular bone; The use of the trabecular part of the iliac crest for trace element analysis has the advantage of reflecting rapidly changes in the composition of bone due to external parameters, including medication. Biopsy studies, although in some ways more difficult than autopsy studies, because of the need to obtain the informed consents of the subjects, are potentially more useful than autopsy studies. Thereby many problems of postmortem migration of elements can be avoided and reliable dietary and other data can be collected simultaneously. Select the subjects among the patients undergoing orthopedic surgery due to any reason other than osteoporosis. Follow an established protocol to obtain bone biopsies. Patients undergoing synergy should fill in the 'Osteoporosis Project Questionnaire Form' including information on lifestyle variables, dietary intakes, the reason for surgery etc. If possible, measure the bone mineral density (BMD) prior to removal of the biopsy sample. However it may not possible to have BMD results on all the subjects because of difficulty of DEXA measurement after an accident

  4. Quantitative Risk Analysis: Method And Process

    Directory of Open Access Journals (Sweden)

    Anass BAYAGA

    2010-03-01

    Full Text Available Recent and past studies (King III report, 2009: 73-75; Stoney 2007;Committee of Sponsoring Organisation-COSO, 2004, Bartell, 2003; Liebenberg and Hoyt, 2003; Reason, 2000; Markowitz 1957 lament that although, the introduction of quantifying risk to enhance degree of objectivity in finance for instance was quite parallel to its development in the manufacturing industry, it is not the same in Higher Education Institution (HEI. In this regard, the objective of the paper was to demonstrate the methods and process of Quantitative Risk Analysis (QRA through likelihood of occurrence of risk (phase I. This paper serves as first of a two-phased study, which sampled hundred (100 risk analysts in a University in the greater Eastern Cape Province of South Africa.The analysis of likelihood of occurrence of risk by logistic regression and percentages were conducted to investigate whether there were a significant difference or not between groups (analyst in respect of QRA.The Hosmer and Lemeshow test was non-significant with a chi-square(X2 =8.181; p = 0.300, which indicated that there was a good model fit, since the data did not significantly deviate from the model. The study concluded that to derive an overall likelihood rating that indicated the probability that a potential risk may be exercised within the construct of an associated threat environment, the following governing factors must be considered: (1 threat source motivation and capability (2 nature of the vulnerability (3 existence and effectiveness of current controls (methods and process.

  5. Risk Analysis for Performance Improvement in a Romanian Pharmaceutical Company

    Directory of Open Access Journals (Sweden)

    Dana Corina Deselnicu

    2018-05-01

    Full Text Available The paper presents risk management analysis carried out to investigate the operations of a Romanian company dealing with the distribution of pharmaceutical products. The main risks challenging the company were identified, described and classified, providing a scientific base for further analysis. Then, the identified inherent risks were evaluated using tools as the risk index method and the risk matrix in order to emphasize their tolerance level. According to the results of the evaluation, risk mitigation strategies and measures were advanced for the management of the analysed risks. Relevant conclusions were drawn from the experience.

  6. Protocol for development of authorized release limits for concrete at U.S. Department of Energy sites

    International Nuclear Information System (INIS)

    Arnish, J.; Kamboj, S.; Chen, S.-Y.; Parker, F. L.; Smith, A. M.; Meservey, R. H.; Tripp, J. L.

    2000-01-01

    The purpose of this protocol is to assist US Department of Energy (DOE) sites in releasing concrete for reuse. Current regulations allow the sites to release surface-contaminated materials if their radioactivity falls below certain levels and to possibly release materials with volumetric contamination or higher levels of surface contamination on a case-by-case basis. In all cases, an ALARA (as low as reasonably achievable) analysis that evaluates the risks of releasing volumetrically contaminated concrete or concrete with higher levels of surface contamination is required as a basis for proposing and setting new release limits that allow for reuse of the concrete material. To evaluate the dose impacts of reusing radioactively contaminated material, the measured radiation levels (pCi/g or disintegrations per minute [dpm]/100 cm 2 ) must be converted to the estimated dose (mrem/yr) that would be received by affected individuals. The dose depends on the amounts and types of isotopes present and the time, distance, and method of exposure (e.g., inhalation or external exposure). For each disposition alternative, the protocol provides a systematic method to evaluate the impact of the dose on the affected individuals. The cost impacts of reusing concrete also need to be evaluated. They too depend on the disposition alternative and the extent and type of contamination. The protocol provides a method to perform a detailed analysis of these factors and evaluate the dose and cost impacts for various disposition alternatives. Once the dose and cost impacts of the various alternatives have been estimated, the protocol outlines the steps required to propose new release standards that allow release and reuse of the concrete material

  7. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    International Nuclear Information System (INIS)

    McGowan, S E; Albertini, F; Lomax, A J; Thomas, S J

    2015-01-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties. (paper)

  8. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    Science.gov (United States)

    McGowan, S. E.; Albertini, F.; Thomas, S. J.; Lomax, A. J.

    2015-04-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties.

  9. Efficacy of Low-Dose Protocol in Follow-Up of Lymphoproliferative Disorders - Preliminary Results

    International Nuclear Information System (INIS)

    Popic-Ramac, J.; Brnic, Z.; Klasic, B.; Hebrang, A.; Knezevic, Z.

    2011-01-01

    Most medically-related radiation is caused by diagnostic examinations, in particular by computed tomography (CT). The purpose of this research is to reduce radiation doses faced by the population frequently exposed to such procedures-those with lymphoproliferative disorders. The research was conducted comparing radiation-exposition doses received by the radiosensitive organs (thyroid, lens, breast and gonad) using the standard thoracic CT protocol with the radiation received using the low-dose protocol, while maintaining display quality. The standard-dose thoracic protocol implies 120 kV and 150 mAs. The low-dose protocol was conducted on the same device using 120 kV and 30 mAs. We confirmed the hypothesis that the use of the low-dose thoracic CT protocol leads to a reduction in radiation dose without compromising display quality. It is further expected that a reduction in doses will reduce the risk of radiation-related mutations. (author)

  10. A Proof-checked Verification of a Real-Time Communication Protocol

    NARCIS (Netherlands)

    Polak, I.

    We present an analysis of a protocol developed by Philips to connect several components of an audio-system. The verification of the protocol is carried out using the timed I/O-automata model of Lynch and Vaandrager. The verification has been partially proof-checked with the interactive proof

  11. Prenatal diagnosis and prevention of toxoplasmosis in pregnant women in Northern Vietnam: study protocol.

    Science.gov (United States)

    Smit, G Suzanne A; Vu, Thi Lam Binh; Do, Trung Dung; Speybroeck, Niko; Devleesschauwer, Brecht; Padalko, Elizaveta; Roets, Ellen; Dorny, Pierre

    2017-05-25

    In Vietnam, no systematic prenatal toxoplasmosis screening is in place, and only few studies have assessed the prevalence and importance of this zoonotic parasite infection. In addition, no studies have been conducted to assess the risk factors associated with toxoplasmosis. This study protocol was developed to determine the seroprevalence of toxoplasmosis in pregnant women in Hanoi and Thai Binh, Northern Vietnam, and to evaluate the association with risk factors and congenital toxoplasmosis. The protocol was developed in a way that it could potentially evolve into a countrywide prenatal diagnosis and prevention program, with the main focus on primary prevention. The collaborating gynaecologists will invite eligible pregnant women attending antenatal care for the first time to participate in the study. At first consult, information about toxoplasmosis and its prevention will be provided. All participants will be asked to fill in a questionnaire, which is designed to analyse socio-demographic and biologically plausible risk factors associated with toxoplasmosis, and blood samples will be collected to determine the seroprevalence of toxoplasmosis in pregnant women. In case there is suspicion of a primary infection during pregnancy, the concerned women will be followed-up by the gynaecologists according to a predefined protocol. Every participant will be informed on her serological status, risk factors and prevention measures and is offered appropriate medical information and medical follow-up if required. The hypothesis is that congenital toxoplasmosis is an important but currently under-diagnosed public health problem in Vietnam. This study can strengthen sustainable control of toxoplasmosis in Vietnam, provide a protocol for prenatal diagnosis, boost overall awareness, improve the knowledge about toxoplasmosis prevention and can be essential for evidence-based health policy.

  12. Potential risk factors associated with human alveolar echinococcosis: Systematic review and meta-analysis.

    Science.gov (United States)

    Conraths, Franz J; Probst, Carolina; Possenti, Alessia; Boufana, Belgees; Saulle, Rosella; La Torre, Giuseppe; Busani, Luca; Casulli, Adriano

    2017-07-01

    Human alveolar echinococcosis (AE) is a severe zoonotic disease caused by the metacestode stage of Echinococcus multilocularis. AE is commonly associated with a long incubation period that may last for more than ten years. The objective of this systematic literature review was to identify and summarize the current knowledge on statistically relevant potential risk factors (PRFs) associated with AE in humans. Six bibliographic databases were searched, generating a total of 1,009 publications. Following the removal of duplicate records and the exclusion of papers that failed to meet the criteria of a previously agreed a priori protocol, 23 publications were retained; however, 6 of these did not contain data in a format that allowed their inclusion in the meta-analysis. The remaining 17 publications (6 case-control and 11 cross-sectional studies) were meta-analysed to investigate associations between AE and PRFs. Pooled odds ratios (OR) were used as a measure of effect and separately analysed for case-control and cross-sectional studies. In the case-control studies, the following PRFs for human AE showed higher odds of outcome: "dog ownership", "cat ownership", "have a kitchen garden", "occupation: farmer", "haymaking in meadows not adjacent to water", "went to forests for vocational reasons", "chewed grass" and "hunting / handling foxes". In the cross-sectional studies, the following PRFs showed higher odds of outcome: "dog ownership", "play with dogs", "gender: female", "age over 20 years", "ethnic group: Tibetan", "low income", "source of drinking water other than well or tap", "occupation: herding" and "low education". Our meta-analysis confirmed that the chance of AE transmission through ingestion of food and water contaminated with E. multilocularis eggs exists, but showed also that food- and water-borne PRFs do not significantly increase the risk of infection. This systematic review analysed international peer-reviewed articles that have over the years

  13. Potential risk factors associated with human alveolar echinococcosis: Systematic review and meta-analysis.

    Directory of Open Access Journals (Sweden)

    Franz J Conraths

    2017-07-01

    Full Text Available Human alveolar echinococcosis (AE is a severe zoonotic disease caused by the metacestode stage of Echinococcus multilocularis. AE is commonly associated with a long incubation period that may last for more than ten years. The objective of this systematic literature review was to identify and summarize the current knowledge on statistically relevant potential risk factors (PRFs associated with AE in humans.Six bibliographic databases were searched, generating a total of 1,009 publications. Following the removal of duplicate records and the exclusion of papers that failed to meet the criteria of a previously agreed a priori protocol, 23 publications were retained; however, 6 of these did not contain data in a format that allowed their inclusion in the meta-analysis. The remaining 17 publications (6 case-control and 11 cross-sectional studies were meta-analysed to investigate associations between AE and PRFs. Pooled odds ratios (OR were used as a measure of effect and separately analysed for case-control and cross-sectional studies. In the case-control studies, the following PRFs for human AE showed higher odds of outcome: "dog ownership", "cat ownership", "have a kitchen garden", "occupation: farmer", "haymaking in meadows not adjacent to water", "went to forests for vocational reasons", "chewed grass" and "hunting / handling foxes". In the cross-sectional studies, the following PRFs showed higher odds of outcome: "dog ownership", "play with dogs", "gender: female", "age over 20 years", "ethnic group: Tibetan", "low income", "source of drinking water other than well or tap", "occupation: herding" and "low education". Our meta-analysis confirmed that the chance of AE transmission through ingestion of food and water contaminated with E. multilocularis eggs exists, but showed also that food- and water-borne PRFs do not significantly increase the risk of infection.This systematic review analysed international peer-reviewed articles that have over the

  14. Integrating usability testing and think-aloud protocol analysis with "near-live" clinical simulations in evaluating clinical decision support.

    Science.gov (United States)

    Li, Alice C; Kannry, Joseph L; Kushniruk, Andre; Chrimes, Dillon; McGinn, Thomas G; Edonyabo, Daniel; Mann, Devin M

    2012-11-01

    Usability evaluations can improve the usability and workflow integration of clinical decision support (CDS). Traditional usability testing using scripted scenarios with think-aloud protocol analysis provide a useful but incomplete assessment of how new CDS tools interact with users and clinical workflow. "Near-live" clinical simulations are a newer usability evaluation tool that more closely mimics clinical workflow and that allows for a complementary evaluation of CDS usability as well as impact on workflow. This study employed two phases of testing a new CDS tool that embedded clinical prediction rules (an evidence-based medicine tool) into primary care workflow within a commercial electronic health record. Phase I applied usability testing involving "think-aloud" protocol analysis of 8 primary care providers encountering several scripted clinical scenarios. Phase II used "near-live" clinical simulations of 8 providers interacting with video clips of standardized trained patient actors enacting the clinical scenario. In both phases, all sessions were audiotaped and had screen-capture software activated for onscreen recordings. Transcripts were coded using qualitative analysis methods. In Phase I, the impact of the CDS on navigation and workflow were associated with the largest volume of negative comments (accounting for over 90% of user raised issues) while the overall usability and the content of the CDS were associated with the most positive comments. However, usability had a positive-to-negative comment ratio of only 0.93 reflecting mixed perceptions about the usability of the CDS. In Phase II, the duration of encounters with simulated patients was approximately 12 min with 71% of the clinical prediction rules being activated after half of the visit had already elapsed. Upon activation, providers accepted the CDS tool pathway 82% of times offered and completed all of its elements in 53% of all simulation cases. Only 12.2% of encounter time was spent using the

  15. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  16. Performance of a multi-disciplinary emergency department observation protocol for acetaminophen overdose.

    Science.gov (United States)

    Beauchamp, Gillian A; Hart, Kimberly W; Lindsell, Christopher J; Lyons, Michael S; Otten, Edward J; Smith, Carol L; Ward, Michael J; Wright, Stewart W

    2013-09-01

    The availability of 20-h N-acetylcysteine (NAC) infusion for low-risk acetaminophen (APAP) overdose enabled our center to implement an Emergency Department observation unit (OU) protocol as an alternative to hospitalization. Our objective was to evaluate our early experience with this protocol. This retrospective cohort study included all patients treated for low-risk APAP overdose in our academic hospital between 2006 and 2011. Cases were identified using OU and pharmacy records. Successful OU discharge was defined as disposition with no inpatient admission. Differences in medians with 95 % confidence intervals were used for comparisons. One hundred ninety-six patients received NAC for APAP overdose with a mean age of 35 years (SD 14); 73 % were white, and 43 % were male. Twenty (10 %) received care in the OU; 3/20(15 %) met criteria for inclusion in the OU protocol and 13/20(65 %) were discharged successfully. Out of the 196 patients, 10 met criteria for inclusion in the OU protocol but instead received care in the inpatient setting. The median total length of stay from presentation to ED discharge was 41 h for all patients treated in the OU, compared to 68 h for ten patients who met criteria for inclusion in the OU protocol but who were admitted (difference 27 h, 95 % CI 18-72 h). ED observation for APAP overdose can be a viable alternative to inpatient admission. Most patients were successfully discharged from the OU. This evaluation identified both over- and under-utilization of the OU. OU treatment resulted in shorter median length of stay than inpatient admission.

  17. Adaptation of a MR imaging protocol into a real-time clinical biometric ultrasound protocol for persons with spinal cord injury at risk for deep tissue injury: A reliability study.

    Science.gov (United States)

    Swaine, Jillian M; Moe, Andrew; Breidahl, William; Bader, Daniel L; Oomens, Cees W J; Lester, Leanne; O'Loughlin, Edmond; Santamaria, Nick; Stacey, Michael C

    2018-02-01

    High strain in soft tissues that overly bony prominences are considered a risk factor for pressure ulcers (PUs) following spinal cord impairment (SCI) and have been computed using Finite Element methods (FEM). The aim of this study was to translate a MRI protocol into ultrasound (US) and determine between-operator reliability of expert sonographers measuring diameter of the inferior curvature of the ischial tuberosity (IT) and the thickness of the overlying soft tissue layers on able-bodied (AB) and SCI using real-time ultrasound. Part 1: Fourteen AB participants with a mean age of 36.7 ± 12.09 years with 7 males and 7 females had their 3 soft tissue layers in loaded and unloaded sitting measured independently by 2 sonographers: tendon/muscle, skin/fat and total soft tissue and the diameter of the IT in its short and long axis. Part 2: Nineteen participants with SCI were screened, three were excluded due to abnormal skin signs, and eight participants (42%) were excluded for abnormal US signs with normal skin. Eight SCI participants with a mean age of 31.6 ± 13.6 years and all male with 4 paraplegics and 4 tetraplegics were measured by the same sonographers for skin, fat, tendon, muscle and total. Skin/fat and tendon/muscle were computed. AB between-operator reliability was good (ICC = 0.81-0.90) for 3 soft tissues layers in unloaded and loaded sitting and poor for both IT short and long axis (ICC = -0.028 and -0.01). SCI between-operator reliability was good in unloaded and loaded for total, muscle, fat, skin/fat, tendon/muscle (ICC = 0.75-0.97) and poor for tendon (ICC = 0.26 unloaded and ICC = -0.71 loaded) and skin (ICC = 0.37 unloaded and ICC = 0.10). A MRI protocol was successfully adapted for a reliable 3 soft tissue layer model and could be used in a 2-D FEM model designed to estimate soft tissue strain as a novel risk factor for the development of a PU. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  18. HACCP and SACCP protocols for ready-to-eat meals pasteurised with ionising radiation

    Energy Technology Data Exchange (ETDEWEB)

    Haruvy, Y [Soreq Nuclear Research Centre, Israel Atomic Energy Commission, (Israel)

    2002-07-01

    The rationale is the necessity to identify, ab-initio, critical potential failure modes: Hazardous, Sensory, as well as Economic, and assign Critical Control Points to detect and/or eliminate them in due time and course. Preliminary SACCP could be orchestrated along the existing HACCP lines with relatively minor modifications. Care should be taken to avoid overlooking of high-risk failure modes, as well as to avoid overdoing the analysis to yield numerous CCPs with small marginal value. A combined H-S-E ACCP protocol should allow for a facile analytical tool of the objective projects. Primary fields of failure modes seem to be non-uniformity of ingredients, processing and testing.

  19. Risk analysis and reliability

    International Nuclear Information System (INIS)

    Uppuluri, V.R.R.

    1979-01-01

    Mathematical foundations of risk analysis are addressed. The importance of having the same probability space in order to compare different experiments is pointed out. Then the following topics are discussed: consequences as random variables with infinite expectations; the phenomenon of rare events; series-parallel systems and different kinds of randomness that could be imposed on such systems; and the problem of consensus of estimates of expert opinion

  20. Assessment report on NRP sub-theme 'Risk Analysis'

    International Nuclear Information System (INIS)

    Biesiot, W.; Hendrickx, L.; Olsthoorn, A.A.

    1995-01-01

    An overview and assessment are presented of the three research projects carried out under NRP funding that concern risk-related topics: (1) The risks of nonlinear climate changes, (2) Socio-economic and policy aspects of changes in incidence and intensity of extreme (weather) events, and (3) Characterizing the risks: a comparative analysis of the risks of global warming and of relevant policy strategies. 1 tab., 6 refs

  1. Applications of probabilistic risk analysis in nuclear criticality safety design

    International Nuclear Information System (INIS)

    Chang, J.K.

    1992-01-01

    Many documents have been prepared that try to define the scope of the criticality analysis and that suggest adding probabilistic risk analysis (PRA) to the deterministic safety analysis. The report of the US Department of Energy (DOE) AL 5481.1B suggested that an accident is credible if the occurrence probability is >1 x 10 -6 /yr. The draft DOE 5480 safety analysis report suggested that safety analyses should include the application of methods such as deterministic safety analysis, risk assessment, reliability engineering, common-cause failure analysis, human reliability analysis, and human factor safety analysis techniques. The US Nuclear Regulatory Commission (NRC) report NRC SG830.110 suggested that major safety analysis methods should include but not be limited to risk assessment, reliability engineering, and human factor safety analysis. All of these suggestions have recommended including PRA in the traditional criticality analysis

  2. GIS risk analysis of hazardous materials transport

    International Nuclear Information System (INIS)

    Anders, C.; Olsten, J.

    1991-01-01

    The Geographic Information System (GIS) was used to assess the risks and vulnerability of transporting hazardous materials and wastes (such as gasoline, explosives, poisons, etc) on the Arizona highway system. This paper discusses the methodology that was utilized, and the application of GIS systems to risk analysis problems

  3. A Novel Process Audit for Standardized Perioperative Handoff Protocols.

    Science.gov (United States)

    Pallekonda, Vinay; Scholl, Adam T; McKelvey, George M; Amhaz, Hassan; Essa, Deanna; Narreddy, Spurthy; Tan, Jens; Templonuevo, Mark; Ramirez, Sasha; Petrovic, Michelle A

    2017-11-01

    A perioperative handoff protocol provides a standardized delivery of communication during a handoff that occurs from the operating room to the postanestheisa care unit or ICU. The protocol's success is dependent, in part, on its continued proper use over time. A novel process audit was developed to help ensure that a perioperative handoff protocol is used accurately and appropriately over time. The Audit Observation Form is used for the Audit Phase of the process audit, while the Audit Averages Form is used for the Data Analysis Phase. Employing minimal resources and using quantitative methods, the process audit provides the necessary means to evaluate the proper execution of any perioperative handoff protocol. Copyright © 2017 The Joint Commission. Published by Elsevier Inc. All rights reserved.

  4. Complementary feeding and the early origins of obesity risk: a study protocol

    OpenAIRE

    Muniandy, Naleena Devi; Allotey, Pascale A; Soyiri, Ireneous N; Reidpath, Daniel D

    2016-01-01

    Introduction The rise in the prevalence of childhood obesity worldwide calls for an intervention earlier in the life cycle. Studies show that nutrition during early infancy may contribute to later obesity. Hence, this study is designed to determine if the variation in complementary feeding practices poses a risk for the development of obesity later in life. A mixed methods approach will be used in conducting this study. Methods and analysis The target participants are infants born from Januar...

  5. APPROPRIATE ALLOCATION OF CONTINGENCY USING RISK ANALYSIS METHODOLOGY

    Directory of Open Access Journals (Sweden)

    Andi Andi

    2004-01-01

    Full Text Available Many cost overruns in the world of construction are attributable to either unforeseen events or foreseen events for which uncertainty was not appropriately accommodated. It is argued that a significant improvement to project management performance may result from greater attention to the process of analyzing project risks. The objective of this paper is to propose a risk analysis methodology for appropriate allocation of contingency in project cost estimation. In the first step, project risks will be identified. Influence diagramming technique is employed to identify and to show how the risks affect the project cost elements and also the relationships among the risks themselves. The second step is to assess the project costs with regards to the risks under consideration. Using a linguistic approach, the degree of uncertainty of identified project risks is assessed and quantified. The problem of dependency between risks is taken into consideration during this analysis. For the final step, as the main purpose of this paper, a method for allocating appropriate contingency is presented. Two types of contingencies, i.e. project contingency and management reserve are proposed to accommodate the risks. An illustrative example is presented at the end to show the application of the methodology.

  6. The integration methods of fuzzy fault mode and effect analysis and fault tree analysis for risk analysis of yogurt production

    Science.gov (United States)

    Aprilia, Ayu Rizky; Santoso, Imam; Ekasari, Dhita Murita

    2017-05-01

    Yogurt is a product based on milk, which has beneficial effects for health. The process for the production of yogurt is very susceptible to failure because it involves bacteria and fermentation. For an industry, the risks may cause harm and have a negative impact. In order for a product to be successful and profitable, it requires the analysis of risks that may occur during the production process. Risk analysis can identify the risks in detail and prevent as well as determine its handling, so that the risks can be minimized. Therefore, this study will analyze the risks of the production process with a case study in CV.XYZ. The method used in this research is the Fuzzy Failure Mode and Effect Analysis (fuzzy FMEA) and Fault Tree Analysis (FTA). The results showed that there are 6 risks from equipment variables, raw material variables, and process variables. Those risks include the critical risk, which is the risk of a lack of an aseptic process, more specifically if starter yogurt is damaged due to contamination by fungus or other bacteria and a lack of sanitation equipment. The results of quantitative analysis of FTA showed that the highest probability is the probability of the lack of an aseptic process, with a risk of 3.902%. The recommendations for improvement include establishing SOPs (Standard Operating Procedures), which include the process, workers, and environment, controlling the starter of yogurt and improving the production planning and sanitation equipment using hot water immersion.

  7. Analysis of risk factors for persistent infection of asymptomatic women with high-risk human papilloma virus.

    Science.gov (United States)

    Shi, Nianmin; Lu, Qiang; Zhang, Jiao; Li, Li; Zhang, Junnan; Zhang, Fanglei; Dong, Yanhong; Zhang, Xinyue; Zhang, Zheng; Gao, Wenhui

    2017-06-03

    This study aims to prevent persistentinfection, reduce the incidence of cervical cancer, and improve women's health by understanding the theoretical basis of the risk factors for continuous infection of asymptomatic women with high-risk human papilloma virus (HPV) strains via information collected, which includes the persistent infection rate and the most prevalent HPV strain types of high risk to asymptomatic women in the high-risk area of cervical cancer in Linfen, Shanxi Province. Based on the method of cluster sampling, locations were chosen from the industrial county and agricultural county of Linfen, Shanxi Province, namely the Xiangfen and Quwo counties. Use of the convenience sampling (CS) method enables the identification of women who have sex but without symptoms of abnormal cervix for analyzing risk factors of HPV-DNA detection and performing a retrospective questionnaire survey in these 2 counties. Firstly, cervical exfoliated cell samples were collected for thin-layer liquid-based cytology test (TCT), and simultaneously testing high-risk type HPV DNA, then samples with positive testing results were retested to identify the infected HPV types. The 6-month period of testing was done to derive the 6-month persistent infection rate. The retrospective survey included concepts addressed in the questionnaire: basic situation of the research objects, menstrual history, marital status, pregnancy history, sexual habits and other aspects. The questionnaire was divided into a case group and a comparison group, which are based on the high-risk HPV-DNA testing result to ascertain whether or not there is persistent infection. Statistical analysis employed Epidate3.1 software for date entry, SPSS17.0 for date statistical analysis. Select statistic charts, Chi-Square Analysis, single-factor analysis and multivariate Logistic regression analysis to analyze the protective factors and risk factors of high-risk HPV infection. Risk factors are predicted by using the

  8. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  9. The application of CFD to hydrogen risk analysis in nuclear power plants

    International Nuclear Information System (INIS)

    Wang Hui; Han Xu; Chang Meng; Wang Xiaofeng; Wang Shuguo; Lu Xinhua; Wu Lin

    2013-01-01

    Status of the hydrogen risk analysis method is systemically summarized in this paper and the advantages and limits of CFD (Computational Fluid Dynamic) in hydrogen risk analysis is discussed. The international experimental programs on the CFD hydrogen risk analysis are introduced in this paper. The application of CFD to nuclear power plant (NPP) hydrogen risk analysis is introduced in detail by taking EPR and Ling'ao NPP for example. In these bases, the CFD development prospect of hydrogen risk analysis is also summarized in this paper. (authors)

  10. Validity of partial protocols to assess the prevalence of periodontal outcomes and associated sociodemographic and behavior factors in adolescents and young adults.

    Science.gov (United States)

    Peres, Marco A; Peres, Karen G; Cascaes, Andreia M; Correa, Marcos B; Demarco, Flávio F; Hallal, Pedro C; Horta, Bernardo L; Gigante, Denise P; Menezes, Ana B

    2012-03-01

    Most studies comparing prevalence of periodontal disease and risk factors by using partial protocols were performed in adult populations, with several studies being conducted in clinical settings. The aim of this study is to assess the accuracy of partial protocols in estimating the prevalence of periodontal outcomes in adolescents and young adults from two population-based birth cohorts from Pelotas, Brazil, and to assess differences in the estimation and strength of the effect measures when partial protocols are adopted compared to full-mouth examination. Gingival bleeding at probing among adolescents (n = 339) and young adults (n = 720) and dental calculus and periodontal probing depth among young adults were assessed using full-mouth examinations and four partial protocols: Ramfjord teeth (RT), community periodontal index (CPI), and two random diagonal quadrants (1 and 3, 2 and 4). Socioeconomic, demographic, and periodontal health-related variables were also collected. Sensitivity, absolute and relative bias, and inflation factors were calculated. Prevalence ratio for each periodontal outcome for the risk factors was estimated. Two diagonal quadrants showed better accuracy; RT had the worst, whereas CPI presented an intermediate pattern when compared to full-mouth examination. For bleeding assessment in adolescence, RT and CPI underestimated by 18.4% and 16.2%, respectively, the true outcome prevalence, whereas among young adults, all partial protocols underestimated the prevalence. All partial protocols presented similar magnitude of association measures for all investigated periodontal potential risk factors. Two diagonal quadrants protocol may be effective in identifying the risk factors for the most relevant periodontal outcomes in adolescence and in young adulthood.

  11. Examining the impact of genetic testing for type 2 diabetes on health behaviors: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Voils Corrine I

    2012-08-01

    Full Text Available Abstract Background We describe the study design, procedures, and development of the risk counseling protocol used in a randomized controlled trial to evaluate the impact of genetic testing for diabetes mellitus (DM on psychological, health behavior, and clinical outcomes. Methods/Design Eligible patients are aged 21 to 65 years with body mass index (BMI ≥27 kg/m2 and no prior diagnosis of DM. At baseline, conventional DM risk factors are assessed, and blood is drawn for possible genetic testing. Participants are randomized to receive conventional risk counseling for DM with eye disease counseling or with genetic test results. The counseling protocol was pilot tested to identify an acceptable graphical format for conveying risk estimates and match the length of the eye disease to genetic counseling. Risk estimates are presented with a vertical bar graph denoting risk level with colors and descriptors. After receiving either genetic counseling regarding risk for DM or control counseling on eye disease, brief lifestyle counseling for prevention of DM is provided to all participants. Discussion A standardized risk counseling protocol is being used in a randomized trial of 600 participants. Results of this trial will inform policy about whether risk counseling should include genetic counseling. Trial registration ClinicalTrials.gov Identifier NCT01060540

  12. A free and open source QGIS plugin for flood risk analysis: FloodRisk

    Science.gov (United States)

    Albano, Raffaele; Sole, Aurelia; Mancusi, Leonardo

    2016-04-01

    An analysis of global statistics shows a substantial increase in flood damage over the past few decades. Moreover, it is expected that flood risk will continue to rise due to the combined effect of increasing numbers of people and economic assets in risk-prone areas and the effects of climate change. In order to increase the resilience of European economies and societies, the improvement of risk assessment and management has been pursued in the last years. This results in a wide range of flood analysis models of different complexities with substantial differences in underlying components needed for its implementation, as geographical, hydrological and social differences demand specific approaches in the different countries. At present, it is emerging the need of promote the creation of open, transparent, reliable and extensible tools for a comprehensive, context-specific and applicable flood risk analysis. In this context, the free and open-source Quantum GIS (QGIS) plugin "FloodRisk" is a good starting point to address this objective. The vision of the developers of this free and open source software (FOSS) is to combine the main features of state-of-the-art science, collaboration, transparency and interoperability in an initiative to assess and communicate flood risk worldwide and to assist authorities to facilitate the quality and fairness of flood risk management at multiple scales. Among the scientific community, this type of activity can be labelled as "participatory research", intended as adopting a set of techniques that "are interactive and collaborative" and reproducible, "providing a meaningful research experience that both promotes learning and generates knowledge and research data through a process of guided discovery"' (Albano et al., 2015). Moreover, this FOSS geospatial approach can lowering the financial barriers to understanding risks at national and sub-national levels through a spatio-temporal domain and can provide better and more complete

  13. Improvement of burn pain management through routine pain monitoring and pain management protocol.

    Science.gov (United States)

    Yang, Hyeong Tae; Hur, Giyeun; Kwak, In-Suk; Yim, Haejun; Cho, Yong Suk; Kim, Dohern; Hur, Jun; Kim, Jong Hyun; Lee, Boung Chul; Seo, Cheong Hoon; Chun, Wook

    2013-06-01

    Pain management is an important aspect of burn management. We developed a routine pain monitoring system and pain management protocol for burn patients. The purpose of this study is to evaluate the effectiveness of our new pain management system. From May 2011 to November 2011, the prospective study was performed with 107 burn patients. We performed control group (n=58) data analysis and then developed the pain management protocol and monitoring system. Next, we applied our protocol to patients and performed protocol group (n=49) data analysis, and compared this to control group data. Data analysis was performed using the Numeric Rating Scale (NRS) of background pain and procedural pain, Clinician-Administered PTSD Scale (CAPS), Hamilton Depression Rating Scale (HDRS), State-Trait Anxiety Inventory Scale (STAIS), and Holmes and Rahe Stress Scale (HRSS). The NRS of background pain for the protocol group was significantly decreased compared to the control group (2.8±2.0 versus 3.9±1.9), and the NRS of procedural pain of the protocol group was significantly decreased compared to the control group (4.8±2.8 versus 3.7±2.5). CAPS and HDRS were decreased in the protocol group, but did not have statistical significance. STAIS and HRSS were decreased in the protocol group, but only the STAIS had statistical significance. Our new pain management system was effective in burn pain management. However, adequate pain management can only be accomplished by a continuous and thorough effort. Therefore, pain control protocol and pain monitoring systems need to be under constant revision and improvement using creative ideas and approaches. Copyright © 2012 Elsevier Ltd and ISBI. All rights reserved.

  14. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    is formalised in an extension of the LySa process calculus with blinding signatures. The analysis, which is fully automatic, pinpoints previously undiscovered flaws related to verifiability and accuracy and we suggest modifications of the protocol needed for validating these properties....

  15. Evaluation of the Effectiveness of Tai Chi versus Brisk Walking in Reducing Cardiovascular Risk Factors: Protocol for a Randomized Controlled Trial

    Directory of Open Access Journals (Sweden)

    Aileen W. K. Chan

    2016-07-01

    Full Text Available Physical inactivity is one of the major modifiable lifestyle risk factors for cardiovascular disease (CVD. This protocol aims to evaluate the effectiveness of Tai Chi versus brisk walking in reducing CVD risk factors. This is a randomized controlled trial with three arms, namely, Tai Chi group, walking group, and control group. The Tai Chi group will receive Tai Chi training, which consists of two 60-min sessions each week for three months, and self-practice for 30 min every day. The walking group will perform brisk walking for 30 min every day. The control group will receive their usual care. 246 subjects with CVD risk factors will be recruited from two outpatient clinics. The primary outcome is blood pressure. Secondary outcomes include fasting blood for lipid profile, sugar and glycated haemoglobin (HbA1c; body mass index, waist circumference, body fat percentage; perceived stress level and quality of life. Data collections will be conducted at baseline, 3-month, 6-month and 9-month. Generalized estimating equations model will be used to compare the changes in outcomes across time between groups. It is expected that both the Tai Chi and walking groups could maintain better health and have improved quality of life, and that Tai Chi will be more effective than brisk walking in reducing CVD risk factors.

  16. DreamTel; Diabetes risk evaluation and management tele-monitoring study protocol

    Directory of Open Access Journals (Sweden)

    Kiss Alex

    2009-05-01

    Full Text Available Abstract Background The rising prevalence of type 2 diabetes underlines the importance of secondary strategies for the prevention of target organ damage. While access to diabetes education centers and diabetes intensification management has been shown to improve blood glucose control, these services are not available to all that require them, particularly in rural and northern areas. The provision of these services through the Home Care team is an advance that can overcome these barriers. Transfer of blood glucose data electronically from the home to the health care provider may improve diabetes management. Methods and design The study population will consist of patients with type 2 diabetes with uncontrolled A1c levels living on reserve in the Battlefords region of Saskatchewan, Canada. This pilot study will take place over three phases. In the first phase over three months the impact of the introduction of the Bluetooth enabled glucose monitor will be assessed. In the second phase over three months, the development of guidelines based treatment algorithms for diabetes intensification will be completed. In the third phase lasting 18 months, study subjects will have diabetes intensification according to the algorithms developed. Discussion The first phase will determine if the use of the Bluetooth enabled blood glucose devices which can transmit results electronically will lead to changes in A1c levels. It will also determine the feasibility of recruiting subjects to use this technology. The rest of the Diabetes Risk Evaluation and Management Tele-monitoring (DreamTel study will determine if the delivery of a diabetes intensification management program by the Home Care team supported by the Bluetooth enabled glucose meters leads to improvements in diabetes management. Trial Registration Protocol NCT00325624

  17. Chemical risk evaluation, importance of the risk analysis framework uses: Latin America development restrictions

    International Nuclear Information System (INIS)

    Carrillo, M.

    2013-01-01

    The power point presentation is about reach and results of the risk analysis in Venezuela, chemical dangers in food, human damage, injuries , technologies news in fodd development, toxicity, microbiological risk, technical recommendations

  18. P-02: Echocardiography Has Low Clinical Efficacy of Libyan Screening Protocol in Athletes

    Directory of Open Access Journals (Sweden)

    Salaheddin Sharif

    2017-03-01

    Full Text Available INTRODUCTIONPre-participation screening has been largely accepted as a means to identify those athletes at risk of cardiovascular diseases which are responsible for sudden cardiac death. The objectives of athlete screening are to reduce injuries and prevent sudden. However, there is no single commonly adopted protocol to screen athletes. Although the European Society of Cardiology and the American Heart Association recommend the routine screening of athletes to prevent sudden death, there is significant disagreement regarding use 12 lead ECG. FIFA has recommend the inclusion of an Echocardiography (ECHO in screening protocol.PURPOSEExplore the debate regarding differences between European and the USA pre-participation screening protocol for sudden death while also considering pre-competition medical assessment protocol used by the Libyan Football Federation. To provide evidence based recommendations on the best protocol to be used for pre-participation screening, and thus to standardize the screening method.MATERIALS and METHOD1236 male athletic received a medical history, general physical examination, cardiovascular and musculoskeletal examination, 12 lead ECG, blood laboratory test, and echocardiography.FINDINGS1235 athletics were found to be eligible to participate in sport and were given a full medical clearance. One athletic was diagnosed with second degree heart block by ECG while his medical history, physical examination, echocardiograph, and blood test were normal.DISCUSSIONEchocardiography alone do did not identify pathological condition and using echocardiography is still controversial and clinically not effective in young athletesCONCLUSIONThe Screening protocol should include a combination of medical history, physical examination and ECG due to the high sensitivity found, and thus it was able to identify all athletes at risk for the disease.

  19. Spent fuel pool risk analysis for the Dukovany NPP

    Energy Technology Data Exchange (ETDEWEB)

    Hust' ak, S.; Jaros, M.; Kubicek, J. [UJV Rez, a.s., Husinec-Rez (Czech Republic)

    2013-07-01

    UJV Rez, a.s. maintains a Living Probabilistic Safety Assessment (Living PSA) program for Dukovany Nuclear Power Plant (NPP) in the Czech Republic. This project has been established as a framework for activities related to risk assessment and to support for risk-informed decision making at this plant. The most extensively used PSA application at Dukovany NPP is risk monitoring of instantaneous (point-in-time) risk during plant operation, especially for the purpose of configuration risk management during plant scheduled outages to avoid risk significant configurations. The scope of PSA for Dukovany NPP includes also determination of a risk contribution from spent fuel pool (SFP) operation to provide recommendations for the prevention and mitigation of SFP accidents and to be applicable for configuration risk management. This paper describes the analysis of internal initiating events (IEs) in PSA for Dukovany NPP, which can contribute to the risk from SFP operation. The analysis of those IEs was done more thoroughly in the PSA for Dukovany NPP in order to be used in instantaneous risk monitoring. (orig.)

  20. New risk metrics and mathematical tools for risk analysis: Current and future challenges

    International Nuclear Information System (INIS)

    Skandamis, Panagiotis N.; Andritsos, Nikolaos; Psomas, Antonios; Paramythiotis, Spyridon

    2015-01-01

    The current status of the food safety supply world wide, has led Food and Agriculture Organization (FAO) and World Health Organization (WHO) to establishing Risk Analysis as the single framework for building food safety control programs. A series of guidelines and reports that detail out the various steps in Risk Analysis, namely Risk Management, Risk Assessment and Risk Communication is available. The Risk Analysis approach enables integration between operational food management systems, such as Hazard Analysis Critical Control Points, public health and governmental decisions. To do that, a series of new Risk Metrics has been established as follows: i) the Appropriate Level of Protection (ALOP), which indicates the maximum numbers of illnesses in a population per annum, defined by quantitative risk assessments, and used to establish; ii) Food Safety Objective (FSO), which sets the maximum frequency and/or concentration of a hazard in a food at the time of consumption that provides or contributes to the ALOP. Given that ALOP is rather a metric of the public health tolerable burden (it addresses the total ‘failure’ that may be handled at a national level), it is difficult to be interpreted into control measures applied at the manufacturing level. Thus, a series of specific objectives and criteria for performance of individual processes and products have been established, all of them assisting in the achievement of FSO and hence, ALOP. In order to achieve FSO, tools quantifying the effect of processes and intrinsic properties of foods on survival and growth of pathogens are essential. In this context, predictive microbiology and risk assessment have offered an important assistance to Food Safety Management. Predictive modelling is the basis of exposure assessment and the development of stochastic and kinetic models, which are also available in the form of Web-based applications, e.g., COMBASE and Microbial Responses Viewer), or introduced into user

  1. New risk metrics and mathematical tools for risk analysis: Current and future challenges

    Energy Technology Data Exchange (ETDEWEB)

    Skandamis, Panagiotis N., E-mail: pskan@aua.gr; Andritsos, Nikolaos, E-mail: pskan@aua.gr; Psomas, Antonios, E-mail: pskan@aua.gr; Paramythiotis, Spyridon, E-mail: pskan@aua.gr [Laboratory of Food Quality Control and Hygiene, Department of Food Science and Technology, Agricultural University of Athens, Iera Odos 75, 118 55, Athens (Greece)

    2015-01-22

    The current status of the food safety supply world wide, has led Food and Agriculture Organization (FAO) and World Health Organization (WHO) to establishing Risk Analysis as the single framework for building food safety control programs. A series of guidelines and reports that detail out the various steps in Risk Analysis, namely Risk Management, Risk Assessment and Risk Communication is available. The Risk Analysis approach enables integration between operational food management systems, such as Hazard Analysis Critical Control Points, public health and governmental decisions. To do that, a series of new Risk Metrics has been established as follows: i) the Appropriate Level of Protection (ALOP), which indicates the maximum numbers of illnesses in a population per annum, defined by quantitative risk assessments, and used to establish; ii) Food Safety Objective (FSO), which sets the maximum frequency and/or concentration of a hazard in a food at the time of consumption that provides or contributes to the ALOP. Given that ALOP is rather a metric of the public health tolerable burden (it addresses the total ‘failure’ that may be handled at a national level), it is difficult to be interpreted into control measures applied at the manufacturing level. Thus, a series of specific objectives and criteria for performance of individual processes and products have been established, all of them assisting in the achievement of FSO and hence, ALOP. In order to achieve FSO, tools quantifying the effect of processes and intrinsic properties of foods on survival and growth of pathogens are essential. In this context, predictive microbiology and risk assessment have offered an important assistance to Food Safety Management. Predictive modelling is the basis of exposure assessment and the development of stochastic and kinetic models, which are also available in the form of Web-based applications, e.g., COMBASE and Microbial Responses Viewer), or introduced into user

  2. New risk metrics and mathematical tools for risk analysis: Current and future challenges

    Science.gov (United States)

    Skandamis, Panagiotis N.; Andritsos, Nikolaos; Psomas, Antonios; Paramythiotis, Spyridon

    2015-01-01

    The current status of the food safety supply world wide, has led Food and Agriculture Organization (FAO) and World Health Organization (WHO) to establishing Risk Analysis as the single framework for building food safety control programs. A series of guidelines and reports that detail out the various steps in Risk Analysis, namely Risk Management, Risk Assessment and Risk Communication is available. The Risk Analysis approach enables integration between operational food management systems, such as Hazard Analysis Critical Control Points, public health and governmental decisions. To do that, a series of new Risk Metrics has been established as follows: i) the Appropriate Level of Protection (ALOP), which indicates the maximum numbers of illnesses in a population per annum, defined by quantitative risk assessments, and used to establish; ii) Food Safety Objective (FSO), which sets the maximum frequency and/or concentration of a hazard in a food at the time of consumption that provides or contributes to the ALOP. Given that ALOP is rather a metric of the public health tolerable burden (it addresses the total `failure' that may be handled at a national level), it is difficult to be interpreted into control measures applied at the manufacturing level. Thus, a series of specific objectives and criteria for performance of individual processes and products have been established, all of them assisting in the achievement of FSO and hence, ALOP. In order to achieve FSO, tools quantifying the effect of processes and intrinsic properties of foods on survival and growth of pathogens are essential. In this context, predictive microbiology and risk assessment have offered an important assistance to Food Safety Management. Predictive modelling is the basis of exposure assessment and the development of stochastic and kinetic models, which are also available in the form of Web-based applications, e.g., COMBASE and Microbial Responses Viewer), or introduced into user-friendly softwares

  3. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  4. Risk analysis for decision support in electricity distribution system asset management: methods and frameworks for analysing intangible risks

    Energy Technology Data Exchange (ETDEWEB)

    Nordgaard, Dag Eirik

    2010-04-15

    During the last 10 to 15 years electricity distribution companies throughout the world have been ever more focused on asset management as the guiding principle for their activities. Within asset management, risk is a key issue for distribution companies, together with handling of cost and performance. There is now an increased awareness of the need to include risk analyses into the companies' decision making processes. Much of the work on risk in electricity distribution systems has focused on aspects of reliability. This is understandable, since it is surely an important feature of the product delivered by the electricity distribution infrastructure, and it is high on the agenda for regulatory authorities in many countries. However, electricity distribution companies are also concerned with other risks relevant for their decision making. This typically involves intangible risks, such as safety, environmental impacts and company reputation. In contrast to the numerous methodologies developed for reliability risk analysis, there are relatively few applications of structured analyses to support decisions concerning intangible risks, even though they represent an important motivation for decisions taken in electricity distribution companies. The overall objective of this PhD work has been to explore risk analysis methods that can be used to improve and support decision making in electricity distribution system asset management, with an emphasis on the analysis of intangible risks. The main contributions of this thesis can be summarised as: An exploration and testing of quantitative risk analysis (QRA) methods to support decisions concerning intangible risks; The development of a procedure for using life curve models to provide input to QRA models; The development of a framework for risk-informed decision making where QRA are used to analyse selected problems; In addition, the results contribute to clarify the basic concepts of risk, and highlight challenges

  5. Subgroup analyses in randomised controlled trials: cohort study on trial protocols and journal publications.

    Science.gov (United States)

    Kasenda, Benjamin; Schandelmaier, Stefan; Sun, Xin; von Elm, Erik; You, John; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Rosenthal, Rachel; Ebrahim, Shanil; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias

    2014-07-16

    To investigate the planning of subgroup analyses in protocols of randomised controlled trials and the agreement with corresponding full journal publications. Cohort of protocols of randomised controlled trial and subsequent full journal publications. Six research ethics committees in Switzerland, Germany, and Canada. 894 protocols of randomised controlled trial involving patients approved by participating research ethics committees between 2000 and 2003 and 515 subsequent full journal publications. Of 894 protocols of randomised controlled trials, 252 (28.2%) included one or more planned subgroup analyses. Of those, 17 (6.7%) provided a clear hypothesis for at least one subgroup analysis, 10 (4.0%) anticipated the direction of a subgroup effect, and 87 (34.5%) planned a statistical test for interaction. Industry sponsored trials more often planned subgroup analyses compared with investigator sponsored trials (195/551 (35.4%) v 57/343 (16.6%), P<0.001). Of 515 identified journal publications, 246 (47.8%) reported at least one subgroup analysis. In 81 (32.9%) of the 246 publications reporting subgroup analyses, authors stated that subgroup analyses were prespecified, but this was not supported by 28 (34.6%) corresponding protocols. In 86 publications, authors claimed a subgroup effect, but only 36 (41.9%) corresponding protocols reported a planned subgroup analysis. Subgroup analyses are insufficiently described in the protocols of randomised controlled trials submitted to research ethics committees, and investigators rarely specify the anticipated direction of subgroup effects. More than one third of statements in publications of randomised controlled trials about subgroup prespecification had no documentation in the corresponding protocols. Definitive judgments regarding credibility of claimed subgroup effects are not possible without access to protocols and analysis plans of randomised controlled trials. © The DISCO study group 2014.

  6. [Reliability theory based on quality risk network analysis for Chinese medicine injection].

    Science.gov (United States)

    Li, Zheng; Kang, Li-Yuan; Fan, Xiao-Hui

    2014-08-01

    A new risk analysis method based upon reliability theory was introduced in this paper for the quality risk management of Chinese medicine injection manufacturing plants. The risk events including both cause and effect ones were derived in the framework as nodes with a Bayesian network analysis approach. It thus transforms the risk analysis results from failure mode and effect analysis (FMEA) into a Bayesian network platform. With its structure and parameters determined, the network can be used to evaluate the system reliability quantitatively with probabilistic analytical appraoches. Using network analysis tools such as GeNie and AgenaRisk, we are able to find the nodes that are most critical to influence the system reliability. The importance of each node to the system can be quantitatively evaluated by calculating the effect of the node on the overall risk, and minimization plan can be determined accordingly to reduce their influences and improve the system reliability. Using the Shengmai injection manufacturing plant of SZYY Ltd as a user case, we analyzed the quality risk with both static FMEA analysis and dynamic Bayesian Network analysis. The potential risk factors for the quality of Shengmai injection manufacturing were identified with the network analysis platform. Quality assurance actions were further defined to reduce the risk and improve the product quality.

  7. A systematic review of risk factors associated with accidental falls, outcome measures and interventions to manage fall risk in non-ambulatory adults.

    Science.gov (United States)

    Rice, Laura A; Ousley, Cherita; Sosnoff, Jacob J

    2015-01-01

    To systematically review peer-reviewed literature pertaining to risk factors, outcome measures and interventions managing fall risk in non-ambulatory adults. Twenty-one papers were selected for inclusion from databases including PubMed/Medline, Cumulative Index to Nursing and Allied Health Literature (CINAHL), Cochrane Library, Scopus, Consumer Health Complete and Web of Science. Selected studies involved a description of fall related risk factors, outcomes to assess fall risk and intervention studies describing protocols to manage fall risk in non-ambulatory adults. Studies were selected by two reviewers and consultation provided by a third reviewer. The most frequently cited risk factors/characteristics associated with falls included: wheelchair related characteristics, transfer activities, impaired seated balance and environmental factors. The majority of the outcomes were found to evaluate seated postural control. One intervention study was identified describing a protocol targeting specific problems of individual participants. A global fall prevention program was not identified. Several risk factors associated with falls were identified and must be understood by clinicians to better serve their clients. To improve objective assessment, a comprehensive outcome assessment specific to non-ambulatory adults is needed. Finally, additional research is needed to examine the impact of structured protocols to manage fall risk in non-ambulatory adults. Falls are a common health concern for non-ambulatory adults. Risk factors commonly associated with falls include wheelchair related characteristics, transfer activities, impaired seated balance and environmental factors. Limited outcome measures are available to assess fall risk in non-ambulatory adults. Clinicians must be aware of the known risk factors and provide comprehensive education to their clients on the potential for falls. Additional research is needed to develop and evaluate protocols to clinically manage fall

  8. Dietary patterns and colorectal cancer risk: a meta-analysis.

    Science.gov (United States)

    Feng, Yu-Liang; Shu, Long; Zheng, Pei-Fen; Zhang, Xiao-Yan; Si, Cai-Juan; Yu, Xiao-Long; Gao, Wei; Zhang, Lun

    2017-05-01

    The analysis of dietary patterns has recently drawn considerable attention as a method of investigating the association between the overall whole diet and the risk of colorectal cancer. However, the results have yielded conflicting findings. Here, we carried out a meta-analysis to identify the association between dietary patterns and the risk of colorectal cancer. A total of 40 studies fulfilled the inclusion criteria and were included in this meta-analysis. The highest category of 'healthy' dietary pattern compared with the lowest category was apparently associated with a decreased risk for colorectal cancer [odds ratio (OR)=0.75; confidence interval (CI): 0.68-0.83; Pcolorectal cancer was shown for the highest compared with the lowest category of a 'western-style' dietary pattern (OR=1.40; CI: 1.26-1.56; Pcolorectal cancer in the highest compared with the lowest category of 'alcohol-consumption' pattern (OR=1.44; CI: 1.13-1.82; P=0.003). The results of this meta-analysis indicate that a 'healthy' dietary pattern may decrease the risk of colorectal cancer, whereas 'western-style' and 'alcohol-consumption' patterns may increase the risk of colorectal cancer.

  9. The MOBI-Kids Study Protocol: Challenges in Assessing Childhood and Adolescent Exposure to Electromagnetic Fields from Wireless Telecommunication Technologies and Possible Association with Brain Tumor Risk

    Science.gov (United States)

    Sadetzki, Siegal; Langer, Chelsea Eastman; Bruchim, Revital; Kundi, Michael; Merletti, Franco; Vermeulen, Roel; Kromhout, Hans; Lee, Ae-Kyoung; Maslanyj, Myron; Sim, Malcolm R.; Taki, Masao; Wiart, Joe; Armstrong, Bruce; Milne, Elizabeth; Benke, Geza; Schattner, Rosa; Hutter, Hans-Peter; Woehrer, Adelheid; Krewski, Daniel; Mohipp, Charmaine; Momoli, Franco; Ritvo, Paul; Spinelli, John; Lacour, Brigitte; Delmas, Dominique; Remen, Thomas; Radon, Katja; Weinmann, Tobias; Klostermann, Swaantje; Heinrich, Sabine; Petridou, Eleni; Bouka, Evdoxia; Panagopoulou, Paraskevi; Dikshit, Rajesh; Nagrani, Rajini; Even-Nir, Hadas; Chetrit, Angela; Maule, Milena; Migliore, Enrica; Filippini, Graziella; Miligi, Lucia; Mattioli, Stefano; Yamaguchi, Naohito; Kojimahara, Noriko; Ha, Mina; Choi, Kyung-Hwa; Mannetje, Andrea ’t; Eng, Amanda; Woodward, Alistair; Carretero, Gema; Alguacil, Juan; Aragones, Nuria; Suare-Varela, Maria Morales; Goedhart, Geertje; Schouten-van Meeteren, A. Antoinette Y. N.; Reedijk, A. Ardine M. J.; Cardis, Elisabeth

    2014-01-01

    The rapid increase in mobile phone use in young people has generated concern about possible health effects of exposure to radiofrequency (RF) and extremely low frequency (ELF) electromagnetic fields (EMF). MOBI-Kids, a multinational case–control study, investigates the potential effects of childhood and adolescent exposure to EMF from mobile communications technologies on brain tumor risk in 14 countries. The study, which aims to include approximately 1,000 brain tumor cases aged 10–24 years and two individually matched controls for each case, follows a common protocol and builds upon the methodological experience of the INTERPHONE study. The design and conduct of a study on EMF exposure and brain tumor risk in young people in a large number of countries is complex and poses methodological challenges. This manuscript discusses the design of MOBI-Kids and describes the challenges and approaches chosen to address them, including: (1) the choice of controls operated for suspected appendicitis, to reduce potential selection bias related to low response rates among population controls; (2) investigating a young study population spanning a relatively wide age range; (3) conducting a large, multinational epidemiological study, while adhering to increasingly stricter ethics requirements; (4) investigating a rare and potentially fatal disease; and (5) assessing exposure to EMF from communication technologies. Our experience in thus far developing and implementing the study protocol indicates that MOBI-Kids is feasible and will generate results that will contribute to the understanding of potential brain tumor risks associated with use of mobile phones and other wireless communications technologies among young people. PMID:25295243

  10. The MOBI-Kids study protocol: challenges in assessing childhood and adolescent exposure to electromagnetic fields from wireless telecommunication technologies and possible association with brain tumor risk

    Directory of Open Access Journals (Sweden)

    Siegal eSadetzki

    2014-09-01

    Full Text Available The rapid increase in mobile phone use in young people has generated concern about possible health effects of exposure to radiofrequency (RF, extremely low frequency (ELF electromagnetic fields (EMF. MOBI-Kids, a multinational case-control study, investigates the potential effects of childhood and adolescent exposure to EMF from mobile communications technologies on brain tumor risk in 14 countries. The study, which aims to include approximately 1,000 brain tumor cases aged 10-24 years and two individually matched controls for each case, follows a common protocol and builds upon the methodological experience of the INTERPHONE study. The design and conduct of a study on EMF exposure and brain tumor risk in young people in a large number of countries is complex and poses methodological challenges. This manuscript discusses the design of MOBI-Kids and describes the challenges and approaches chosen to address them, including: 1 the choice of controls operated for suspected appendicitis, to reduce potential selection bias related to low response rates among population controls; 2 investigating a young study population spanning a relatively wide age-range. 3 conducting a large, multinational epidemiological study, while adhering to increasingly stricter ethics requirements; 4 investigating a rare and potentially fatal disease; and 5 assessing exposure to EMF from communication technologies. Our experience thus far developing and implementing the study protocol indicates that MOBI-Kids is feasible and will generate results that will contribute to the understanding of potential brain tumor risks associated with use of mobile phones and other wireless communications technologies among young people.

  11. Sensitivity Analysis of Launch Vehicle Debris Risk Model

    Science.gov (United States)

    Gee, Ken; Lawrence, Scott L.

    2010-01-01

    As part of an analysis of the loss of crew risk associated with an ascent abort system for a manned launch vehicle, a model was developed to predict the impact risk of the debris resulting from an explosion of the launch vehicle on the crew module. The model consisted of a debris catalog describing the number, size and imparted velocity of each piece of debris, a method to compute the trajectories of the debris and a method to calculate the impact risk given the abort trajectory of the crew module. The model provided a point estimate of the strike probability as a function of the debris catalog, the time of abort and the delay time between the abort and destruction of the launch vehicle. A study was conducted to determine the sensitivity of the strike probability to the various model input parameters and to develop a response surface model for use in the sensitivity analysis of the overall ascent abort risk model. The results of the sensitivity analysis and the response surface model are presented in this paper.

  12. HISTOPATHOLOGICAL AND CYTOLOGICAL ANALYSIS OF TRANSMISSIBLE VENEREAL TUMOR IN DOGS AFTER TWO TREATMENT PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Fabiana Aguena Sales Lapa

    2012-06-01

    Full Text Available The transmissible venereal tumor (TVT is a contagious neoplasm of round cells that frequently affect dogs. The treatment consists of chemotherapy being more effective the vincristine alone, however the resistance emergence to this agent due multidrug resistance of the P-glycoprotein (P-gp, a transporter protein encoded by the MDR1 gene, has been taking the association with other drugs. Recent studies demonstrated the antitumoral effect of the avermectins when associated to the vincristine in the treatment of some neoplasms. Therefore, the objective of the present study was to compare the effectiveness of standard treatment of TVT with vincristine only when compared to combined treatment with vincristine and ivermectin, evaluated through number of applications of the two protocols, histopathological and cytological analysis from 50 dogs diagnosed with TVT during the period of 2007 to 2010. The combined protocol significant reduced the number of applications and cytological and histopathological findings collaborate with the hypothesis that the combination of vincristine and ivermectin promotes faster healing than the use of vincristine alone. Combination treatment with vincristine and ivermectin could be in the future an excellent therapeutic alternative for the treatment of TVT for probably reducing the resistance to vincristine, simultaneously reducing the cost of TVT treatment and promoting a faster recovery of the dog.

  13. Privacy-Preserving Meter Report Protocol of Isolated Smart Grid Devices

    Directory of Open Access Journals (Sweden)

    Zhiwei Wang

    2017-01-01

    Full Text Available Smart grid aims to improve the reliability, efficiency, and security of the traditional grid, which allows two-way transmission and efficiency-driven response. However, a main concern of this new technique is that the fine-grained metering data may leak the personal privacy information of the customers. Thus, the data aggregation mechanism for privacy protection is required for the meter report protocol in smart grid. In this paper, we propose an efficient privacy-preserving meter report protocol for the isolated smart grid devices. Our protocol consists of an encryption scheme with additively homomorphic property and a linearly homomorphic signature scheme, where the linearly homomorphic signature scheme is suitable for privacy-preserving data aggregation. We also provide security analysis of our protocol in the context of some typical attacks in smart grid. The implementation of our protocol on the Intel Edison platform shows that our protocol is efficient enough for the physical constrained devices, like smart meters.

  14. Supplemental Hazard Analysis and Risk Assessment - Hydrotreater

    Energy Technology Data Exchange (ETDEWEB)

    Lowry, Peter P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Wagner, Katie A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-04-01

    A supplemental hazard analysis was conducted and quantitative risk assessment performed in response to an independent review comment received by the Pacific Northwest National Laboratory (PNNL) from the U.S. Department of Energy Pacific Northwest Field Office (PNSO) against the Hydrotreater/Distillation Column Hazard Analysis Report issued in April 2013. The supplemental analysis used the hazardous conditions documented by the previous April 2013 report as a basis. The conditions were screened and grouped for the purpose of identifying whether additional prudent, practical hazard controls could be identified, using a quantitative risk evaluation to assess the adequacy of the controls and establish a lower level of concern for the likelihood of potential serious accidents. Calculations were performed to support conclusions where necessary.

  15. Specimen preparation, imaging, and analysis protocols for knife-edge scanning microscopy.

    Science.gov (United States)

    Choe, Yoonsuck; Mayerich, David; Kwon, Jaerock; Miller, Daniel E; Sung, Chul; Chung, Ji Ryang; Huffman, Todd; Keyser, John; Abbott, Louise C

    2011-12-09

    Major advances in high-throughput, high-resolution, 3D microscopy techniques have enabled the acquisition of large volumes of neuroanatomical data at submicrometer resolution. One of the first such instruments producing whole-brain-scale data is the Knife-Edge Scanning Microscope (KESM), developed and hosted in the authors' lab. KESM has been used to section and image whole mouse brains at submicrometer resolution, revealing the intricate details of the neuronal networks (Golgi), vascular networks (India ink), and cell body distribution (Nissl). The use of KESM is not restricted to the mouse nor the brain. We have successfully imaged the octopus brain, mouse lung, and rat brain. We are currently working on whole zebra fish embryos. Data like these can greatly contribute to connectomics research; to microcirculation and hemodynamic research; and to stereology research by providing an exact ground-truth. In this article, we will describe the pipeline, including specimen preparation (fixing, staining, and embedding), KESM configuration and setup, sectioning and imaging with the KESM, image processing, data preparation, and data visualization and analysis. The emphasis will be on specimen preparation and visualization/analysis of obtained KESM data. We expect the detailed protocol presented in this article to help broaden the access to KESM and increase its utilization.

  16. Comparison of MANET Routing Protocols in Different Traffic and Mobility Models

    Directory of Open Access Journals (Sweden)

    J. Baraković

    2010-06-01

    Full Text Available Routing protocol election in MANET (Mobile Ad Hoc Network is a great challenge, because of its frequent topology changes and routing overhead. This paper compares performances of three routing protocols: Destination Sequenced Distance Vector (DSDV, Ad Hoc Ondemand Distance Vector (AODV and Dynamic Source Routing (DSR, based on results analysis obtained using simulations with different load and mobility scenarios performed with Network Simulator version 2 (NS-2. In low load and low mobility scenarios routing protocols perform in a similar manner. However, with mobility and load increasing DSR outperforms AODV and DSDV protocols.

  17. Assessment tools for the measurement of the self-efficacy of drug users: protocol for a systematic review.

    Science.gov (United States)

    Vasconcelos, Selene Cordeiro; Frazão, Iracema da Silva; Sougey, Everton Botelho; Souza, Sandra Lopes de; Silva, Tatiana de Paula Santana da; Lima, Murilo Duarte da Costa

    2018-03-14

    The abuse of alcohol and other drugs is a worldwide problem, the treatment of which poses a challenge to healthcare workers. This study presents a proposal for a systematic review to analyse the psychometric properties of assessment tools developed to measure the self-efficacy of drug users with regard to resisting the urge to take drugs in high-risk situations. The guiding question was based on PICOS (Population Intervention Comparator Outcome Setting), and the report of the methods of review protocol was written in accordance with the Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA-P). Searches will be performed in the PsycINFO, Cochrane, Pubmed, Web of Science, SCOPUS and CINAHL databases, followed by the use of the 'snowball' strategy. The inclusion criteria for the articles will be (1) assessment tool validation studies; (2) assessment tools developed to measure self-efficacy; (3) quantitative measures; (4) measures designed for use on adults; (5) data from self-reports of the participants; (6) studies involving a description of psychometric properties of the measures; and (7) studies that explain how the level of self-efficacy is scored. The search, selection and analysis will be performed by two independent reviewers. In cases of a divergence of opinion, a third reviewer will be consulted. The COSMIN checklist will be used for the appraisal of the methodological quality of the assessment tools and the certainty of the evidence in the articles (risk of bias) will be analysed using the GRADE (Grading of Recommendations Assessment, Development and Evaluation) approach. This protocol does not require ethical approval. However, this protocol is part of the thesis entitled Drug-Taking Confidence Questionnaire for use in Brazil, presented for obtaining a doctorate in neuropsychiatry and behavioural sciences from the Federal University of Pernambuco, and has received approval from the human research ethics committee of the Federal

  18. Revealing the underlying drivers of disaster risk: a global analysis

    Science.gov (United States)

    Peduzzi, Pascal

    2017-04-01

    Disasters events are perfect examples of compound events. Disaster risk lies at the intersection of several independent components such as hazard, exposure and vulnerability. Understanding the weight of each component requires extensive standardisation. Here, I show how footprints of past disastrous events were generated using GIS modelling techniques and used for extracting population and economic exposures based on distribution models. Using past event losses, it was possible to identify and quantify a wide range of socio-politico-economic drivers associated with human vulnerability. The analysis was applied to about nine thousand individual past disastrous events covering earthquakes, floods and tropical cyclones. Using a multiple regression analysis on these individual events it was possible to quantify each risk component and assess how vulnerability is influenced by various hazard intensities. The results show that hazard intensity, exposure, poverty, governance as well as other underlying factors (e.g. remoteness) can explain the magnitude of past disasters. Analysis was also performed to highlight the role of future trends in population and climate change and how this may impacts exposure to tropical cyclones in the future. GIS models combined with statistical multiple regression analysis provided a powerful methodology to identify, quantify and model disaster risk taking into account its various components. The same methodology can be applied to various types of risk at local to global scale. This method was applied and developed for the Global Risk Analysis of the Global Assessment Report on Disaster Risk Reduction (GAR). It was first applied on mortality risk in GAR 2009 and GAR 2011. New models ranging from global assets exposure and global flood hazard models were also recently developed to improve the resolution of the risk analysis and applied through CAPRA software to provide probabilistic economic risk assessments such as Average Annual Losses (AAL

  19. Risk analysis of heat recovery steam generator with semi quantitative risk based inspection API 581

    Science.gov (United States)

    Prayogo, Galang Sandy; Haryadi, Gunawan Dwi; Ismail, Rifky; Kim, Seon Jin

    2016-04-01

    Corrosion is a major problem that most often occurs in the power plant. Heat recovery steam generator (HRSG) is an equipment that has a high risk to the power plant. The impact of corrosion damage causing HRSG power plant stops operating. Furthermore, it could be threaten the safety of employees. The Risk Based Inspection (RBI) guidelines by the American Petroleum Institute (API) 58 has been used to risk analysis in the HRSG 1. By using this methodology, the risk that caused by unexpected failure as a function of the probability and consequence of failure can be estimated. This paper presented a case study relating to the risk analysis in the HRSG, starting with a summary of the basic principles and procedures of risk assessment and applying corrosion RBI for process industries. The risk level of each HRSG equipment were analyzed: HP superheater has a medium high risk (4C), HP evaporator has a medium-high risk (4C), and the HP economizer has a medium risk (3C). The results of the risk assessment using semi-quantitative method of standard API 581 based on the existing equipment at medium risk. In the fact, there is no critical problem in the equipment components. Damage mechanisms were prominent throughout the equipment is thinning mechanism. The evaluation of the risk approach was done with the aim of reducing risk by optimizing the risk assessment activities.

  20. Risk analysis of heat recovery steam generator with semi quantitative risk based inspection API 581

    International Nuclear Information System (INIS)

    Prayogo, Galang Sandy; Haryadi, Gunawan Dwi; Ismail, Rifky; Kim, Seon Jin

    2016-01-01

    Corrosion is a major problem that most often occurs in the power plant. Heat recovery steam generator (HRSG) is an equipment that has a high risk to the power plant. The impact of corrosion damage causing HRSG power plant stops operating. Furthermore, it could be threaten the safety of employees. The Risk Based Inspection (RBI) guidelines by the American Petroleum Institute (API) 58 has been used to risk analysis in the HRSG 1. By using this methodology, the risk that caused by unexpected failure as a function of the probability and consequence of failure can be estimated. This paper presented a case study relating to the risk analysis in the HRSG, starting with a summary of the basic principles and procedures of risk assessment and applying corrosion RBI for process industries. The risk level of each HRSG equipment were analyzed: HP superheater has a medium high risk (4C), HP evaporator has a medium-high risk (4C), and the HP economizer has a medium risk (3C). The results of the risk assessment using semi-quantitative method of standard API 581 based on the existing equipment at medium risk. In the fact, there is no critical problem in the equipment components. Damage mechanisms were prominent throughout the equipment is thinning mechanism. The evaluation of the risk approach was done with the aim of reducing risk by optimizing the risk assessment activities.

  1. Risk analysis of heat recovery steam generator with semi quantitative risk based inspection API 581

    Energy Technology Data Exchange (ETDEWEB)

    Prayogo, Galang Sandy, E-mail: gasandylang@live.com; Haryadi, Gunawan Dwi; Ismail, Rifky [Department of Mechanical Engineering, Diponegoro University, Semarang (Indonesia); Kim, Seon Jin [Department of Mechanical & Automotive Engineering of Pukyong National University (Korea, Republic of)

    2016-04-19

    Corrosion is a major problem that most often occurs in the power plant. Heat recovery steam generator (HRSG) is an equipment that has a high risk to the power plant. The impact of corrosion damage causing HRSG power plant stops operating. Furthermore, it could be threaten the safety of employees. The Risk Based Inspection (RBI) guidelines by the American Petroleum Institute (API) 58 has been used to risk analysis in the HRSG 1. By using this methodology, the risk that caused by unexpected failure as a function of the probability and consequence of failure can be estimated. This paper presented a case study relating to the risk analysis in the HRSG, starting with a summary of the basic principles and procedures of risk assessment and applying corrosion RBI for process industries. The risk level of each HRSG equipment were analyzed: HP superheater has a medium high risk (4C), HP evaporator has a medium-high risk (4C), and the HP economizer has a medium risk (3C). The results of the risk assessment using semi-quantitative method of standard API 581 based on the existing equipment at medium risk. In the fact, there is no critical problem in the equipment components. Damage mechanisms were prominent throughout the equipment is thinning mechanism. The evaluation of the risk approach was done with the aim of reducing risk by optimizing the risk assessment activities.

  2. The development of a 3D risk analysis method.

    Science.gov (United States)

    I, Yet-Pole; Cheng, Te-Lung

    2008-05-01

    Much attention has been paid to the quantitative risk analysis (QRA) research in recent years due to more and more severe disasters that have happened in the process industries. Owing to its calculation complexity, very few software, such as SAFETI, can really make the risk presentation meet the practice requirements. However, the traditional risk presentation method, like the individual risk contour in SAFETI, is mainly based on the consequence analysis results of dispersion modeling, which usually assumes that the vapor cloud disperses over a constant ground roughness on a flat terrain with no obstructions and concentration fluctuations, which is quite different from the real situations of a chemical process plant. All these models usually over-predict the hazardous regions in order to maintain their conservativeness, which also increases the uncertainty of the simulation results. On the other hand, a more rigorous model such as the computational fluid dynamics (CFD) model can resolve the previous limitations; however, it cannot resolve the complexity of risk calculations. In this research, a conceptual three-dimensional (3D) risk calculation method was proposed via the combination of results of a series of CFD simulations with some post-processing procedures to obtain the 3D individual risk iso-surfaces. It is believed that such technique will not only be limited to risk analysis at ground level, but also be extended into aerial, submarine, or space risk analyses in the near future.

  3. National protocol for quality assurance in DXA-bone densitometry

    Science.gov (United States)

    Slavchev, A.; Avramova-Cholakova, S.; Vassileva, J.

    2008-01-01

    Osteoporosis becomes largely one of the most important socially significant and costly diseases. Modern techniques (DXA, US) are applied for bone densitometry. The paper presents a protocol for quality assurance especially of DXA-bone densitometers including quality control made in compliance with international standards (ISCD, IOF). The methodology has been tested in practice by measurements on site-functional assessment, entrance dose, radiation protection, calibration, in-vitro precision. It is expected to raise the quality of the diagnostic process in concert with the EU Medical Directive 97/43 particularly for population screening and sensitive groups. The protocol is an essential part of the National Program for constraining osteoporosis which has been elaborated at the Ministry of Health and at present under implementation throughout the country. It aims at reducing the risk, factors spreading, at diminishing the fracture risk the morbidity and the mortality from osteoporosis. An integral multidisciplinary approach to the problem solving is applied as well as training on three levels — doctors, patients, population, which effectively will contribute for obtaining real results in preventing osteoporosis.

  4. An electromagnetic field measurement protocol for monitoring power lines

    International Nuclear Information System (INIS)

    Lubritto, C.; Iavazzo, A.; D'Onofrio, A.; Palmieri, A.; Sabbarese, C.; Terrasi, F.

    2002-01-01

    In the actions aiming to prevent risks related to the exposure to Low Frequencies Non Ionising electromagnetic Radiations (ELF-NIR), always arises the need to perform measurements in order to assess the field level existing in the considered sites. As a matter of fact very often it turns out difficult to predict, on the base of calculations, with sufficient approximation the field levels, due to extended variability of environmental conditions (e.g. coexistence of several sources, ground and building conformation, etc..). The measurement procedures must follow a methodology that could allow to minimise the interferences with the measurement set-up and the systematic and accidental errors. Risks for the operator and damages to the instrument should also be taken into account. One of the goal set for this research program was then the definition of the measurement protocol for electromagnetic field generated by low frequency non ionising radiation sources. In particular sources like power lines will be considered in order to validate the protocol by means of in-field measurements

  5. Analysis of Alternatives for Risk Assessment Methodologies and Tools

    Energy Technology Data Exchange (ETDEWEB)

    Nachtigal, Noel M. [Sandia National Lab. (SNL-CA), Livermore, CA (United States). System Analytics; Fruetel, Julia A. [Sandia National Lab. (SNL-CA), Livermore, CA (United States). Systems Research and Analysis; Gleason, Nathaniel J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States). Systems Research and Analysis; Helms, Jovana [Sandia National Lab. (SNL-CA), Livermore, CA (United States). Systems Research and Analysis; Imbro, Dennis Raymond [Sandia National Lab. (SNL-CA), Livermore, CA (United States). Systems Research and Analysis; Sumner, Matthew C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States). Systems Research and Analysis

    2013-10-01

    The purpose of this document is to provide a basic overview and understanding of risk assessment methodologies and tools from the literature and to assess the suitability of these methodologies and tools for cyber risk assessment. Sandia National Laboratories (SNL) performed this review in support of risk modeling activities performed for the Stakeholder Engagement and Cyber Infrastructure Resilience (SECIR) division of the Department of Homeland Security (DHS) Office of Cybersecurity and Communications (CS&C). The set of methodologies and tools covered in this document is not intended to be exhaustive; instead, it focuses on those that are commonly used in the risk assessment community. The classification of methodologies and tools was performed by a group of analysts with experience in risk analysis and cybersecurity, and the resulting analysis of alternatives has been tailored to address the needs of a cyber risk assessment.

  6. A software defined RTU multi-protocol automatic adaptation data transmission method

    Science.gov (United States)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  7. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  8. Impact of a standardized nurse observation protocol including MEWS after Intensive Care Unit discharge.

    Science.gov (United States)

    De Meester, K; Das, T; Hellemans, K; Verbrugghe, W; Jorens, P G; Verpooten, G A; Van Bogaert, P

    2013-02-01

    Analysis of in-hospital mortality after serious adverse events (SAE's) in our hospital showed the need for more frequent observation in medical and surgical wards. We hypothesized that the incidence of SAE's could be decreased by introducing a standard nurse observation protocol. To investigate the effect of a standard nurse observation protocol implementing the Modified Early Warning Score (MEWS) and a color graphic observation chart. Pre- and post-intervention study by analysis of patients records for a 5-day period after Intensive Care Unit (ICU) discharge to 14 medical and surgical wards before (n=530) and after (n=509) the intervention. For the total study population the mean Patient Observation Frequency Per Nursing Shift (POFPNS) during the 5-day period after ICU discharge increased from .9993 (95% C.I. .9637-1.0350) in the pre-intervention period to 1.0732 (95% C.I. 1.0362-1.1101) (p=.005) in the post-intervention period. There was an increased risk of a SAE in patients with MEWS 4 or higher in the present nursing shift (HR 8.25; 95% C.I. 2.88-23.62) and the previous nursing shift (HR 12.83;95% C.I. 4.45-36.99). There was an absolute risk reduction for SAE's within 120h after ICU discharge of 2.2% (95% C.I. -0.4-4.67%) from 5.7% to 3.5%. The intervention had a positive impact on the observation frequency. MEWS had a predictive value for SAE's in patients after ICU discharge. The drop in SAE's was substantial but did not reach statistical significance. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  9. Comparative risk analysis for the Rocky Flats Plant integrated project planning

    International Nuclear Information System (INIS)

    Jones, M.E.; Shain, D.I.

    1994-01-01

    The Rocky Flats Plant is developing, with active stakeholder a comprehensive planning strategy that will support transition of the Rocky Flats Plant from a nuclear weapons production facility to site cleanup and final disposition. Final disposition of the Rocky Flats Plant materials and contaminants requires consideration of the interrelated nature of sitewide problems, such as material movement and disposition, facility and land use endstates, costs relative risks to workers and the public, and waste disposition. Comparative Risk Analysis employs both incremental risk and cumulative risk evaluations to compare risks from postulated options or endstates. These postulated options or endstates can be various remedial alternatives, or future endstate uses of federal agency land. Currently, there does not exist any approved methodology that aggregates various incremental risk estimates. Comparative Risk Analysis has been developed to aggregate various incremental risk estimates to develop a site cumulative risk estimate. This paper discusses development of the Comparative Risk Analysis methodology, stakeholder participation and lessons learned from these challenges

  10. Analysis of the Implementation of Standardized Clinical Protocol «Diabetes Mellitus Type 2» by Quality Indicators in Institutions of Kyiv Region

    Directory of Open Access Journals (Sweden)

    V.I. Tkachenko

    2014-10-01

    Full Text Available In Ukraine, a standardized clinical protocol (SCP to provide medical care in diabetes mellitus type 2 (order of the Ministry of Healthcare of Ukraine dated 21.12.2012 № 1118, which identifies 4 quality indicators, is being implemented. The objective of research — to analyze the implementation of SCP based on monitoring of quality indicators in the institutions of the Kyiv region. Materials and Methods. Technique for assessing the quality of diabetes care, one element of which is the monitoring of quality indicators specified in SCP, has been developed and applied. Collection and analysis of information was carried out by forms of primary records № 025/030 and 030/o, forms of statistical reporting № 12 and 20. Statistical analysis was performed using Excel 2007, SPSS. Results. Today, primary health care institutions in Kyiv region developed local protocols that confirms the implementation of the first quality indicator, in accordance with the desired level of the indicator value by SCP. The second indicator — the percentage of patients who were defined the level of glycated hemoglobin in the reporting period amounted to 12.2 %, which is higher than in 2012 (8.84 %, but remains low. The third quality indicator — the percentage of patients who were admitted to hospital for diabetes mellitus and its complications during the reporting period amounted to 15.01 %, while in 2012 it stood at 8.66 %. For comparison, this figure in 2007 was 9.37 %. Conclusions. The quality of care at an early stage of implementation is not enough, partly due to the lack of awareness by physicians of major provisions of the protocol, lack of equipment, the need of payment by a patient for medical services specified in the protocol, lack of doctors’ understanding of the characteristics of different types of medical and technological documents and difficulties in the development and implementation of local protocols, particularly. The obtained results are

  11. Modelling and Analysis of a Collision Avoidance Protocol using SPIN and UPPAAL

    DEFF Research Database (Denmark)

    Skou, Arne; Larsen, Kim Guldstrand; Jensen, Henrik Ejersbo

    1997-01-01

    , the modelling of the media becomes ackward due to the lack of broadcast communication in the PROMELA language. On the other hand we find it easy to model the timed aspects using the UPPAAL tool. Especially, the notion of committed locations supports the modelling of broadcast communication. However......This paper compares the tools SPIN and UPPAAL by modelling and verifying a Collision Avoidance Protocol for an Ethernet-like medium. We find that SPIN is well suited for modelling the untimed aspects of the protocol processes and for expressing the relevant (untimed) properties. However...

  12. Verification of the safety communication protocol in train control system using colored Petri net

    International Nuclear Information System (INIS)

    Chen Lijie; Tang Tao; Zhao Xianqiong; Schnieder, Eckehard

    2012-01-01

    This paper deals with formal and simulation-based verification of the safety communication protocol in ETCS (European Train Control System). The safety communication protocol controls the establishment of safety connection between train and trackside. Because of its graphical user interface and modeling flexibility upon the changes in the system conditions, this paper proposes a composition Colored Petri Net (CPN) representation for both the logic and the timed model. The logic of the protocol is proved to be safe by means of state space analysis: the dead markings are correct; there are no dead transitions; being fair. Further analysis results have been obtained using formal and simulation-based verification approach. The timed models for the open transmit system and the application process are created for the purpose of performance analysis of the safety communication protocol. The models describe the procedure of data transmission and processing, and also provide relevant timed and stochastic factors, as well as time delay and lost packet, which may influence the time for establishment of safety connection of the protocol. Time for establishment of safety connection of the protocol in normal state is verified by formal verification, and then time for establishment of safety connection with different probability of lost packet is simulated. After verification it is found that the time for establishment of safety connection of the safety communication protocol satisfies the safety requirements.

  13. Source modelling in seismic risk analysis for nuclear power plants

    International Nuclear Information System (INIS)

    Yucemen, M.S.

    1978-12-01

    The proposed probabilistic procedure provides a consistent method for the modelling, analysis and updating of uncertainties that are involved in the seismic risk analysis for nuclear power plants. The potential earthquake activity zones are idealized as point, line or area sources. For these seismic source types, expressions to evaluate their contribution to seismic risk are derived, considering all the possible site-source configurations. The seismic risk at a site is found to depend not only on the inherent randomness of the earthquake occurrences with respect to magnitude, time and space, but also on the uncertainties associated with the predicted values of the seismic and geometric parameters, as well as the uncertainty in the attenuation model. The uncertainty due to the attenuation equation is incorporated into the analysis through the use of random correction factors. The influence of the uncertainty resulting from the insufficient information on the seismic parameters and source geometry is introduced into the analysis by computing a mean risk curve averaged over the various alternative assumptions on the parameters and source geometry. Seismic risk analysis is carried for the city of Denizli, which is located in the seismically most active zone of Turkey. The second analysis is for Akkuyu

  14. Advanced CUBIC protocols for whole-brain and whole-body clearing and imaging.

    Science.gov (United States)

    Susaki, Etsuo A; Tainaka, Kazuki; Perrin, Dimitri; Yukinaga, Hiroko; Kuno, Akihiro; Ueda, Hiroki R

    2015-11-01

    Here we describe a protocol for advanced CUBIC (Clear, Unobstructed Brain/Body Imaging Cocktails and Computational analysis). The CUBIC protocol enables simple and efficient organ clearing, rapid imaging by light-sheet microscopy and quantitative imaging analysis of multiple samples. The organ or body is cleared by immersion for 1-14 d, with the exact time required dependent on the sample type and the experimental purposes. A single imaging set can be completed in 30-60 min. Image processing and analysis can take whole-brain neural activities at single-cell resolution using Arc-dVenus transgenic (Tg) mice. CUBIC informatics calculated the Venus signal subtraction, comparing different brains at a whole-organ scale. These protocols provide a platform for organism-level systems biology by comprehensively detecting cells in a whole organ or body.

  15. The Total Risk Analysis of Large Dams under Flood Hazards

    Directory of Open Access Journals (Sweden)

    Yu Chen

    2018-02-01

    Full Text Available Dams and reservoirs are useful systems in water conservancy projects; however, they also pose a high-risk potential for large downstream areas. Flood, as the driving force of dam overtopping, is the main cause of dam failure. Dam floods and their risks are of interest to researchers and managers. In hydraulic engineering, there is a growing tendency to evaluate dam flood risk based on statistical and probabilistic methods that are unsuitable for the situations with rare historical data or low flood probability, so a more reasonable dam flood risk analysis method with fewer application restrictions is needed. Therefore, different from previous studies, this study develops a flood risk analysis method for large dams based on the concept of total risk factor (TRF used initially in dam seismic risk analysis. The proposed method is not affected by the adequacy of historical data or the low probability of flood and is capable of analyzing the dam structure influence, the flood vulnerability of the dam site, and downstream risk as well as estimating the TRF of each dam and assigning corresponding risk classes to each dam. Application to large dams in the Dadu River Basin, Southwestern China, demonstrates that the proposed method provides quick risk estimation and comparison, which can help local management officials perform more detailed dam safety evaluations for useful risk management information.

  16. Methodology for flood risk analysis for nuclear power plants

    International Nuclear Information System (INIS)

    Wagner, D.P.; Casada, M.L.; Fussell, J.B.

    1984-01-01

    The methodology for flood risk analysis described here addresses the effects of a flood on nuclear power plant safety systems. Combining the results of this method with the probability of a flood allows the effects of flooding to be included in a probabilistic risk assessment. The five-step methodology includes accident sequence screening to focus the detailed analysis efforts on the accident sequences that are significantly affected by a flood event. The quantitative results include the flood's contribution to system failure probability, accident sequence occurrence frequency and consequence category occurrence frequency. The analysis can be added to existing risk assessments without a significant loss in efficiency. The results of two example applications show the usefulness of the methodology. Both examples rely on the Reactor Safety Study for the required risk assessment inputs and present changes in the Reactor Safety Study results as a function of flood probability

  17. Investment appraisal using quantitative risk analysis.

    Science.gov (United States)

    Johansson, Henrik

    2002-07-01

    Investment appraisal concerned with investments in fire safety systems is discussed. Particular attention is directed at evaluating, in terms of the Bayesian decision theory, the risk reduction that investment in a fire safety system involves. It is shown how the monetary value of the change from a building design without any specific fire protection system to one including such a system can be estimated by use of quantitative risk analysis, the results of which are expressed in terms of a Risk-adjusted net present value. This represents the intrinsic monetary value of investing in the fire safety system. The method suggested is exemplified by a case study performed in an Avesta Sheffield factory.

  18. Gender Analysis of Risk in Innovation System

    DEFF Research Database (Denmark)

    Ayinde, Ope; Muchie, Mammo; Abaniyan, E. O.

    2011-01-01

    the new maize variety. The analytical tools used include descriptive statistics, regression model; risk utility functions and risk parameter analysis. The result showed that invasion by animals, disease and pest, lack of access to credit wind and price fluctuation were the major risk facing the maize......This study analyzed risk by gender in innovation in Kwara state, Nigeria, using downy mildew resistant maize production as case study. The study employed primary and secondary data. The primary data were collected from well-structured questionnaires administered to both male and female producing...... producers in the area in the usage of the new innovation. The study also revealed that male producers were willing to take risk in the new maize variety production than the female, while the females were more indifferent to the risk involved in the new maize production variety than males. None...

  19. Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    2017-01-01

    Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.

  20. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.