WorldWideScience

Sample records for risk analysis protocol

  1. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  2. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  3. 75 FR 74007 - Federal Aquatic Nuisance Species Research Risk Analysis Protocol

    Science.gov (United States)

    2010-11-30

    ... site, http://anstaskforce.gov/documents.php . To obtain a hard copy of the Protocol, see Document... aquatic species that are the target of this risk analysis. Language used in the NANPCA differentiates...: http://anstaskforce.gov/documents.php Write: Susan Pasko, National Oceanic and Atmospheric...

  4. Analysis of agreement between cardiac risk stratification protocols applied to participants of a center for cardiac rehabilitation

    Directory of Open Access Journals (Sweden)

    Ana A. S. Santos

    2016-01-01

    Full Text Available ABSTRACT Background Cardiac risk stratification is related to the risk of the occurrence of events induced by exercise. Despite the existence of several protocols to calculate risk stratification, studies indicating that there is similarity between these protocols are still unknown. Objective To evaluate the agreement between the existing protocols on cardiac risk rating in cardiac patients. Method The records of 50 patients from a cardiac rehabilitation program were analyzed, from which the following information was extracted: age, sex, weight, height, clinical diagnosis, medical history, risk factors, associated diseases, and the results from the most recent laboratory and complementary tests performed. This information was used for risk stratification of the patients in the protocols of the American College of Sports Medicine, the Brazilian Society of Cardiology, the American Heart Association, the protocol designed by Frederic J. Pashkow, the American Association of Cardiovascular and Pulmonary Rehabilitation, the Société Française de Cardiologie, and the Sociedad Española de Cardiología. Descriptive statistics were used to characterize the sample and the analysis of agreement between the protocols was calculated using the Kappa coefficient. Differences were considered with a significance level of 5%. Results Of the 21 analyses of agreement, 12 were considered significant between the protocols used for risk classification, with nine classified as moderate and three as low. No agreements were classified as excellent. Different proportions were observed in each risk category, with significant differences between the protocols for all risk categories. Conclusion The agreements between the protocols were considered low and moderate and the risk proportions differed between protocols.

  5. 75 FR 53273 - Federal Aquatic Nuisance Species Research Risk Analysis Protocol

    Science.gov (United States)

    2010-08-31

    ... Aquatic Nuisance Species Task Force (ANSTF). The Protocol is available for public review and comment... the draft revised Protocol are available on the ANSTF website, http://anstaskforce.gov/documents.php... nonindigenous species (ANS) and is designed to reduce the risk that research activities may cause introduction...

  6. Preview of the Mission Assurance Analysis Protocol (MAAP): Assessing Risk and Opportunity in Complex Environments

    National Research Council Canada - National Science Library

    Alberts, Christopher; Dorofee, Audrey; Marino, Lisa

    2008-01-01

    .... A MAAP assessment provides a systematic, in-depth analysis of the potential for success in distributed, complex, and uncertain environments and can be applied across the life cycle and throughout the supply chain...

  7. Study protocol for examining job strain as a risk factor for severe unipolar depression in an individual participant meta-analysis of 14 European cohorts

    DEFF Research Database (Denmark)

    Madsen, Ida E H; Hannerz, Harald; Nyberg, Solja T

    2013-01-01

    scales that do not necessarily correspond to clinically diagnosed depression. In addition, a meta-analysis from 2008 indicated publication bias in the field. METHODS: This study protocol describes the planned design and analyses of an individual participant data meta-analysis, to examine whether job...... using random effects meta-analysis. DISCUSSION: The planned analyses will help clarify whether job strain is associated with an increased risk of clinically diagnosed unipolar depression. As the analysis is based on pre-planned study protocols and an individual participant data meta-analysis, the pooled......BACKGROUND: Previous studies have shown that gainfully employed individuals with high work demands and low control at work (denoted "job strain") are at increased risk of common mental disorders, including depression. Most existing studies have, however, measured depression using self-rated symptom...

  8. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  9. Cancer risk of anti-TNF-α at recommended doses in adult rheumatoid arthritis: a meta-analysis with intention to treat and per protocol analyses.

    Directory of Open Access Journals (Sweden)

    Guillaume Moulis

    Full Text Available BACKGROUND: The risk of malignancies on TNF-α antagonists is controversial. The aim of this survey was to assess cancer risk on TNF-α antagonists in adult rheumatoid arthritis patients, including the five marketed drugs (infliximab, etanercept, adalimumab, golimumab and certolizumab used in line with the New Drug Application. Furthermore, the relative interest of modified intention to treat or per protocol analyses to assess such sparse events remains unknown. METHODOLOGY/PRINCIPAL FINDINGS: Data sources were MEDLINE, CENTRAL, ISI Web of Science, ACR and EULAR meeting abstracts, scientific evaluation of the drugs leading to their marketing approval, and clinicaltrials.gov, until 31 December 2012.We selected double-blind randomized controlled trials in adult rheumatoid arthritis patients, including at least one treatment arm in line with New Drug Application. We performed random effect meta-analysis, with modified intention to treat and per protocol analyses. Thirty-three trials were included. There was no excess risk of malignancies on anti-TNF-α administered in line with New Drug Application in the per protocol model (OR, 0.93 95%CI[0.59-1.44], as well as in the modified intention to treat model (OR, 1.27 95%CI[0.82-1.98]. There was a non-significant tendency for an excess non-melanoma skin cancer risk in both models (respectively, 1.37 [0.71-2.66] and 1.90 [0.98-3.67]. With fixed effect Peto model restricting to trials during at least 52 weeks, the overall cancer risk was respectively 1.60 [0.97-2.64] and 1.22 [0.72-2.08]. Whatever the model, modified intention to treat analysis led to higher estimations than per protocol analysis. The later may underestimate the treatment effect when assessing very sparse events and when many patients dropped out in placebo arms. In metaregression, there was no differential risk among the five drugs. CONCLUSIONS/SIGNIFICANCE: This study did not find any evidence for an excess cancer risk on TNF

  10. Hypertensive disorders of pregnancy and risk of neurodevelopmental disorders in the offspring: a systematic review and meta-analysis protocol.

    LENUS (Irish Health Repository)

    Maher, Gillian M

    2017-10-05

    Hypertensive disorders of pregnancy (HDPs), that is chronic hypertension, gestational hypertension, pre-eclampsia (de novo or superimposed on chronic hypertension) and white coat hypertension, affect approximately 5%-15% of pregnancies. HDP exposure has been linked to an increased risk of autism spectrum disorder, attention deficit\\/hyperactivity disorder and other neurodevelopmental disorders in children. However, findings are inconsistent, and a clear consensus on the impact of HDPs on the risk of neurodevelopmental disorders is needed. Therefore, we aim to synthesise the published literature on the relationship between HDPs and the risk of neurodevelopmental disorders in the form of a systematic review and meta-analysis.

  11. Traditional cardiovascular risk factors and coronary collateral circulation: Protocol for a systematic review and meta-analysis of case-control studies.

    Science.gov (United States)

    Xing, Zhenhua; Pei, Junyu; Tang, Liang; Hu, Xinqun

    2018-04-01

    Well-developed coronary collateral circulation usually results in fewer infarct size, improved cardiac function, and fewer mortality. Traditional coronary risk factors (diabetes, hypertension, and smoking) have some effects on coronary collateral circulation. However, the association between these risk factors and coronary collateral circulation are controversial. Given the confusing evidences regarding traditional cardiovascular risk factors on coronary collateral circulation, we performed this meta-analysis protocol to investigate the relationship between traditional risk factors of coronary artery disease and coronary collateral circulation. MEDINE, EMBASE, and Science Citation Index will be searched to identify relevant studies. The primary outcomes of this meta-analysis are well-developed coronary collateral circulation. Meta-analysis was performed to calculate the odds ratio (OR) and 95% confidence interval (CI) of traditional coronary risk factors (diabetes, smoking, hypertriton). Pooled ORs were computed as the Mantel-Haenszel-weighted average of the ORs for all included studies. Sensitivity analysis, quality assessment, publication bias analysis, and the Grading of Recommendations Assessment, Development and Evaluation approach (GRADE) will be performed to ensure the reliability of our results. This study will provide a high-quality synthesis of current evidence of traditional risk factors on collateral circulation. This conclusion of our systematic review and meta-analysis will provide evidence to judge whether traditional risk factors affects coronary collateral circulation.Ethics and dissemination: Ethical approval is not required because our systematic review and meta-analysis will be based on published data without interventions on patients. The findings of this study will be published in a peer-reviewed journal.

  12. Subtypes of Benign Breast Disease as a Risk Factor for Breast Cancer: A Systematic Review and Meta-Analysis Protocol

    Directory of Open Access Journals (Sweden)

    Manoosh Zendehdel

    2018-01-01

    Full Text Available Breast cancer is a multifactorial disease. Benign breast disease (BBD is one of the most important risk factors for breast cancer. The etiology of BBD is unknown. It is divided into nonproliferative and proliferative diseases. The selection of studies will be based on titles, abstract screening, inclusion and exclusion criteria, and quality assessment. Previous studies have shown that all types of BBD increase the risk of breast cancer, but the risk degree is different for each one. Accurate risk estimation of breast cancer in each category can be very important for proper clinical management. This systematic review and meta-analysis will be conducted on observational studies (traditional case control, nested case control, case cohort, and cohort published in the Web of Science (ISI, PubMed (MEDLINE, Scopus, Google Scholar, and the key journals of this field such as Breast Cancer Research and Treatment and Cancer Research from January 2000 to June 2015. Reference lists and gray literature will be reviewed too. All the initial retrievals will be performed by 2 researchers independently. The data extraction form will consist of general information concerning the studies, study eligibility, method, risk of bias assessment, and results—including odds ratios, risk ratios, rate ratios, and hazard ratios. The PRISMA and MOOSE guidelines will be used to report our findings. Registration Details: PROSPERO-42016035243

  13. Subtypes of Benign Breast Disease as a Risk Factor for Breast Cancer: A Systematic Review and Meta-Analysis Protocol.

    Science.gov (United States)

    Zendehdel, Manoosh; Niakan, Babak; Keshtkar, Abbasali; Rafiei, Elahe; Salamat, Fatemeh

    2018-01-01

    Breast cancer is a multifactorial disease. Benign breast disease (BBD) is one of the most important risk factors for breast cancer. The etiology of BBD is unknown. It is divided into nonproliferative and proliferative diseases. The selection of studies will be based on titles, abstract screening, inclusion and exclusion criteria, and quality assessment. Previous studies have shown that all types of BBD increase the risk of breast cancer, but the risk degree is different for each one. Accurate risk estimation of breast cancer in each category can be very important for proper clinical management. This systematic review and meta-analysis will be conducted on observational studies (traditional case control, nested case control, case cohort, and cohort) published in the Web of Science (ISI), PubMed (MEDLINE), Scopus, Google Scholar, and the key journals of this field such as Breast Cancer Research and Treatment and Cancer Research from January 2000 to June 2015. Reference lists and gray literature will be reviewed too. All the initial retrievals will be performed by 2 researchers independently. The data extraction form will consist of general information concerning the studies, study eligibility, method, risk of bias assessment, and results-including odds ratios, risk ratios, rate ratios, and hazard ratios. The PRISMA and MOOSE guidelines will be used to report our findings. Registration Details: PROSPERO-42016035243.

  14. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  15. The Symptomatic Persian Gulf Veterans Protocol: An Analysis of Risk Factors with an Immunologic and Neuropsychiatric Assessment

    National Research Council Canada - National Science Library

    Blackburn, Warren

    1998-01-01

    The goals of this proposal are to evaluate self-reported conditions, determine potential risk factors, and determine if there is a definable immunologic abnormality or evidence of mycoplasma infection...

  16. Risk analysis

    International Nuclear Information System (INIS)

    Baron, J.H.; Nunez McLeod, J.; Rivera, S.S.

    1997-01-01

    This book contains a selection of research works performed in the CEDIAC Institute (Cuyo National University) in the area of Risk Analysis, with specific orientations to the subjects of uncertainty and sensitivity studies, software reliability, severe accident modeling, etc. This volume presents important material for all those researches who want to have an insight in the risk analysis field, as a tool to solution several problems frequently found in the engineering and applied sciences field, as well as for the academic teachers who want to keep up to date, including the new developments and improvements continuously arising in this field [es

  17. Association between highly active antiretroviral therapy and selected cardiovascular disease risk factors in sub-Saharan Africa: a systematic review and meta-analysis protocol.

    Science.gov (United States)

    Dimala, Christian Akem; Blencowe, Hannah

    2017-03-09

    The increasing highly active antiretroviral therapy (HAART) coverage in sub-Saharan Africa (SSA) has been associated with increasing cardiovascular disease (CVD) incidence. However, the epidemiology of the association between HAART and CVD risk factors in SSA is sparse. We aim to assess the extent to which HAART is associated with selected cardiovascular risk factors (hypertension, diabetes, dyslipidaemia and metabolic syndrome) in SSA. This will be a systematic review and meta-analysis of published studies on the association between HAART and CVD risk factors retrieved from Medline, Embase, Popline, Africa-Wide Information, African Index Medicus and the Cochrane library databases. Studies will be screened for eligibility according to the selection criteria by two independent reviewers. Eligible studies will be assessed for the quality of their evidence and risk of bias using the Quality Assessment Tool for Observational Cohort and Cross-Sectional Studies of the National Health Institute and the Grading of Recommendations Assessment, Development and Evaluation (GRADE) approach, with respect to the measured outcomes (hypertension, diabetes, dyslipidaemia and metabolic syndrome). A data abstraction form will be produced on Epi info V.7 and data analysis done on STATA V.14 statistical software. Summary estimates of measures of effects for the association between HAART use and the outcomes will be derived. Random effects meta-analyses will be performed and I 2 statistic used to assess for heterogeneity between studies with respect to measured parameters. Qualitative synthesis will be used where data is insufficient to produce quantitative synthesis. The protocol has been reviewed by the Research Governance & Integrity Office of the Research Ethics Committee of the London School of Hygiene and Tropical Medicine and confirmed as not requiring ethical approval. The findings of this study will be made widely available especially to national HIV/AIDS committees formulating

  18. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  19. Systematic assessment of benefits and risks: study protocol for a multi-criteria decision analysis using the Analytic Hierarchy Process for comparative effectiveness research.

    Science.gov (United States)

    Maruthur, Nisa M; Joy, Susan; Dolan, James; Segal, Jodi B; Shihab, Hasan M; Singh, Sonal

    2013-01-01

    Regulatory decision-making involves assessment of risks and benefits of medications at the time of approval or when relevant safety concerns arise with a medication. The Analytic Hierarchy Process (AHP) facilitates decision-making in complex situations involving tradeoffs by considering risks and benefits of alternatives. The AHP allows a more structured method of synthesizing and understanding evidence in the context of importance assigned to outcomes. Our objective is to evaluate the use of an AHP in a simulated committee setting selecting oral medications for type 2 diabetes.  This study protocol describes the AHP in five sequential steps using a small group of diabetes experts representing various clinical disciplines. The first step will involve defining the goal of the decision and developing the AHP model. In the next step, we will collect information about how well alternatives are expected to fulfill the decision criteria. In the third step, we will compare the ability of the alternatives to fulfill the criteria and judge the importance of eight criteria relative to the decision goal of the optimal medication choice for type 2 diabetes. We will use pairwise comparisons to sequentially compare the pairs of alternative options regarding their ability to fulfill the criteria. In the fourth step, the scales created in the third step will be combined to create a summary score indicating how well the alternatives met the decision goal. The resulting scores will be expressed as percentages and will indicate the alternative medications' relative abilities to fulfill the decision goal. The fifth step will consist of sensitivity analyses to explore the effects of changing the estimates. We will also conduct a cognitive interview and process evaluation.  Multi-criteria decision analysis using the AHP will aid, support and enhance the ability of decision makers to make evidence-based informed decisions consistent with their values and preferences.

  20. Prevalence, awareness, and associated risk factors of hypertension in older adults in Africa: a systematic review and meta-analysis protocol.

    Science.gov (United States)

    Bosu, William K; Aheto, Justice M K; Zucchelli, Eugenio; Reilly, Siobhan

    2017-10-04

    The health of older persons has not been a major priority in many African countries. Hypertension is one of the common health problems of older persons. However, there is little information on the prevalence of hypertension in older adults in Africa. This is in spite of the fact that Africa has the highest age-standardized prevalence of hypertension in the world. We therefore present this protocol to conduct a systematic review and meta-analysis on the prevalence of hypertension and the level of its awareness among older persons living in Africa. Major databases (EMBASE, MEDLINE, Academic Search Complete, CINAHL, PsycINFO) and unpublished literature will be searched to identify population-based studies on hypertension in adults aged 50 years and older living in Africa. Eligible articles are those which use the 140/90-mmHg cutoff to diagnose hypertension and were published from 1980 to present. We will exclude subjects in restricted environments such as patients and refugees. Articles will be independently evaluated by two reviewers to determine if they meet the inclusion criteria. They will also evaluate the quality of included studies using a validated tool by Hoy and colleagues for prevalence studies. The main outcome is the prevalence of hypertension while the explanatory variables include demographic, socio-economic, dietary, lifestyle and behavioural factors. Effect sizes in bivariate and multivariate analyses will be presented as odds or prevalence ratios. We will explore for heterogeneity of the standard errors across the studies, and if appropriate, we will perform a meta-analysis using a random-effects model to present a summary estimate of the prevalence of hypertension in this population. The estimates of the prevalence, the risk factors and the level of awareness of hypertension could help in galvanizing efforts at prioritizing the cardiovascular health of older persons in Africa. PROSPERO CRD42017056474.

  1. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  2. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  3. Harmonization of international risk assessment protocol

    International Nuclear Information System (INIS)

    Toyofuku, Hajime . E-mail toyofuku@nihs.go.jp

    2006-01-01

    For over centuries developments in food production and new food safety management systems in most developed countries have been perceived by many to be efficient in the prevention of food-borne disease. Nevertheless a number of problems remain dominant, one of these being the high level of food-borne microbiological disease which seems, for some pathogens, to have increased over the last decades. The development of an interdisciplinary approach with direct interaction between surveillance and risk analysis systems is described as a potential basis for improved prevention of food-borne disease. Quantitative microbiological risk assessment is a relatively new scientific approach, able to link data from food within the entire food chain and the various data on human disease to provide a clear estimation of risk. Today food safety is one of the WHOs top eleven priorities; the Organization calls for more systematic and aggressive steps to be taken to reduce significantly the risk of microbiological food-borne diseases. Dealing with this challenge is one of the major challenges for the 21st century in regard to food safety, implying a significant re-direction of food microbiology efforts in many parts of the world

  4. Risk analysis

    International Nuclear Information System (INIS)

    Correa Lizarazu, X.

    2013-01-01

    The power point presentation Colombia risk evaluation experiences, sanitarian regulations evolution, chemical dangers food, biological dangers food, codex alimentarius, trade, industrial effects, dangers identification, data collection and risk profile

  5. Study protocol for examining job strain as a risk factor for severe unipolar depression in an individual participant meta-analysis of 14 European cohorts [v2; ref status: indexed, http://f1000r.es/30q

    Directory of Open Access Journals (Sweden)

    Ida E. H. Madsen

    2014-02-01

    Full Text Available Background: Previous studies have shown that gainfully employed individuals with high work demands and low control at work (denoted “job strain” are at increased risk of common mental disorders, including depression. Most existing studies have, however, measured depression using self-rated symptom scales that do not necessarily correspond to clinically diagnosed depression. In addition, a meta-analysis from 2008 indicated publication bias in the field.   Methods: This study protocol describes the planned design and analyses of an individual participant data meta-analysis, to examine whether job strain is associated with an increased risk of clinically diagnosed unipolar depression based on hospital treatment registers.  The study will be based on data from approximately 120,000 individuals who participated in 14 studies on work environment and health in 4 European countries. The self-reported working conditions data will be merged with national registers on psychiatric hospital treatment, primarily hospital admissions. Study-specific risk estimates for the association between job strain and depression will be calculated using Cox regressions. The study-specific risk estimates will be pooled using random effects meta-analysis.   Discussion: The planned analyses will help clarify whether job strain is associated with an increased risk of clinically diagnosed unipolar depression. As the analysis is based on pre-planned study protocols and an individual participant data meta-analysis, the pooled risk estimates will not be influenced by selective reporting and publication bias. However, the results of the planned study may only pertain to severe cases of unipolar depression, because of the outcome measure applied.

  6. Study protocol for examining job strain as a risk factor for severe unipolar depression in an individual participant meta-analysis of 14 European cohorts [v1; ref status: indexed, http://f1000r.es/1yz

    Directory of Open Access Journals (Sweden)

    IPD-Work Consortium

    2013-11-01

    Full Text Available Background: Previous studies have shown that gainfully employed individuals with high work demands and low control at work (denoted “job strain” are at increased risk of common mental disorders, including depression. Most existing studies have, however, measured depression using self-rated symptom scales that do not necessarily correspond to clinically diagnosed depression. In addition, a meta-analysis from 2008 indicated publication bias in the field.   Methods: This study protocol describes the planned design and analyses of an individual participant data meta-analysis, to examine whether job strain is associated with an increased risk of clinically diagnosed unipolar depression based on hospital treatment registers.  The study will be based on data from approximately 120,000 individuals who participated in 14 studies on work environment and health in 4 European countries. The self-reported working conditions data will be merged with national registers on psychiatric hospital treatment, primarily hospital admissions. Study-specific risk estimates for the association between job strain and depression will be calculated using Cox regressions. The study-specific risk estimates will be pooled using random effects meta-analysis.   Discussion: The planned analyses will help clarify whether job strain is associated with an increased risk of clinically diagnosed unipolar depression. As the analysis is based on pre-planned study protocols and an individual participant data meta-analysis, the pooled risk estimates will not be influenced by selective reporting and publication bias. However, the results of the planned study may only pertain to severe cases of unipolar depression, because of the outcome measure applied.

  7. Rethinking Protocol Analysis from a Cultural Perspective.

    Science.gov (United States)

    Smagorinsky, Peter

    2001-01-01

    Outlines a cultural-historical activity theory (CHAT) perspective that accounts for protocol analysis along three key dimensions: the relationship between thinking and speech from a representational standpoint; the social role of speech in research methodology; and the influence of speech on thinking and data collection. (Author/VWL)

  8. Information security risk analysis

    CERN Document Server

    Peltier, Thomas R

    2001-01-01

    Effective Risk AnalysisQualitative Risk AnalysisValue AnalysisOther Qualitative MethodsFacilitated Risk Analysis Process (FRAP)Other Uses of Qualitative Risk AnalysisCase StudyAppendix A: QuestionnaireAppendix B: Facilitated Risk Analysis Process FormsAppendix C: Business Impact Analysis FormsAppendix D: Sample of ReportAppendix E: Threat DefinitionsAppendix F: Other Risk Analysis OpinionsIndex

  9. Screening Protocol for Early Identification of Brazilian Children at Risk for Dyslexia

    Directory of Open Access Journals (Sweden)

    Giseli D. Germano

    2017-10-01

    Full Text Available Early identification of students at risk of dyslexia has been an educational challenge in the past years. This research had two main goals. First, we aimed to develop a screening protocol for early identification of Brazilian children at risk for dyslexia; second, we aimed to identify the predictive variables of this protocol using Principal Component Analysis. The major step involved in developing this protocol was the selection of variables, which were chosen based on the literature review and linguistic criteria. The screening protocol was composed of seven cognitive-linguistic skills: Letter naming; Phonological Awareness (which comprises the following subtests: Rhyme production, Rhyme identification, Syllabic segmentation, Production of words from a given phoneme, Phonemic Synthesis, and Phonemic analysis; Phonological Working memory, Rapid naming Speed; Silent reading; Reading of words and non-words; and Auditory Comprehension of sentences from pictures. A total of 149 children, aged from 6 years to 6 and 11, of both genders who were enrolled in the 1st grade of elementary public schools were submitted to the screening protocol. Principal Component Analysis revealed four factors, accounting for 64.45% of the variance of the Protocol variables: first factor (“pre-reading”, second factor (“decoding”, third factor (“Reading”, and fourth factor “Auditory processing.” The factors found corroborate those reported in the National and International literature and have been described as early signs of dyslexia and reading problems.

  10. Periconception endogenous and exogenous maternal sex steroid hormones and risk of asthma and allergy in offspring: protocol for a systematic review and meta-analysis.

    Science.gov (United States)

    Talovic, Merhunisa; Sheikh, Aziz; McCleary, Nicola; Erkkola, Maijaliisa; Kaila, Minna; Virtanen, Suvi M; Nwaru, Bright I

    2017-07-12

    Pregnancy is associated with several hormonal changes which influence the developing fetus. Variations in maternal endogenous hormones and prepregnancy use of hormonal preparations have been linked to asthma and allergy in the offspring, but findings are inconsistent. We plan to undertake a systematic review to synthesise the evidence on the association between endogenous and exogenous maternal sex hormones and the risk of asthma and allergy in the offspring. We will search Medline, Embase, Cochrane Library, Institute of Scientific Information Web of Science, Cumulative Index of Nursing and Allied Health, Scopus, Google Scholar, Allied and Complementary Medicine Database, Global Health, Psychological Information (PsycINFO), Centre for Agriculture and Bioscience (CAB) International and WHO Global Health Library from inception until 2016 to identify relevant studies on the topic. Additional studies will be identified by searching databases of proceedings of international conferences, contacting international experts in the field and searching the references cited in identified studies. We will include analytical epidemiological studies. Two researchers will independently screen identified studies, undertake data extraction and assess risk of bias in eligible studies, while a third reviewer will arbitrate any disagreement. We will use the Effective Public Health Practice Project tool to assess the risk of bias in the studies. We will perform a random-effects meta-analysis to synthesise the evidence. We will use the Grading of Recommendations Assessment, Development and Evaluation approach to rate the strength and quality of the overall evidence with respect to each outcome. Ethical approval is not required since the study is a systematic review of published literature. Our findings will be reported in a peer-reviewed scientific journal. CRD42016048324. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights

  11. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  12. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  13. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  14. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  15. Documentation Protocols to Generate Risk Indicators Regarding Degradation Processes for Cultural Heritage Risk Evaluation

    Science.gov (United States)

    Kioussi, A.; Karoglou, M.; Bakolas, A.; Labropoulos, K.; Moropoulou, A.

    2013-07-01

    Sustainable maintenance and preservation of cultural heritage assets depends highly on its resilience to external or internal alterations and to various hazards. Risk assessment of a heritage asset's can be defined as the identification of all potential hazards affecting it and the evaluation of the asset's vulnerability (building materials and building structure conservation state).Potential hazards for cultural heritage are complex and varying. The risk of decay and damage associated with monuments is not limited to certain long term natural processes, sudden events and human impact (macroscale of the heritage asset) but is also a function of the degradation processes within materials and structural elements due to physical and chemical procedures. Obviously, these factors cover different scales of the problem. The deteriorating processes in materials may be triggered by external influences or caused because of internal chemical and/or physical variations of materials properties and characteristics. Therefore risk evaluation should be dealt in the direction of revealing the specific active decay and damage mechanism both in mesoscale [type of decay and damage] and microscale [decay phenomenon mechanism] level. A prerequisite for risk indicators identification and development is the existence of an organised source of comparable and interoperable data about heritage assets under observation. This unified source of information offers a knowledge based background of the asset's vulnerability through the diagnosis of building materials' and building structure's conservation state, through the identification of all potential hazards affecting these and through mapping of its possible alterations during its entire life-time. In this framework the identification and analysis of risks regarding degradation processes for the development of qualitative and quantitative indicators can be supported by documentation protocols. The data investigated by such protocols help

  16. DOCUMENTATION PROTOCOLS TO GENERATE RISK INDICATORS REGARDING DEGRADATION PROCESSES FOR CULTURAL HERITAGE RISK EVALUATION

    Directory of Open Access Journals (Sweden)

    A. Kioussi

    2013-07-01

    Full Text Available Sustainable maintenance and preservation of cultural heritage assets depends highly on its resilience to external or internal alterations and to various hazards. Risk assessment of a heritage asset's can be defined as the identification of all potential hazards affecting it and the evaluation of the asset's vulnerability (building materials and building structure conservation state.Potential hazards for cultural heritage are complex and varying. The risk of decay and damage associated with monuments is not limited to certain long term natural processes, sudden events and human impact (macroscale of the heritage asset but is also a function of the degradation processes within materials and structural elements due to physical and chemical procedures. Obviously, these factors cover different scales of the problem. The deteriorating processes in materials may be triggered by external influences or caused because of internal chemical and/or physical variations of materials properties and characteristics. Therefore risk evaluation should be dealt in the direction of revealing the specific active decay and damage mechanism both in mesoscale [type of decay and damage] and microscale [decay phenomenon mechanism] level. A prerequisite for risk indicators identification and development is the existence of an organised source of comparable and interoperable data about heritage assets under observation. This unified source of information offers a knowledge based background of the asset's vulnerability through the diagnosis of building materials' and building structure's conservation state, through the identification of all potential hazards affecting these and through mapping of its possible alterations during its entire life-time. In this framework the identification and analysis of risks regarding degradation processes for the development of qualitative and quantitative indicators can be supported by documentation protocols. The data investigated by such

  17. Foundations of Risk Analysis

    CERN Document Server

    Aven, Terje

    2012-01-01

    Foundations of Risk Analysis presents the issues core to risk analysis - understanding what risk means, expressing risk, building risk models, addressing uncertainty, and applying probability models to real problems. The author provides the readers with the knowledge and basic thinking they require to successfully manage risk and uncertainty to support decision making. This updated edition reflects recent developments on risk and uncertainty concepts, representations and treatment. New material in Foundations of Risk Analysis includes:An up to date presentation of how to understand, define and

  18. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  19. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  20. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  1. Observations on risk analysis

    International Nuclear Information System (INIS)

    Thompson, W.A. Jr.

    1979-11-01

    This paper briefly describes WASH 1400 and the Lewis report. It attempts to define basic concepts such as risk and risk analysis, common mode failure, and rare event. Several probabilistic models which go beyond the WASH 1400 methodology are introduced; the common characteristic of these models is that they recognize explicitly that risk analysis is time dependent whereas WASH 1400 takes a per demand failure rate approach which obscures the important fact that accidents are time related. Further, the presentation of a realistic risk analysis should recognize that there are various risks which compete with one another for the lives of the individuals at risk. A way of doing this is suggested

  2. Fall risk screening protocol for older hearing clinic patients.

    Science.gov (United States)

    Criter, Robin E; Honaker, Julie A

    2017-10-01

    The primary purposes of this study were (1) to describe measures that may contrast audiology patients who fall from those who do not fall and (2) to evaluate the clinical performance of measures that could be easily used for fall risk screening in a mainstream audiology hearing clinic. Cross-sectional study Study sample: Thirty-six community-dwelling audiology patient participants and 27 community-dwelling non-audiology patients over 60 years of age. The Hearing Handicap Inventory for the Elderly (HHIE) most accurately identified patients with a recent fall (sensitivity: 76.0%), while the Dizziness Handicap Inventory (DHI) most accurately identified patients without a recent fall (specificity: 90.9%). A combination of measures used in a protocol-including HHIE, DHI, number of medications, and the Timed Up and Go test-resulted in good, accurate identification of patients with or without a recent history of falls (92.0% sensitivity, 100% specificity). This study reports good sensitivity and excellent specificity for identifying patients with and without a recent history of falls when measures were combined into a screening protocol. Despite previously reported barriers, effective fall risk screenings may be performed in hearing clinic settings with measures often readily accessible to audiologists.

  3. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  4. Minimising post-operative risk using a Post-Anaesthetic Care Tool (PACT): protocol for a prospective observational study and cost-effectiveness analysis.

    Science.gov (United States)

    Street, Maryann; Phillips, Nicole M; Kent, Bridie; Colgan, Stephen; Mohebbi, Mohammadreza

    2015-06-01

    While the risk of adverse events following surgery has been identified, the impact of nursing care on early detection of these events is not well established. A systematic review of the evidence and an expert consensus study in post-anaesthetic care identified essential criteria for nursing assessment of patient readiness for discharge from the post-anaesthetic care unit (PACU). These criteria were included in a new nursing assessment tool, the Post-Anaesthetic Care Tool (PACT), and incorporated into the post-anaesthetic documentation at a large health service. The aim of this study is to test the clinical reliability of the PACT and evaluate whether the use of PACT will (1) enhance the recognition and response to patients at risk of deterioration in PACU; (2) improve documentation for handover from PACU nurse to ward nurse; (3) result in improved patient outcomes and (4) reduce healthcare costs. A prospective, non-randomised, pre-implementation and post-implementation design comparing: (1) patients (n=750) who have surgery prior to the implementation of the PACT and (2) patients (n=750) who have surgery after PACT. The study will examine the use of the tool through the observation of patient care and nursing handover. Patient outcomes and cost-effectiveness will be determined from health service data and medical record audit. Descriptive statistics will be used to describe the sample and compare the two patient groups (pre-intervention and post-intervention). Differences in patient outcomes between the two groups will be compared using the Cochran-Mantel-Haenszel test and regression analyses and reported as ORs with the corresponding 95% CIs. This study will test the clinical reliability and cost-effectiveness of the PACT. It is hypothesised that the PACT will enable nurses to recognise and respond to patients at risk of deterioration, improve handover to ward nurses, improve patient outcomes, and reduce healthcare costs. Published by the BMJ Publishing Group

  5. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  6. Increasing fall risk awareness using wearables: A fall risk awareness protocol.

    Science.gov (United States)

    Danielsen, Asbjørn; Olofsen, Hans; Bremdal, Bernt Arild

    2016-10-01

    Each year about a third of elderly aged 65 or older experience a fall. Many of these falls may have been avoided if fall risk assessment and prevention tools where available in a daily living situation. We identify what kind of information is relevant for doing fall risk assessment and prevention using wearable sensors in a daily living environment by investigating current research, distinguishing between prospective and context-aware fall risk assessment and prevention. Based on our findings, we propose a fall risk awareness protocol as a fall prevention tool integrating both wearables and ambient sensing technology into a single platform. Copyright © 2016. Published by Elsevier Inc.

  7. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  8. Mean-Field Analysis for the Evaluation of Gossip Protocols

    NARCIS (Netherlands)

    Bakshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  9. Mean-field analysis for the evaluation of gossip protocols

    NARCIS (Netherlands)

    Bakhshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    2008-01-01

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  10. A Calculus for Control Flow Analysis of Security Protocols

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Nielson, Hanne Riis; Nielson, Flemming

    2004-01-01

    The design of a process calculus for anaysing security protocols is governed by three factors: how to express the security protocol in a precise and faithful manner, how to accommodate the variety of attack scenarios, and how to utilise the strengths (and limit the weaknesses) of the underlying...... analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style and we have previously shown its ability to analyse a variety of security protocols. This paper develops a calculus, LysaNS that allows for much greater control and clarity in the description...

  11. Systematic assessment of benefits and risks: study protocol for a multi-criteria decision analysis using the Analytic Hierarchy Process for comparative effectiveness research [v1; ref status: indexed, http://f1000r.es/1fk

    Directory of Open Access Journals (Sweden)

    Nisa M Maruthur

    2013-07-01

    Full Text Available Background: Regulatory decision-making involves assessment of risks and benefits of medications at the time of approval or when relevant safety concerns arise with a medication. The Analytic Hierarchy Process (AHP facilitates decision-making in complex situations involving tradeoffs by considering risks and benefits of alternatives. The AHP allows a more structured method of synthesizing and understanding evidence in the context of importance assigned to outcomes. Our objective is to evaluate the use of an AHP in a simulated committee setting selecting oral medications for type 2 diabetes.  Methods: This study protocol describes the AHP in five sequential steps using a small group of diabetes experts representing various clinical disciplines. The first step will involve defining the goal of the decision and developing the AHP model. In the next step, we will collect information about how well alternatives are expected to fulfill the decision criteria. In the third step, we will compare the ability of the alternatives to fulfill the criteria and judge the importance of eight criteria relative to the decision goal of the optimal medication choice for type 2 diabetes. We will use pairwise comparisons to sequentially compare the pairs of alternative options regarding their ability to fulfill the criteria. In the fourth step, the scales created in the third step will be combined to create a summary score indicating how well the alternatives met the decision goal. The resulting scores will be expressed as percentages and will indicate the alternative medications' relative abilities to fulfill the decision goal. The fifth step will consist of sensitivity analyses to explore the effects of changing the estimates. We will also conduct a cognitive interview and process evaluation.  Discussion: Multi-criteria decision analysis using the AHP will aid, support and enhance the ability of decision makers to make evidence-based informed decisions consistent

  12. Is risk analysis scientific?

    Science.gov (United States)

    Hansson, Sven Ove; Aven, Terje

    2014-07-01

    This article discusses to what extent risk analysis is scientific in view of a set of commonly used definitions and criteria. We consider scientific knowledge to be characterized by its subject matter, its success in developing the best available knowledge in its fields of study, and the epistemic norms and values that guide scientific investigations. We proceed to assess the field of risk analysis according to these criteria. For this purpose, we use a model for risk analysis in which science is used as a base for decision making on risks, which covers the five elements evidence, knowledge base, broad risk evaluation, managerial review and judgment, and the decision; and that relates these elements to the domains experts and decisionmakers, and to the domains fact-based or value-based. We conclude that risk analysis is a scientific field of study, when understood as consisting primarily of (i) knowledge about risk-related phenomena, processes, events, etc., and (ii) concepts, theories, frameworks, approaches, principles, methods and models to understand, assess, characterize, communicate, and manage risk, in general and for specific applications (the instrumental part). © 2014 Society for Risk Analysis.

  13. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.......e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful...... in this direction is to extend saturation-based techniques so that enough state information can be modelled and analysed. Finally, we present a methodology for proving the same security properties in the computational model, by means of typing protocol implementations....

  14. Analysis of Security Protocols for Mobile Healthcare.

    Science.gov (United States)

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  15. Comparative risk analysis

    International Nuclear Information System (INIS)

    Niehaus, F.

    1988-01-01

    In this paper, the risks of various energy systems are discussed considering severe accidents analysis, particularly the probabilistic safety analysis, and probabilistic safety criteria, and the applications of these criteria and analysis. The comparative risk analysis has demonstrated that the largest source of risk in every society is from daily small accidents. Nevertheless, we have to be more concerned about severe accidents. The comparative risk analysis of five different energy systems (coal, oil, gas, LWR and STEC (Solar)) for the public has shown that the main sources of risks are coal and oil. The latest comparative risk study of various energy has been conducted in the USA and has revealed that the number of victims from coal is 42 as many than victims from nuclear. A study for severe accidents from hydro-dams in United States has estimated the probability of dam failures at 1 in 10,000 years and the number of victims between 11,000 and 260,000. The average occupational risk from coal is one fatal accident in 1,000 workers/year. The probabilistic safety analysis is a method that can be used to assess nuclear energy risks, and to analyze the severe accidents, and to model all possible accident sequences and consequences. The 'Fault tree' analysis is used to know the probability of failure of the different systems at each point of accident sequences and to calculate the probability of risks. After calculating the probability of failure, the criteria for judging the numerical results have to be developed, that is the quantitative and qualitative goals. To achieve these goals, several systems have been devised by various countries members of AIEA. The probabilistic safety ana-lysis method has been developed by establishing a computer program permit-ting to know different categories of safety related information. 19 tabs. (author)

  16. Analysis of protection spanning-tree protocol

    Directory of Open Access Journals (Sweden)

    Б.Я. Корнієнко

    2007-01-01

    Full Text Available  Extraordinary sweeping  of  IT – development  causes vulnerabilities and, thereafter, attacks that use these vulnerabilities. That is why one must post factum or even in advance speed up invention of new information  security systems as well as develop the old ones. The matter of article concerns Spanning-Tree Protocol  – the vivid example of the case, when the cure of the vulnerability creates dozen of new "weak spots".

  17. Information Security Risk Analysis

    CERN Document Server

    Peltier, Thomas R

    2010-01-01

    Offers readers with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment. This title demonstrates how to identify threats and then determine if those threats pose a real risk. It is suitable for industry and academia professionals.

  18. Component of the risk analysis

    International Nuclear Information System (INIS)

    Martinez, I.; Campon, G.

    2013-01-01

    The power point presentation reviews issues like analysis of risk (Codex), management risk, preliminary activities manager, relationship between government and industries, microbiological danger and communication of risk

  19. Unsharpness-risk analysis

    International Nuclear Information System (INIS)

    Preyssl, C.

    1986-01-01

    Safety analysis provides the only tool for evaluation and quantification of rare or hypothetical events leading to system failure. So far probability theory has been used for the fault- and event-tree methodology. The phenomenon of uncertainties constitutes an important aspect in risk analysis. Uncertainties can be classified as originating from 'randomness' or 'fuzziness'. Probability theory addresses randomness only. The use of 'fuzzy set theory' makes it possible to include both types of uncertainty in the mathematical model of risk analysis. Thus the 'fuzzy fault tree' is expressed in 'possibilistic' terms implying a range of simplifications and improvements. 'Human failure' and 'conditionality' can be treated correctly. Only minimum-maximum relations are used to combine the possibility distributions of events. Various event-classifications facilitate the interpretation of the results. The method is demonstrated by application to a TRIGA-research reactor. Uncertainty as an implicit part of 'fuzzy risk' can be quantified explicitly using an 'uncertainty measure'. Based on this the 'degree of relative compliance' with a quantizative safety goal can be defined for a particular risk. The introduction of 'weighting functionals' guarantees the consideration of the importances attached to different parts of the risk exceeding or complying with the standard. The comparison of two reference systems is demonstrated in a case study. It is concluded that any application of the 'fuzzy risk analysis' has to be free of any hypostatization when reducing subjective to objective information. (Author)

  20. Assessing older drivers: a primary care protocol to evaluate driving safety risk.

    Science.gov (United States)

    Murden, Robert A; Unroe, Kathleen

    2005-08-01

    Most articles on elder drivers offer either general advice, or review testing protocols that divide drivers into two distinct groups: safe or unsafe. We believe it is unreasonable to expect any testing to fully separate drivers into just these two mutually exclusive groups, so we offer a protocol for a more practical approach. This protocol can be applied by primary care physicians. We review the justification for the many steps of this protocol, which have branches that lead to identifying drivers as low risk, high risk (for accidents) or needing further evaluation. Options for further evaluation are provided.

  1. Adversarial risk analysis

    CERN Document Server

    Banks, David L; Rios Insua, David

    2015-01-01

    Flexible Models to Analyze Opponent Behavior A relatively new area of research, adversarial risk analysis (ARA) informs decision making when there are intelligent opponents and uncertain outcomes. Adversarial Risk Analysis develops methods for allocating defensive or offensive resources against intelligent adversaries. Many examples throughout illustrate the application of the ARA approach to a variety of games and strategic situations. The book shows decision makers how to build Bayesian models for the strategic calculation of their opponents, enabling decision makers to maximize their expected utility or minimize their expected loss. This new approach to risk analysis asserts that analysts should use Bayesian thinking to describe their beliefs about an opponent's goals, resources, optimism, and type of strategic calculation, such as minimax and level-k thinking. Within that framework, analysts then solve the problem from the perspective of the opponent while placing subjective probability distributions on a...

  2. Protocol Analysis as a Method for Analyzing Conversational Data.

    Science.gov (United States)

    Aleman, Carlos G.; Vangelisti, Anita L.

    Protocol analysis, a technique that uses people's verbal reports about their cognitions as they engage in an assigned task, has been used in a number of applications to provide insight into how people mentally plan, assess, and carry out those assignments. Using a system of networked computers where actors communicate with each other over…

  3. Formal Security Analysis of the MaCAN Protocol

    DEFF Research Database (Denmark)

    Bruni, Alessandro; Sojka, Michal; Nielson, Flemming

    2014-01-01

    analysis identifies two flaws in the original protocol: one creates unavailability concerns during key establishment, and the other allows re-using authenticated signals for different purposes. We propose and analyse a modification that improves its behaviour while fitting the constraints of CAN bus...

  4. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Van Leeuwen, Brian P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Eldridge, John M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approach that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.

  5. Human Schedule Performance, Protocol Analysis, and the "Silent Dog" Methodology

    Science.gov (United States)

    Cabello, Francisco; Luciano, Carmen; Gomez, Inmaculada; Barnes-Holmes, Dermot

    2004-01-01

    The purpose of the current experiment was to investigate the role of private verbal behavior on the operant performances of human adults, using a protocol analysis procedure with additional methodological controls (the "silent dog" method). Twelve subjects were exposed to fixed ratio 8 and differential reinforcement of low rate 3-s schedules. For…

  6. Environmental risk analysis

    International Nuclear Information System (INIS)

    Lima-e-Silva, Pedro Paulo de

    1996-01-01

    The conventional Risk Analysis (RA) relates usually a certain undesired event frequency with its consequences. Such technique is used nowadays in Brazil to analyze accidents and their consequences strictly under the human approach, valuing loss of human equipment, human structures and human lives, without considering the damage caused to natural resources that keep life possible on Earth. This paradigm was developed primarily because of the Homo sapiens' lack of perception upon the natural web needed to sustain his own life. In reality, the Brazilian professionals responsible today for licensing, auditing and inspecting environmental aspects of human activities face huge difficulties in making technical specifications and procedures leading to acceptable levels of impact, furthermore considering the intrinsic difficulties to define those levels. Therefore, in Brazil the RA technique is a weak tool for licensing for many reasons, and of them are its short scope (only accident considerations) and wrong a paradigm (only human direct damages). A paper from the author about the former was already proposed to the 7th International Conference on Environmetrics, past July'96, USP-SP. This one discusses the extension of the risk analysis concept to take into account environmental consequences, transforming the conventional analysis into a broader methodology named here as Environmental Risk Analysis. (author)

  7. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  8. On the Bayes risk in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2008-01-01

    Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability

  9. Multidisciplinary perioperative protocol in patients undergoing acute high-risk abdominal surgery

    DEFF Research Database (Denmark)

    Tengberg, L. T.; Bay-Nielsen, M.; Bisgaard, T.

    2017-01-01

    Background: Acute high-risk abdominal (AHA) surgery carries a very high risk of morbidity and mortality and represents a massive healthcare burden. The aim of the present study was to evaluate the effect of a standardized multidisciplinary perioperative protocol in patients undergoing AHA surgery...... = 0·004). Conclusion: The introduction of a multidisciplinary perioperative protocol was associated with a significant reduction in postoperative mortality in patients undergoing AHA surgery. NCT01899885 (http://www.clinicaltrials.gov)....

  10. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  11. RCRA groundwater data analysis protocol for the Hanford Site, Washington

    International Nuclear Information System (INIS)

    Chou, C.J.; Jackson, R.L.

    1992-04-01

    The Resource Conservation and Recovery Act of 1976 (RCRA) groundwater monitoring program currently involves site-specific monitoring of 20 facilities on the Hanford Site in southeastern Washington. The RCRA groundwater monitoring program has collected abundant data on groundwater quality. These data are used to assess the impact of a facility on groundwater quality or whether remediation efforts under RCRA corrective action programs are effective. Both evaluations rely on statistical analysis of groundwater monitoring data. The need for information on groundwater quality by regulators and environmental managers makes statistical analysis of monitoring data an important part of RCRA groundwater monitoring programs. The complexity of groundwater monitoring programs and variabilities (spatial, temporal, and analytical) exhibited in groundwater quality variables indicate the need for a data analysis protocol to guide statistical analysis. A data analysis protocol was developed from the perspective of addressing regulatory requirements, data quality, and management information needs. This data analysis protocol contains four elements: data handling methods; graphical evaluation techniques; statistical tests for trend, central tendency, and excursion analysis; and reporting procedures for presenting results to users

  12. Risk analysis and reliability

    International Nuclear Information System (INIS)

    Uppuluri, V.R.R.

    1979-01-01

    Mathematical foundations of risk analysis are addressed. The importance of having the same probability space in order to compare different experiments is pointed out. Then the following topics are discussed: consequences as random variables with infinite expectations; the phenomenon of rare events; series-parallel systems and different kinds of randomness that could be imposed on such systems; and the problem of consensus of estimates of expert opinion

  13. Protocol design and analysis for cooperative wireless networks

    CERN Document Server

    Song, Wei; Jin, A-Long

    2017-01-01

    This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...

  14. Mare Risk Analysis monitor

    International Nuclear Information System (INIS)

    Fuente Prieto, I.; Alonso, P.; Carretero Fernandino, J. A.

    2000-01-01

    The Nuclear Safety Council's requirement that Spanish power plants comply with the requirements of the Maintenance Rule associated with plant risk assessment during power operation, arising from the partial unavailability of systems due to the maintenance activities, has led to need for additional tools to facilitate compliance with said requirements. While the impact on risk produced by individual equipment unavailabilities can easily be evaluated, either qualitatively or quantitatively, the process becomes more complicated when un programmed unavailabilities simultaneously occur in various systems, making it necessary to evaluate their functional impact. It is especially complex in the case of support systems that can affect the functionality of multiple systems. In view of the above, a computer application has been developed that is capable of providing the operator with quick answers based on the specific plant model in order to allow fast risk assessment using the information compiled as part of the Probabilistic Safety Analysis. The paper describes the most important characteristics of this application and the basic design requirements of the MARE Risk Monitor. (Author)

  15. Reduction of cancer risk by optimization of Computed Tomography head protocols: far eastern Cuban experience

    International Nuclear Information System (INIS)

    Miller Clemente, R.; Adame Brooks, D.; Lores Guevara, M.; Perez Diaz, M.; Arias Garlobo, M. L.; Ortega Rodriguez, O.; Nepite Haber, R.; Grinnan Hernandez, O.; Guillama Llosas, A.

    2015-01-01

    The cancer risk estimation constitutes one way for the evaluation of the public health, regarding computed tomography (CT) exposures. Starting from the hypothesis that the optimization of CT protocols would reduce significantly the added cancer risk, the purpose of this research was the application of optimization strategies regarding head CT protocols, in order to reduce the factors affecting the risk of induced cancer. The applied systemic approach included technological and human components, represented by quantitative physical factors. the volumetric kerma indexes, compared with respect to standard, optimized and reference values, were evaluated with multiple means comparison method. The added cancer risk resulted from the application of the methodology for biological effects evaluation, at low doses with low Linear Energy Transfer. Human observers in all scenarios evaluated the image quality. the reduced dose was significantly lower than for standard head protocols and reference levels, where: (1) for pediatric patients, by using an Automatic Exposure Control system, a reduction of 31% compared with standard protocol and ages range of 10-14, and (2) adults, using a Bilateral Filter for images obtained at low doses of 62% from those of standard head protocol. The risk reduction was higher than 25%. The systemic approach used allows the effective identification of factors involved on cancer risk related with exposures to CT. The combination of dose modulation and image restoration with Bilateral Filter, provide a significantly reduction of cancer risk, with acceptable diagnostic image quality. (Author)

  16. Methods for Risk Analysis

    International Nuclear Information System (INIS)

    Alverbro, Karin

    2010-01-01

    Many decision-making situations today affect humans and the environment. In practice, many such decisions are made without an overall view and prioritise one or other of the two areas. Now and then these two areas of regulation come into conflict, e.g. the best alternative as regards environmental considerations is not always the best from a human safety perspective and vice versa. This report was prepared within a major project with the aim of developing a framework in which both the environmental aspects and the human safety aspects are integrated, and decisions can be made taking both fields into consideration. The safety risks have to be analysed in order to be successfully avoided and one way of doing this is to use different kinds of risk analysis methods. There is an abundance of existing methods to choose from and new methods are constantly being developed. This report describes some of the risk analysis methods currently available for analysing safety and examines the relationships between them. The focus here is mainly on human safety aspects

  17. Risks to the fetus from diagnostic imaging during pregnancy: review and proposal of a clinical protocol

    International Nuclear Information System (INIS)

    Gomes, Mafalda; Matias, Alexandra; Macedo, Filipe

    2015-01-01

    Every day, medical practitioners face the dilemma of exposing pregnant or possibly pregnant patients to radiation from diagnostic examinations. Both doctors and patients often have questions about the risks of radiation. The most vulnerable period is between the 8th and 15th weeks of gestation. Deterministic effects like pregnancy loss, congenital malformations, growth retardation and neurobehavioral abnormalities have threshold doses above 100-200 mGy. The risk is considered negligible at 50 mGy and in reality no diagnostic examination exceeds this limit. The risk of carcinogenesis is slightly higher than in the general population. Intravenous iodinated contrast is discouraged, except in highly selected patients. Considering all the possible noxious effects of radiation exposure, measures to diminish radiation are essential and affect the fetal outcome. Nonionizing procedures should be considered whenever possible and every radiology center should have its own data analysis on fetal radiation exposure. In this review, we analyze existing literature on fetal risks due to radiation exposure, producing a clinical protocol to guide safe radiation use in a clinical setting. (orig.)

  18. Risks to the fetus from diagnostic imaging during pregnancy: review and proposal of a clinical protocol.

    Science.gov (United States)

    Gomes, Mafalda; Matias, Alexandra; Macedo, Filipe

    2015-12-01

    Every day, medical practitioners face the dilemma of exposing pregnant or possibly pregnant patients to radiation from diagnostic examinations. Both doctors and patients often have questions about the risks of radiation. The most vulnerable period is between the 8th and 15th weeks of gestation. Deterministic effects like pregnancy loss, congenital malformations, growth retardation and neurobehavioral abnormalities have threshold doses above 100-200 mGy. The risk is considered negligible at 50 mGy and in reality no diagnostic examination exceeds this limit. The risk of carcinogenesis is slightly higher than in the general population. Intravenous iodinated contrast is discouraged, except in highly selected patients. Considering all the possible noxious effects of radiation exposure, measures to diminish radiation are essential and affect the fetal outcome. Nonionizing procedures should be considered whenever possible and every radiology center should have its own data analysis on fetal radiation exposure. In this review, we analyze existing literature on fetal risks due to radiation exposure, producing a clinical protocol to guide safe radiation use in a clinical setting.

  19. Risks to the fetus from diagnostic imaging during pregnancy: review and proposal of a clinical protocol

    Energy Technology Data Exchange (ETDEWEB)

    Gomes, Mafalda; Matias, Alexandra [University of Porto, Faculty of Medicine, Porto (Portugal); Macedo, Filipe [SMIC, Porto (Portugal)

    2015-12-15

    Every day, medical practitioners face the dilemma of exposing pregnant or possibly pregnant patients to radiation from diagnostic examinations. Both doctors and patients often have questions about the risks of radiation. The most vulnerable period is between the 8th and 15th weeks of gestation. Deterministic effects like pregnancy loss, congenital malformations, growth retardation and neurobehavioral abnormalities have threshold doses above 100-200 mGy. The risk is considered negligible at 50 mGy and in reality no diagnostic examination exceeds this limit. The risk of carcinogenesis is slightly higher than in the general population. Intravenous iodinated contrast is discouraged, except in highly selected patients. Considering all the possible noxious effects of radiation exposure, measures to diminish radiation are essential and affect the fetal outcome. Nonionizing procedures should be considered whenever possible and every radiology center should have its own data analysis on fetal radiation exposure. In this review, we analyze existing literature on fetal risks due to radiation exposure, producing a clinical protocol to guide safe radiation use in a clinical setting. (orig.)

  20. Toward an HRD Auditing Protocol: Assessing HRD Risk Management Practices

    Science.gov (United States)

    Clardy, Alan

    2004-01-01

    Even though HRD-related programs and activities carry risks that should be monitored and assessed, there is little literature on how auditing applies to the HRD function; the existing literature on the topic defines HRD auditing in widely different ways. The nature of risk for organizational process is discussed, followed by a review of the…

  1. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  2. Probabilistic risk analysis and terrorism risk.

    Science.gov (United States)

    Ezell, Barry Charles; Bennett, Steven P; von Winterfeldt, Detlof; Sokolowski, John; Collins, Andrew J

    2010-04-01

    Since the terrorist attacks of September 11, 2001, and the subsequent establishment of the U.S. Department of Homeland Security (DHS), considerable efforts have been made to estimate the risks of terrorism and the cost effectiveness of security policies to reduce these risks. DHS, industry, and the academic risk analysis communities have all invested heavily in the development of tools and approaches that can assist decisionmakers in effectively allocating limited resources across the vast array of potential investments that could mitigate risks from terrorism and other threats to the homeland. Decisionmakers demand models, analyses, and decision support that are useful for this task and based on the state of the art. Since terrorism risk analysis is new, no single method is likely to meet this challenge. In this article we explore a number of existing and potential approaches for terrorism risk analysis, focusing particularly on recent discussions regarding the applicability of probabilistic and decision analytic approaches to bioterrorism risks and the Bioterrorism Risk Assessment methodology used by the DHS and criticized by the National Academies and others.

  3. Analysis of security protocols based on challenge-response

    Institute of Scientific and Technical Information of China (English)

    LUO JunZhou; YANG Ming

    2007-01-01

    Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods,which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques,in which secrecy analysis is split into two parts: Explicit-Information-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand parameters. This new method owns both the power of the Strand Space Model and concision of authentication logic.

  4. A markerless protocol for genetic analysis of Aggregatibacter actinomycetemcomitans

    Science.gov (United States)

    Cheng, Ya-An; Jee, Jason; Hsu, Genie; Huang, Yanyan; Chen, Casey; Lin, Chun-Pin

    2015-01-01

    Background/Purpose The genomes of different Aggregatibacter actinomycetemcomitans strains contain many strain-specific genes and genomic islands (defined as DNA found in some but not all strains) of unknown functions. Genetic analysis for the functions of these islands will be constrained by the limited availability of genetic markers and vectors for A. actinomycetemcomitans. In this study we tested a novel genetic approach of gene deletion and restoration in a naturally competent A. actinomycetemcomitans strain D7S-1. Methods Specific genes’ deletion mutants and mutants restored with the deleted genes were constructed by a markerless loxP/Cre system. In mutants with sequential deletion of multiple genes loxP with different spacer regions were used to avoid unwanted recombinations between loxP sites. Results Eight single-gene deletion mutants, four multiple-gene deletion mutants, and two mutants with restored genes were constructed. No unintended non-specific deletion mutants were generated by this protocol. The protocol did not negatively affect the growth and biofilm formation of A. actinomycetemcomitans. Conclusion The protocol described in this study is efficient and specific for genetic manipulation of A. actinomycetemcomitans, and will be amenable for functional analysis of multiple genes in A. actinomycetemcomitans. PMID:24530245

  5. A School-Based Suicide Risk Assessment Protocol

    Science.gov (United States)

    Boccio, Dana E.

    2015-01-01

    Suicide remains the third leading cause of death among young people in the United States. Considering that youth who contemplate suicide generally exhibit warning signs before engaging in lethal self-harm, school-based mental health professionals can play a vital role in identifying students who are at risk for suicidal behavior. Nevertheless, the…

  6. The California Multimedia Risk Assessment Protocol for Alternative Fuels

    Science.gov (United States)

    Hatch, T.; Ginn, T. R.; McKone, T. E.; Rice, D. W.

    2013-12-01

    Any new fuel in California requires approval by the state agencies overseeing human and environmental health. In order to provide a systematic evaluation of new fuel impacts, California now requires a multimedia risk assessment (MMRA) for fuel approval. The fuel MMRA involves all relevant state agencies including: the California Air Resources Board (CARB), the State Water Resources Control Board (SWRCB), the Office of Environmental Health Hazards Assessment (OEHHA), and the Department of Toxic Substances Control (DTSC) overseen by the California Environmental Protection Agency (CalEPA). The lead agency for MMRAs is the CARB. The original law requiring a multimedia assessment is California Health and Safety Code 43830.8. In addition, the low carbon fuel standard (LCFS), the Global Warming Solutions Act (AB32), and the Verified Diesel Emission Control Strategy (VDECS) have provisions that can require a multimedia assessment. In this presentation, I give an overview of the California multimedia risk assessment (MMRA) for new fuels that has been recently developed and applied to several alternative fuels. The objective of the California MMRA is to assess risk of potential impacts of new fuels to multiple environmental media including: air, water, and soil. Attainment of this objective involves many challenges, including varying levels of uncertainty, relative comparison of incommensurate risk factors, and differing levels of priority assigned to risk factors. The MMRA is based on a strategy of relative risk assessment and flexible accommodation of distinct and diverse fuel formulations. The approach is tiered by design, in order to allow for sequentially more sophisticated investigations as knowledge gaps are identified and re-prioritized by the ongoing research. The assessment also involves peer review in order to provide coupling between risk assessment and stakeholder investment, as well as constructive or confrontational feedback. The multimedia assessment

  7. Failure mode and effects analysis of witnessing protocols for ensuring traceability during IVF.

    Science.gov (United States)

    Rienzi, Laura; Bariani, Fiorenza; Dalla Zorza, Michela; Romano, Stefania; Scarica, Catello; Maggiulli, Roberta; Nanni Costa, Alessandro; Ubaldi, Filippo Maria

    2015-10-01

    Traceability of cells during IVF is a fundamental aspect of treatment, and involves witnessing protocols. Failure mode and effects analysis (FMEA) is a method of identifying real or potential breakdowns in processes, and allows strategies to mitigate risks to be developed. To examine the risks associated with witnessing protocols, an FMEA was carried out in a busy IVF centre, before and after implementation of an electronic witnessing system (EWS). A multidisciplinary team was formed and moderated by human factors specialists. Possible causes of failures, and their potential effects, were identified and risk priority number (RPN) for each failure calculated. A second FMEA analysis was carried out after implementation of an EWS. The IVF team identified seven main process phases, 19 associated process steps and 32 possible failure modes. The highest RPN was 30, confirming the relatively low risk that mismatches may occur in IVF when a manual witnessing system is used. The introduction of the EWS allowed a reduction in the moderate-risk failure mode by two-thirds (highest RPN = 10). In our experience, FMEA is effective in supporting multidisciplinary IVF groups to understand the witnessing process, identifying critical steps and planning changes in practice to enable safety to be enhanced. Copyright © 2015 Reproductive Healthcare Ltd. Published by Elsevier Ltd. All rights reserved.

  8. Implementation and Analysis of Real-Time Streaming Protocols.

    Science.gov (United States)

    Santos-González, Iván; Rivero-García, Alexandra; Molina-Gil, Jezabel; Caballero-Gil, Pino

    2017-04-12

    Communication media have become the primary way of interaction thanks to the discovery and innovation of many new technologies. One of the most widely used communication systems today is video streaming, which is constantly evolving. Such communications are a good alternative to face-to-face meetings, and are therefore very useful for coping with many problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability and connectivity. Hence, the quality of service and the quality of experience are considered the two most important issues for this type of communication. This work presents a complete comparative study of two of the most used protocols of video streaming, Real Time Streaming Protocol (RTSP) and the Web Real-Time Communication (WebRTC). In addition, this paper proposes two new mobile applications that implement those protocols in Android whose objective is to know how they are influenced by the aspects that most affect the streaming quality of service, which are the connection establishment time and the stream reception time. The new video streaming applications are also compared with the most popular video streaming applications for Android, and the experimental results of the analysis show that the developed WebRTC implementation improves the performance of the most popular video streaming applications with respect to the stream packet delay.

  9. Analysis of Intracellular Metabolites from Microorganisms: Quenching and Extraction Protocols.

    Science.gov (United States)

    Pinu, Farhana R; Villas-Boas, Silas G; Aggio, Raphael

    2017-10-23

    Sample preparation is one of the most important steps in metabolome analysis. The challenges of determining microbial metabolome have been well discussed within the research community and many improvements have already been achieved in last decade. The analysis of intracellular metabolites is particularly challenging. Environmental perturbations may considerably affect microbial metabolism, which results in intracellular metabolites being rapidly degraded or metabolized by enzymatic reactions. Therefore, quenching or the complete stop of cell metabolism is a pre-requisite for accurate intracellular metabolite analysis. After quenching, metabolites need to be extracted from the intracellular compartment. The choice of the most suitable metabolite extraction method/s is another crucial step. The literature indicates that specific classes of metabolites are better extracted by different extraction protocols. In this review, we discuss the technical aspects and advancements of quenching and extraction of intracellular metabolite analysis from microbial cells.

  10. Analysis of Intracellular Metabolites from Microorganisms: Quenching and Extraction Protocols

    Directory of Open Access Journals (Sweden)

    Farhana R. Pinu

    2017-10-01

    Full Text Available Sample preparation is one of the most important steps in metabolome analysis. The challenges of determining microbial metabolome have been well discussed within the research community and many improvements have already been achieved in last decade. The analysis of intracellular metabolites is particularly challenging. Environmental perturbations may considerably affect microbial metabolism, which results in intracellular metabolites being rapidly degraded or metabolized by enzymatic reactions. Therefore, quenching or the complete stop of cell metabolism is a pre-requisite for accurate intracellular metabolite analysis. After quenching, metabolites need to be extracted from the intracellular compartment. The choice of the most suitable metabolite extraction method/s is another crucial step. The literature indicates that specific classes of metabolites are better extracted by different extraction protocols. In this review, we discuss the technical aspects and advancements of quenching and extraction of intracellular metabolite analysis from microbial cells.

  11. International Conference on Risk Analysis

    CERN Document Server

    Oliveira, Teresa; Rigas, Alexandros; Gulati, Sneh

    2015-01-01

    This book covers the latest results in the field of risk analysis. Presented topics include probabilistic models in cancer research, models and methods in longevity, epidemiology of cancer risk, engineering reliability and economical risk problems. The contributions of this volume originate from the 5th International Conference on Risk Analysis (ICRA 5). The conference brought together researchers and practitioners working in the field of risk analysis in order to present new theoretical and computational methods with applications in biology, environmental sciences, public health, economics and finance.

  12. The efficacy of fall-risk-increasing drug (FRID) withdrawal for the prevention of falls and fall-related complications: protocol for a systematic review and meta-analysis.

    Science.gov (United States)

    Lee, Justin Yusen; Holbrook, Anne

    2017-02-20

    Despite limited evidence of effectiveness, withdrawal (discontinuation or dose reduction) of high risk medications known as "fall-risk increasing drugs" (FRIDs) is typically conducted as a fall prevention strategy based on presumptive benefit. Our objective is to determine the efficacy of fall-risk increasing drugs (FRIDs) withdrawal on the prevention of falls and fall-related complications. We will search for all published and unpublished randomized controlled trials evaluating the effect of FRID withdrawal compared to usual care on the rate of falls, incidence of falls, fall-related injuries, fall-related fractures, fall-related hospitalizations, or adverse effects related to the intervention in adults aged 65 years or older. Electronic database searches will be conducted in MEDLINE, EMBASE, Cochrane Central Register of Controlled Trials (CENTRAL), and CINAHL. A grey literature search will be conducted including clinical trial registries and conference proceedings and abstracts. Two reviewers will independently perform in duplicate citation screening, full-text review, data abstraction, and risk of bias assessment. Conflicts will be resolved through team discussion or by a third reviewer if no consensus can be reached. The Grades of Recommendation, Assessment, Development and Evaluation (GRADE) criteria will be used to independently rate overall confidence in effect estimates for each outcome. Results will be synthesized descriptively, and a random effects meta-analysis will be conducted for each outcome if studies are deemed similar methodologically, clinically, and statistically. We will attempt to determine whether a FRID withdrawal strategy alone is effective at preventing falls in older adults. Our results will be used to optimize and focus fall prevention strategies and initiatives internationally with a goal of improving the health of older adults. PROSPERO CRD42016040203.

  13. The efficacy of fall-risk-increasing drug (FRID withdrawal for the prevention of falls and fall-related complications: protocol for a systematic review and meta-analysis

    Directory of Open Access Journals (Sweden)

    Justin Yusen Lee

    2017-02-01

    Full Text Available Abstract Background Despite limited evidence of effectiveness, withdrawal (discontinuation or dose reduction of high risk medications known as “fall-risk increasing drugs” (FRIDs is typically conducted as a fall prevention strategy based on presumptive benefit. Our objective is to determine the efficacy of fall-risk increasing drugs (FRIDs withdrawal on the prevention of falls and fall-related complications. Methods/design We will search for all published and unpublished randomized controlled trials evaluating the effect of FRID withdrawal compared to usual care on the rate of falls, incidence of falls, fall-related injuries, fall-related fractures, fall-related hospitalizations, or adverse effects related to the intervention in adults aged 65 years or older. Electronic database searches will be conducted in MEDLINE, EMBASE, Cochrane Central Register of Controlled Trials (CENTRAL, and CINAHL. A grey literature search will be conducted including clinical trial registries and conference proceedings and abstracts. Two reviewers will independently perform in duplicate citation screening, full-text review, data abstraction, and risk of bias assessment. Conflicts will be resolved through team discussion or by a third reviewer if no consensus can be reached. The Grades of Recommendation, Assessment, Development and Evaluation (GRADE criteria will be used to independently rate overall confidence in effect estimates for each outcome. Results will be synthesized descriptively, and a random effects meta-analysis will be conducted for each outcome if studies are deemed similar methodologically, clinically, and statistically. Discussion We will attempt to determine whether a FRID withdrawal strategy alone is effective at preventing falls in older adults. Our results will be used to optimize and focus fall prevention strategies and initiatives internationally with a goal of improving the health of older adults. Systematic review registration PROSPERO CRD

  14. Risk of bias and confounding of observational studies of Zika virus infection: A scoping review of research protocols.

    Science.gov (United States)

    Reveiz, Ludovic; Haby, Michelle M; Martínez-Vega, Ruth; Pinzón-Flores, Carlos E; Elias, Vanessa; Smith, Emma; Pinart, Mariona; Broutet, Nathalie; Becerra-Posada, Francisco; Aldighieri, Sylvain; Van Kerkhove, Maria D

    2017-01-01

    Given the severity and impact of the current Zika virus (ZIKV) outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE) and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV. We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols. Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome). Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design. Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to minimize bias at

  15. Risk of bias and confounding of observational studies of Zika virus infection: A scoping review of research protocols.

    Directory of Open Access Journals (Sweden)

    Ludovic Reveiz

    Full Text Available Given the severity and impact of the current Zika virus (ZIKV outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV.We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols.Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome. Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design.Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to

  16. MATHEMATICAL RISK ANALYSIS: VIA NICHOLAS RISK MODEL AND BAYESIAN ANALYSIS

    Directory of Open Access Journals (Sweden)

    Anass BAYAGA

    2010-07-01

    Full Text Available The objective of this second part of a two-phased study was to explorethe predictive power of quantitative risk analysis (QRA method andprocess within Higher Education Institution (HEI. The method and process investigated the use impact analysis via Nicholas risk model and Bayesian analysis, with a sample of hundred (100 risk analysts in a historically black South African University in the greater Eastern Cape Province.The first findings supported and confirmed previous literature (KingIII report, 2009: Nicholas and Steyn, 2008: Stoney, 2007: COSA, 2004 that there was a direct relationship between risk factor, its likelihood and impact, certiris paribus. The second finding in relation to either controlling the likelihood or the impact of occurrence of risk (Nicholas risk model was that to have a brighter risk reward, it was important to control the likelihood ofoccurrence of risks as compared with its impact so to have a direct effect on entire University. On the Bayesian analysis, thus third finding, the impact of risk should be predicted along three aspects. These aspects included the human impact (decisions made, the property impact (students and infrastructural based and the business impact. Lastly, the study revealed that although in most business cases, where as business cycles considerably vary dependingon the industry and or the institution, this study revealed that, most impacts in HEI (University was within the period of one academic.The recommendation was that application of quantitative risk analysisshould be related to current legislative framework that affects HEI.

  17. Country risk analysis

    International Nuclear Information System (INIS)

    David, A.

    1992-01-01

    This paper reports that the oil industry has been an internationally based industry that has been heavily dependent on outside financing sources. Historically, financing came from investment houses that, in most cases, participated in the projects as equity investors. However, investment companies can no longer satisfy the capital requirements of the current high level of exploration and development activities. The current trend is to involve commercial banks on a purely lending basis. Commercial banks, by their nature, are risk averse. In the case of oil and gas exploration and production they are asked to take not only technical risk and price risk but geopolitical risk as well. Methods have been developed by commercial banks to reduce technical and price risks to point which enables them to be comfortable with a loan. However, geopolitical risks are more difficult to assess. The risk associated with many countries are the nationalization of the investment, new tax restrictions, restriction of currency movements, and/or revisions to the production sharing agreements

  18. WHY DO YOU NEED TO USE A CARIES RISK ASSESSMENT PROTOCOL TO PROVIDE AN EFFECTIVE CARIES PREVENTIVE REGIME?

    Science.gov (United States)

    Afuakwah, Charles; Welbury, Richard

    2015-11-01

    Clinical guidelines recommend an individual is given a caries risk status based on analysis of defined clinical and social criteria before implementing a tailored preventive plan. Improve documentation of caries risk assessment (CRA) in a general dental practice setting, using a systems-based approach to quality improvement methods. Investigate the impact of quality improvement efforts on subsequent design and delivery of preventive care. Identify barriers to delivery of CRA and provision of preventive care. Data for patients aged 0-16 years was collected over two cycles using standard audit methodology. The first cycle was a retrospective analysis (n = 400) using random sampling. The second cycle a prospective analysis (n = 513) using consecutive sampling over a 15-week period. Five staff meetings with feedback occurred between cycles. In cycle one, no specific CRA system was identified. CRA status was not stated widely, risk factors were not analysed and there was variation with respect to the prescription and delivery of preventive strategies. These discrepancies were demonstrable for all four participating dentists and at all ages. In cycle two, 100% recorded CRA. All risk factors were analysed and individual caries risk was correctly annotated. There was 100% compliance with the protocol for preventive plans. The use of CRA improved documentation of caries risk status. This has improved subsequent prescription of age specific evidence-based preventive care appropriate to the risk status of that individual. Barriers were identified to the delivery of CRA and the provision of comprehensive preventive care by the dentists and other healthcare professionals.

  19. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  20. Risk analysis of Odelouca cofferdam

    OpenAIRE

    Pimenta, L.; Caldeira, L.; Maranha das Neves, E.

    2009-01-01

    In this paper we present the risk analysis of Odelouca Cofferdam, using an event tree analysis. The initializing events, failure modes and analysed limit states are discussed based on an influence diagram. The constructed event trees and their interpretation are presented. The obtained risk values are represented in an FN plot superimposed to the acceptability and tolerability risk limits proposed for Portuguese dams. Initially, particular emphasis is placed on the main characteristic...

  1. Hypersensitivity Reactions to Oxaliplatin: Identifying the Risk Factors and Judging the Efficacy of a Desensitization Protocol.

    Science.gov (United States)

    Okayama, Tetsuya; Ishikawa, Takeshi; Sugatani, Kazuko; Yoshida, Naohisa; Kokura, Satoshi; Matsuda, Kiyomi; Tsukamoto, Shigeru; Ihara, Norihiko; Kuriu, Yoshiaki; Nakanishi, Masayoshi; Nakamura, Terukazu; Kamada, Kazuhiro; Katada, Kazuhiro; Uchiyama, Kazuhiko; Takagi, Tomohisa; Handa, Osamu; Konishi, Hideyuki; Yagi, Nobuaki; Naito, Yuji; Otsuji, Eigo; Hosoi, Hajime; Miki, Tsuneharu; Itoh, Yoshito

    2015-06-01

    We examined the clinical data of patients treated with oxaliplatin to determine the risk factors of oxaliplatin-related hypersensitivity reaction (HSR). In addition, we evaluated the efficacy of rechallenging patients with HSRs with oxaliplatin using prophylactic agents or desensitization procedures. This study consisted of 162 patients with colorectal cancer (88 men and 74 women) who were treated consecutively at the outpatient chemotherapy department at University Hospital, Kyoto Prefectural University of Medicine. Patients underwent chemotherapy, including oxaliplatin, between March 2006 and June 2012. We analyzed the patients' clinical backgrounds (eg, age, sex, performance status, disease stage, and allergic history) to uncover any connections to the development of HSR to oxaliplatin. In addition, we rechallenged 10 patients who had oxaliplatin-related HSR using prophylactic agents or desensitization procedures. Of 162 patients, 28 (17.2%) developed oxaliplatin-related HSRs (16, 2, 9 and 1 patient had grade 1, 2, 3, and 4 HSRs, respectively). The total cumulative dose of oxaliplatin at the onset of the HSR was 301 to 1126 mg/m(2) (median, 582 mg/m(2)), and the first reactions developed in these patients after 5 to 17 infusions of oxaliplatin (median, 8 infusions). Logistic regression analysis indicated that sex (male: odds ratio = 3.624; 95% CI, 1.181-11.122; P = 0.024) and eosinophil count in peripheral blood (odds ratio = 35.118; 95% CI, 1.058-1166.007; P = 0.046) were independent variables for oxaliplatin-related HSRs. Rechallenging patients with prophylactic agents was successful in 2 (28.6%) of 7 patients who successfully completed their treatment. On the other hand, all 3 patients rechallenged with oxaliplatin using a desensitization protocol successfully completed their treatment without new HSRs. In this retrospective study, we observed that being male and having higher counts of peripheral eosinophil could be predictors for HSR to oxaliplatin. In

  2. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  3. Campylobacter Risk Analysis

    DEFF Research Database (Denmark)

    Nauta, Maarten

    In several countries quantitative microbiological risk assessments (QMRAs) have been performed for Campylobacter in chicken meat. The models constructed for this purpose provide a good example of the development of QMRA in general and illustrate the diversity of available methods. Despite...... the differences between the models, the most prominent conclusions of the QMRAs are similar. These conclusions for example relate to the large risk of highly contaminated meat products and the insignificance of contamination from Campylobacter positive flocks to negative flocks during slaughter and processing...

  4. Risk analysis: opening the process

    International Nuclear Information System (INIS)

    Hubert, Ph.; Mays, C.

    1998-01-01

    This conference on risk analysis took place in Paris, 11-14 october 1999. Over 200 paper where presented in the seven following sessions: perception; environment and health; persuasive risks; objects and products; personal and collective involvement; assessment and valuation; management. A rational approach to risk analysis has been developed in the three last decades. Techniques for risk assessment have been thoroughly enhanced, risk management approaches have been developed, decision making processes have been clarified, the social dimensions of risk perception and management have been investigated. Nevertheless this construction is being challenged by recent events which reveal how deficits in stakeholder involvement, openness and democratic procedures can undermine risk management actions. Indeed, the global process most components of risk analysis may be radically called into question. Food safety has lately been a prominent issue, but now debates appear, or old debates are revisited in the domains of public health, consumer products safety, waste management, environmental risks, nuclear installations, automobile safety and pollution. To meet the growing pressures for efficiency, openness, accountability, and multi-partner communication in risk analysis, institutional changes are underway in many European countries. However, the need for stakeholders to develop better insight into the process may lead to an evolution of all the components of risks analysis, even in its most (technical' steps. For stakeholders of different professional background, political projects, and responsibilities, risk identification procedures must be rendered understandable, quantitative risk assessment must be intelligible and accommodated in action proposals, ranging from countermeasures to educational programs to insurance mechanisms. Management formats must be open to local and political input and other types of operational feedback. (authors)

  5. Comprehensive protocol of traceability during IVF: the result of a multicentre failure mode and effect analysis.

    Science.gov (United States)

    Rienzi, L; Bariani, F; Dalla Zorza, M; Albani, E; Benini, F; Chamayou, S; Minasi, M G; Parmegiani, L; Restelli, L; Vizziello, G; Costa, A Nanni

    2017-08-01

    Can traceability of gametes and embryos be ensured during IVF? The use of a simple and comprehensive traceability system that includes the most susceptible phases during the IVF process minimizes the risk of mismatches. Mismatches in IVF are very rare but unfortunately possible with dramatic consequences for both patients and health care professionals. Traceability is thus a fundamental aspect of the treatment. A clear process of patient and cell identification involving witnessing protocols has to be in place in every unit. To identify potential failures in the traceability process and to develop strategies to mitigate the risk of mismatches, previously failure mode and effects analysis (FMEA) has been used effectively. The FMEA approach is however a subjective analysis, strictly related to specific protocols and thus the results are not always widely applicable. To reduce subjectivity and to obtain a widespread comprehensive protocol of traceability, a multicentre centrally coordinated FMEA was performed. Seven representative Italian centres (three public and four private) were selected. The study had a duration of 21 months (from April 2015 to December 2016) and was centrally coordinated by a team of experts: a risk analysis specialist, an expert embryologist and a specialist in human factor. Principal investigators of each centre were first instructed about proactive risk assessment and FMEA methodology. A multidisciplinary team to perform the FMEA analysis was then formed in each centre. After mapping the traceability process, each team identified the possible causes of mistakes in their protocol. A risk priority number (RPN) for each identified potential failure mode was calculated. The results of the FMEA analyses were centrally investigated and consistent corrective measures suggested. The teams performed new FMEA analyses after the recommended implementations. In each centre, this study involved: the laboratory director, the Quality Control & Quality

  6. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  7. Advances in probabilistic risk analysis

    International Nuclear Information System (INIS)

    Hardung von Hardung, H.

    1982-01-01

    Probabilistic risk analysis can now look back upon almost a quarter century of intensive development. The early studies, whose methods and results are still referred to occasionally, however, only permitted rough estimates to be made of the probabilities of recognizable accident scenarios, failing to provide a method which could have served as a reference base in calculating the overall risk associated with nuclear power plants. The first truly solid attempt was the Rasmussen Study and, partly based on it, the German Risk Study. In those studies, probabilistic risk analysis has been given a much more precise basis. However, new methodologies have been developed in the meantime, which allow much more informative risk studies to be carried out. They have been found to be valuable tools for management decisions with respect to backfitting, reinforcement and risk limitation. Today they are mainly applied by specialized private consultants and have already found widespread application especially in the USA. (orig.) [de

  8. A protocol improves GP recording of long-term sickness absence risk factors.

    Science.gov (United States)

    van Dijk, Paul; Hogervorst, Wouter; ter Riet, Gerben; van Dijk, Frank

    2008-06-01

    If general practitioners (GPs) were better informed about patients' risks of long-term sickness absence (LTSA), they could incorporate these risk assessments into their patient management plans and cooperate more with occupational physicians to prevent LTSA. To evaluate the effectiveness of a protocol helping GPs in recording risks of LTSA and in co-operating with occupational physicians (OPs). Twenty-six GPs (co-operating in four groups) in Amsterdam, The Netherlands, participated in a controlled intervention study. Fourteen GPs were the protocol-supported intervention group and twelve GPs were the reference group. Outcome measures were consultations containing work-related information, information about two risk factors for LTSA, referrals to OPs and contacts of OPs with GPs and patients. Outcomes were identified through an electronic search in the GPs' information systems. Entries containing information were independently scored by two investigators. The proportions of patients with consultations documenting LTSA-pertinent items were compared between the groups, accounting for differences at baseline. There was no increase in consultations containing work-related information. Recording of risk factor information increased in the intervention group; the difference was 4.5% [95% CI 1.5-7.6] and 1.8% (95% CI -0.8 to 4.4) for the two risk factors. The referral rate to the OP increased by 2.9% (95% CI 1.2-4.5). There was no effect on contacts of OPs with GPs or with patients. Protocol-supported consultations may lead to a modest increase in information regarding two risk factors for LTSA in GPs' electronic records and to more referrals to OPs.

  9. Insect Venom Immunotherapy: Analysis of the Safety and Tolerance of 3 Buildup Protocols Frequently Used in Spain.

    Science.gov (United States)

    Gutiérrez Fernández, D; Moreno-Ancillo, A; Fernández Meléndez, S; Domínguez-Noche, C; Gálvez Ruiz, P; Alfaya Arias, T; Carballada González, F; Alonso Llamazares, A; Marques Amat, L; Vega Castro, A; Antolín Amérigo, D; Cruz Granados, S; Ruiz León, B; Sánchez Morillas, L; Fernández Sánchez, J; Soriano Gomis, V; Borja Segade, J; Dalmau Duch, G; Guspi Bori, R; Miranda Páez, A

    2016-01-01

    Hymenoptera venom immunotherapy (VIT) is an effective treatment but not one devoid of risk, as both local and systemic adverse reactions may occur, especially in the initial phases. We compared the tolerance to 3 VIT buildup protocols and analyzed risk factors associated with adverse reactions during this phase. We enrolled 165 patients divided into 3 groups based on the buildup protocol used (3, 4, and 9 weeks). The severity of systemic reactions was evaluated according to the World Allergy Organization model. Results were analyzed using exploratory descriptive statistics, and variables were compared using analysis of variance. Adverse reactions were recorded in 53 patients (32%) (43 local and 10 systemic). Local reactions were immediate in 27 patients (63%) and delayed in 16 (37%). The severity of the local reaction was slight/moderate in 15 patients and severe in 13. Systemic reactions were grade 1-2. No significant association was found between the treatment modality and the onset of local or systemic adverse reactions or the type of local reaction. We only found a statistically significant association between severity of the local reaction and female gender. As for the risk factors associated with systemic reactions during the buildup phase, we found no significant differences in values depending on the protocol used or the insect responsible. The buildup protocols compared proved to be safe and did not differ significantly from one another. In the population studied, patients undergoing the 9-week schedule presented no systemic reactions. Therefore, this protocol can be considered the safest approach.

  10. Comparative Analysis of Different Protocols to Manage Large Scale Networks

    OpenAIRE

    Anil Rao Pimplapure; Dr Jayant Dubey; Prashant Sen

    2013-01-01

    In recent year the numbers, complexity and size is increased in Large Scale Network. The best example of Large Scale Network is Internet, and recently once are Data-centers in Cloud Environment. In this process, involvement of several management tasks such as traffic monitoring, security and performance optimization is big task for Network Administrator. This research reports study the different protocols i.e. conventional protocols like Simple Network Management Protocol and newly Gossip bas...

  11. Performance analysis of signaling protocols on OBS switches

    Science.gov (United States)

    Kirci, Pinar; Zaim, A. Halim

    2005-10-01

    In this paper, Just-In-Time (JIT), Just-Enough-Time (JET) and Horizon signalling schemes for Optical Burst Switched Networks (OBS) are presented. These signaling schemes run over a core dWDM network and a network architecture based on Optical Burst Switches (OBS) is proposed to support IP, ATM and Burst traffic. In IP and ATM traffic several packets are assembled in a single packet called burst and the burst contention is handled by burst dropping. The burst length distribution in IP traffic is arbitrary between 0 and 1, and is fixed in ATM traffic at 0,5. Burst traffic on the other hand is arbitrary between 1 and 5. The Setup and Setup ack length distributions are arbitrary. We apply the Poisson model with rate λ and Self-Similar model with pareto distribution rate α to identify inter-arrival times in these protocols. We consider a communication between a source client node and a destination client node over an ingress and one or more multiple intermediate switches.We use buffering only in the ingress node. The communication is based on single burst connections in which, the connection is set up just before sending a burst and then closed as soon as the burst is sent. Our analysis accounts for several important parameters, including the burst setup, burst setup ack, keepalive messages and the optical switching protocol. We compare the performance of the three signalling schemes on the network under as burst dropping probability under a range of network scenarios.

  12. Analysis of limiting information characteristics of quantum-cryptography protocols

    International Nuclear Information System (INIS)

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-01

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  13. Introduction of the risk analysis

    International Nuclear Information System (INIS)

    Campon, G.; Martinez, I.

    2013-01-01

    An introduction of risks analysis was given in the exposition which main issues were: food innocuousness, world, regional and national food context,change of paradigms, health definition, risk, codex, standardization, food chain role, trade agreement, codex alimentarius, food transmission diseases cost impact

  14. Hydroproject risk analysis

    International Nuclear Information System (INIS)

    Murdock, R.V.; Gulliver, J.S.

    1991-01-01

    Traditionally, economic feasibility studies performed for potential hydropower plant sites have included either no uncertainty or at best an ad hoc value associated with estimated benefits. However, formal methods for analyzing uncertainty do exist and have been outlined in the past. An application of these methods is demonstrated through conversion of a hydropower survey program, HYFEAS, to run on LOTUS 1-2-3, using the add-in software package RISK. In this paper the program principals are outlined and a case study of it's application to a hydropower site is presented

  15. Communicating systems with UML 2 modeling and analysis of network protocols

    CERN Document Server

    Barrera, David Garduno

    2013-01-01

    This book gives a practical approach to modeling and analyzing communication protocols using UML 2. Network protocols are always presented with a point of view focusing on partial mechanisms and starting models. This book aims at giving the basis needed for anybody to model and validate their own protocols. It follows a practical approach and gives many examples for the description and analysis of well known basic network mechanisms for protocols.The book firstly shows how to describe and validate the main protocol issues (such as synchronization problems, client-server interactions, layer

  16. [Comparison of the present and previously used protocol of risk stratification in children with acute lymphoblastic leukemia].

    Science.gov (United States)

    Glodkowska, Eliza; Bialas, Agnieszka; Jackowska, Teresa

    2007-01-01

    Acute lymphoblastic leukaemia (ALL) is one of the most common cancers in children. In Poland, since November 2002 a new protocol of risk stratification has been recommended for assessment of risk factors and for choosing therapy regimens. assessment of accuracy of protocol ALL-IC 2002 in comparison to previously used risk stratification protocols. ALL was diagnosed in 100 children (44 girls, 56 boys; 1-18 years of age) in the Department of Pediatric Hematology and Oncology, Warsaw Medical University, over the period from November 2002 to November 2006. According to the ALL-IC 2002 protocol the patients were divided into three risk groups: SR-standard, IR-intermediate and HR-high. The stratification was by age, leukocyte count, cytogenetic changes, early response to prednisone therapy and bone marrow remission. In the previously used risk stratification protocols-BFM-90, only hepatosplenomegaly and the number of blasts in peripheral blood (PB) were considered, and the patients were divided into three risk groups: low (LRG1.2). out of the 100 patients qualified for treatment regimens according to the ALL-IC 2002 protocol, 97 entered remission, 11 died and 3 had a relapse. Under the ALL-IC 2002 protocol these children were stratified into the following groups: SR-31%, IR-44% and HR-25%. In the previously used stratification, there would be 26% children in low, 46% in the medium and 28% in the high risk group. According to the BFM-90 protocol 18/31 (58%) and 16/44 (36%) patients from the SR and IR groups respectively would be given more intensive treatment. On the other hand 11/44 (25%) and 14/25 (56%) patients from the IR and HR groups respectively would be given less intensive treatment. 1. ALL-IC 2002 protocol in comparison with the previously used protocol BFM-90, changes the qualification of children with ALL for the SR, IR and HR risk groups. This is linked to basic change of treatment protocol, adequate to severity of disease. 2. Children with ALL qualified

  17. Performance Analysis of TDMA Protocol in a Femtocell Network

    Directory of Open Access Journals (Sweden)

    Wanod Kumar

    2014-07-01

    Full Text Available In this paper, we evaluate the performance of TDMA (Time Division Multiple Access protocol using queuing theory in a femtocell network. The fair use of wireless channel among the users of network is carried out using TDMA protocol. The arrival of data packets from M communicating nodes becomes multiple Poisson process. The time slots of TDMA protocol represent c servers to communicate data packets coming from communicating nodes to the input of FAP (Femtocell Access Point. The service time of each server (time slot is exponentially distributed. This complete communication scenario using TDMA protocol is modeled using M/M/c queue. The performance of the protocol is evaluated in terms of mean number in system, average system delay and utilization for varying traffic intensity

  18. Impact of different dietary approaches on glycemic control and cardiovascular risk factors in patients with type 2 diabetes: a protocol for a systematic review and network meta-analysis.

    Science.gov (United States)

    Schwingshackl, Lukas; Chaimani, Anna; Hoffmann, Georg; Schwedhelm, Carolina; Boeing, Heiner

    2017-03-20

    , and cardiovascular risk factors in type 2 diabetes mellitus patients. The results of the present network meta-analysis will influence evidence-based treatment decisions since it will be fundamental for based recommendations in the management of type 2 diabetes. PROSPERO 42016047464.

  19. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  20. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  1. STOCHASTIC METHODS IN RISK ANALYSIS

    Directory of Open Access Journals (Sweden)

    Vladimíra OSADSKÁ

    2017-06-01

    Full Text Available In this paper, we review basic stochastic methods which can be used to extend state-of-the-art deterministic analytical methods for risk analysis. We can conclude that the standard deterministic analytical methods highly depend on the practical experience and knowledge of the evaluator and therefore, the stochastic methods should be introduced. The new risk analysis methods should consider the uncertainties in input values. We present how large is the impact on the results of the analysis solving practical example of FMECA with uncertainties modelled using Monte Carlo sampling.

  2. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  3. Protocol for sampling and analysis of bone specimens

    International Nuclear Information System (INIS)

    Aras, N.K.

    2000-01-01

    The iliac crest of hip bone was chosen as the most suitable sampling site for several reasons: Local variation in the elemental concentration along the iliac crest is minimal; Iliac crest biopsies are commonly taken clinically on patients; The cortical part of the sample is small (∼2 mm) and can be separated easily from the trabecular bone; The use of the trabecular part of the iliac crest for trace element analysis has the advantage of reflecting rapidly changes in the composition of bone due to external parameters, including medication. Biopsy studies, although in some ways more difficult than autopsy studies, because of the need to obtain the informed consents of the subjects, are potentially more useful than autopsy studies. Thereby many problems of postmortem migration of elements can be avoided and reliable dietary and other data can be collected simultaneously. Select the subjects among the patients undergoing orthopedic surgery due to any reason other than osteoporosis. Follow an established protocol to obtain bone biopsies. Patients undergoing synergy should fill in the 'Osteoporosis Project Questionnaire Form' including information on lifestyle variables, dietary intakes, the reason for surgery etc. If possible, measure the bone mineral density (BMD) prior to removal of the biopsy sample. However it may not possible to have BMD results on all the subjects because of difficulty of DEXA measurement after an accident

  4. Performance analysis of simultaneous dense coding protocol under decoherence

    Science.gov (United States)

    Huang, Zhiming; Zhang, Cai; Situ, Haozhen

    2017-09-01

    The simultaneous dense coding (SDC) protocol is useful in designing quantum protocols. We analyze the performance of the SDC protocol under the influence of noisy quantum channels. Six kinds of paradigmatic Markovian noise along with one kind of non-Markovian noise are considered. The joint success probability of both receivers and the success probabilities of one receiver are calculated for three different locking operators. Some interesting properties have been found, such as invariance and symmetry. Among the three locking operators we consider, the SWAP gate is most resistant to noise and results in the same success probabilities for both receivers.

  5. Risk of Deep vein thrombosis in neurosurgery: State of the art on prophylaxis protocols and best clinical practices.

    Science.gov (United States)

    Ganau, Mario; Prisco, Lara; Cebula, Helene; Todeschi, Julien; Abid, Houssem; Ligarotti, Gianfranco; Pop, Raoul; Proust, Francois; Chibbaro, Salvatore

    2017-11-01

    To analytically discuss some protocols in Deep vein thrombosis (DVT)/pulmonary Embolism (PE) prophylaxis currently use in Neurosurgical Departments around the world. Analysis of the prophylaxis protocols in the English literature: An analytical and narrative review of literature concerning DVT prophylaxis protocols in Neurosurgery have been conducted by a PubMed search (back to 1978). 80 abstracts were reviewed, and 74 articles were extracted. The majority of DVT seems to develop within the first week after a neurosurgical procedure, and a linear correlation between the duration of surgery and DVT occurrence has been highlighted. The incidence of DVT seems greater for cranial (7.7%) than spinal procedures (1.5%). Although intermittent pneumatic compression (IPC) devices provided adequate reduction of DVT/PE in some cranial and combined cranial/spinal series, low-dose subcutaneous unfractionated heparin (UFH) or low molecular-weight heparin (LMWH) further reduced the incidence, not always of DVT, but of PE. Nevertheless, low-dose heparin-based prophylaxis in cranial and spinal series risks minor and major postoperative haemorrhages: 2-4% in cranial series, 3.4% minor and 3.4% major haemorrhages in combined cranial/spinal series, and a 0.7% incidence of major/minor haemorrhages in spinal series. This analysis showed that currently most of the articles are represented by case series and case reports. As long as clear guidelines will not be defined and universally applied to this diverse group of patients, any prophylaxis for DVT and PE should be tailored to the individual patient with cautious assessment of benefits versus risks. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Adherence to, and outcomes of, a galactomannan screening protocol in high-risk hematology patients.

    Science.gov (United States)

    Harricharan, S; Biederman, K; Bombassaro, A M; Lazo-Langner, A; Elsayed, S; Fulford, A; Delport, J A; Xenocostas, A

    2018-04-01

    A twice-weekly galactomannan (gm) screening protocol was implemented in high-risk hematology inpatients. Study objectives were to determine adherence to the protocol, use of selected resources, and patient outcomes. This retrospective cohort study compared outcomes of interest before and after implementation of gm screening. Adults undergoing matched related allogeneic hematopoietic stem-cell transplantation or induction chemotherapy for acute leukemia were eligible. Patients could be enrolled more than once and were evaluated as episodes. Adherence to the gm protocol was assessed in post-implementation episodes. Use of broad-spectrum antifungals (bsafs), consultations (infectious diseases, respirology), and diagnostic procedures (computed tomography imaging, bronchoalveolar lavage) were compared between phases, as were the patient outcomes of all-cause mortality and clinical success (alive and not taking a bsaf). Of 182 episodes consecutively screened, 70 per phase were enrolled. Clinical characteristics and duration of assessment were similar for the phases. Full or partial adherence to the protocol was observed in 61 post-implementation episodes (87%), with full adherence in 40 episodes (57%). More episodes in the pre-implementation phase than in the post-implementation phase involved receipt of bsafs, consultations, and diagnostics (27% vs. 7%, p = 0.02; 46% vs. 26%, p = 0.014; and 46% vs. 31%, p = 0.083 respectively). Although mortality was similar in the two phases, clinical success at the final assessment was observed in fewer pre-implementation than post-implementation episodes (79% vs. 98%, p < 0.001). Implementation of a gm screening protocol was feasible and associated with significantly fewer episodes involving receipt of bsafs and consultations, and with significantly more episodes showing clinical success.

  7. An approach to standardization of urine sediment analysis via suggestion of a common manual protocol.

    Science.gov (United States)

    Ko, Dae-Hyun; Ji, Misuk; Kim, Sollip; Cho, Eun-Jung; Lee, Woochang; Yun, Yeo-Min; Chun, Sail; Min, Won-Ki

    2016-01-01

    The results of urine sediment analysis have been reported semiquantitatively. However, as recent guidelines recommend quantitative reporting of urine sediment, and with the development of automated urine sediment analyzers, there is an increasing need for quantitative analysis of urine sediment. Here, we developed a protocol for urine sediment analysis and quantified the results. Based on questionnaires, various reports, guidelines, and experimental results, we developed a protocol for urine sediment analysis. The results of this new protocol were compared with those obtained with a standardized chamber and an automated sediment analyzer. Reference intervals were also estimated using new protocol. We developed a protocol with centrifugation at 400 g for 5 min, with the average concentration factor of 30. The correlation between quantitative results of urine sediment analysis, the standardized chamber, and the automated sediment analyzer were generally good. The conversion factor derived from the new protocol showed a better fit with the results of manual count than the default conversion factor in the automated sediment analyzer. We developed a protocol for manual urine sediment analysis to quantitatively report the results. This protocol may provide a mean for standardization of urine sediment analysis.

  8. Meta Salud Diabetes study protocol: a cluster-randomised trial to reduce cardiovascular risk among a diabetic population of Mexico

    Science.gov (United States)

    Cornejo Vucovich, Elsa; Ingram, Maia; Valenica, Celina; Castro Vasquez, Maria del Carmen; Gonzalez-Fagoaga, Eduardo; Geurnsey de Zapien, Jill

    2018-01-01

    Introduction Northern Mexico has among the highest rates of cardiovascular disease (CVD) and diabetes in the world. This research addresses core gaps in implementation science to develop, test and scale-up CVD risk-reduction interventions in diabetics through a national primary care health system. Methods and analysis The Meta Salud Diabetes (MSD) research project is a parallel two-arm cluster-randomised clinical behavioural trial based in 22 (n=22) health centres in Sonora, Mexico. MSD aims to evaluate the effectiveness of the MSD intervention for the secondary prevention of CVD risk factors among a diabetic population (n=320) compared with the study control of usual care. The MSD intervention consists of 2-hour class sessions delivered over a 13-week period providing educational information to encourage sustainable behavioural change to prevent disease complications including the adoption of physical activity. MSD is delivered within the context of Mexico’s national primary care health centre system by health professionals, including nurses, physicians and community health workers via existing social support groups for individuals diagnosed with chronic disease. Mixed models are used to estimate the effect of MSD by comparing cardiovascular risk, as measured by the Framingham Risk Score, between the trial arms. Secondary outcomes include hypertension, behavioural risk factors and psychosocial factors. Ethics and dissemination This work is supported by the National Institutes of Health, National Heart Lung and Blood Institute (1R01HL125996-01) and approved by the University of Arizona Research Institutional Review Board (Protocol 1508040144) and the Research Bioethics Committee at the University of Sonora. The first Internal Review Board approval date was 31 August 2015 with five subsequent approved amendments. This article refers to protocol V.0.2, dated 30 January 2017. Results will be disseminated via peer-reviewed publication and presentation at

  9. Analysis of the LTE Access Reservation Protocol for Real-Time Traffic

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2013-01-01

    LTE is increasingly seen as a system for serving real-time Machine-to-Machine (M2M) communication needs. The asynchronous M2M user access in LTE is obtained through a two-phase access reservation protocol (contention and data phase). Existing analysis related to these protocols is based...... of the two-phase LTE reservation protocol and asses its performance, when assumptions (1) and (2) do not hold....

  10. ProRisk : risk analysis instrument : developed for William properties

    NARCIS (Netherlands)

    van Doorn, W.H.W.; Egeberg, Ingrid; Hendrickx, Kristoff; Kahramaner, Y.; Masseur, B.; Waijers, Koen; Weglicka, K.A.

    2005-01-01

    This report presents a Risk Analysis Instrument developed for William Properties. Based on the analysis, it appears that the practice of Risk Analysis exists within the organization, yet rather implicit. The Risk Analysis Instrument comes with a package of four components: an activity diagram, a

  11. A Ten Step Protocol and Plan for CCS Site Characterization, Based on an Analysis of the Rocky Mountain Region, USA

    Energy Technology Data Exchange (ETDEWEB)

    McPherson, Brian; Matthews, Vince

    2013-09-15

    This report expresses a Ten-Step Protocol for CO2 Storage Site Characterization, the final outcome of an extensive Site Characterization analysis of the Rocky Mountain region, USA. These ten steps include: (1) regional assessment and data gathering; (2) identification and analysis of appropriate local sites for characterization; (3) public engagement; (4) geologic and geophysical analysis of local site(s); (5) stratigraphic well drilling and coring; (6) core analysis and interpretation with other data; (7) database assembly and static model development; (8) storage capacity assessment; (9) simulation and uncertainty assessment; (10) risk assessment. While the results detailed here are primarily germane to the Rocky Mountain region, the intent of this protocol is to be portable or generally applicable for CO2 storage site characterization.

  12. Common approach of risks analysis

    International Nuclear Information System (INIS)

    Noviello, L.; Naviglio, A.

    1996-01-01

    Although, following the resolutions of the High German Court, the protection level of the human beings is an objective which can change in time, it is obvious that it is an important point when there is a risk for the population. This is true more particularly for the industrial plants whose possible accidents could affect the population. The accidents risk analysis indicates that there is no conceptual difference between the risks of a nuclear power plant and those of the other industrial plants as chemical plants, the gas distribution system and the hydraulic dams. A legislation analysis induced by the Seveso Directive for the industrial risks give some important indications which should always be followed. This work analyses more particularly the legislative situation in different European countries and identifies some of the most important characteristics. Indeed, for most of the countries, the situation is different and it is a later difficulties source for nuclear power plants. In order to strengthen this reasoning, this paper presents some preliminary results of an analysis of a nuclear power plant following the approach of other industrial plants. In conclusion, it will be necessary to analyse again the risks assessment approach for nuclear power plants because the real protection level of human beings in a country is determined by the less regulated of the dangerous industrial plants existing at the surroundings. (O.M.)

  13. Design and analysis of communication protocols for quantum repeater networks

    International Nuclear Information System (INIS)

    Jones, Cody; Kim, Danny; Rakher, Matthew T; Ladd, Thaddeus D; Kwiat, Paul G

    2016-01-01

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on entanglement-distribution rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol (‘MidpointSource’) delivers the highest entanglement-distribution rate for typical cases where there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network. (paper)

  14. Investigation of the Study Characteristics Affecting Clinical Trial Quality Using the Protocol Deviations Leading to Exclusion of Subjects From the Per Protocol Set Data in Studies for New Drug Application: A Retrospective Analysis.

    Science.gov (United States)

    Kohara, Norihito; Kaneko, Masayuki; Narukawa, Mamoru

    2018-01-01

    The concept of the risk-based approach has been introduced as an effort to secure the quality of clinical trials. In the risk-based approach, identification and evaluation of risk in advance are considered important. For recently completed clinical trials, we investigated the relationship between study characteristics and protocol deviations leading to the exclusion of subjects from Per Protocol Set (PPS) efficacy analysis. New drugs approved in Japan in the fiscal year 2014-2015 were targeted in the research. The reasons for excluding subjects from the PPS efficacy analysis were described in 102 trials out of 492 in the summary of new drug application documents, which was publicly disclosed after the drug's regulatory approval. The author extracted these reasons along with the numbers of the cases and the study characteristics of each clinical trial. Then, the direct comparison, univariate regression analysis, and multivariate regression analysis was carried out based on the exclusion rate. The study characteristics for which exclusion of subjects from the PPS efficacy analysis were frequently observed was multiregional clinical trials in study region; inhalant and external use in administration route; Anti-infective for systemic use; Respiratory system, Dermatologicals, and Nervous system in therapeutic drug under the Anatomical Therapeutic Chemical Classification. In the multivariate regression analysis, the clinical trial variables of inhalant, Respiratory system, or Dermatologicals were selected as study characteristics leading to a higher exclusion rate. The characteristics of the clinical trial that is likely to cause protocol deviations that will affect efficacy analysis were suggested. These studies should be considered for specific attention and priority observation in the trial protocol or its monitoring plan and execution, such as a clear description of inclusion/exclusion criteria in the protocol, development of training materials to site staff, and

  15. The development and evaluation of an internal workplace violence risk assessment protocol: one organization's experience.

    Science.gov (United States)

    Heitt, Michael C; Tamburo, Melissa Back

    2005-01-01

    The creation and development of a Risk Assessment Team at a large urban university is presented as a case study, with particular focus on the role the Employee Assistance Program (EAP) plays in the multidisciplinary team. The structure of the team and differing roles and responsibilities of members will be discussed. A specific protocol for addressing incidents will be introduced, along with changes in the team ' response over time. Major lessons learned will be presented, as well as the challenges the team faces today, and discussion of areas for future research and evaluation.

  16. Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol

    Directory of Open Access Journals (Sweden)

    Xing Hu

    2017-01-01

    Full Text Available In high diversity node situation, multichannel MAC protocol can improve the frequency efficiency, owing to fewer collisions compared with single-channel MAC protocol. And the performance of cyclic quorum-based multichannel (CQM MAC protocol is outstanding. Based on cyclic quorum system and channel slot allocation, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel-hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF, is proposed. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm. In addition, to improve the performance of CQM protocol in unsaturation situation, a dynamic channel slot allocation of CQM (DCQM protocol is proposed, based on wavelet neural network. Finally, the performance of CQM protocol and DCQM protocol is simulated by Qualnet platform. And the simulation results show that the analytic and simulation results match very well; the DCQM performs better in unsaturation situation.

  17. Risk Characterization uncertainties associated description, sensitivity analysis

    International Nuclear Information System (INIS)

    Carrillo, M.; Tovar, M.; Alvarez, J.; Arraez, M.; Hordziejewicz, I.; Loreto, I.

    2013-01-01

    The power point presentation is about risks to the estimated levels of exposure, uncertainty and variability in the analysis, sensitivity analysis, risks from exposure to multiple substances, formulation of guidelines for carcinogenic and genotoxic compounds and risk subpopulations

  18. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA)

    DEFF Research Database (Denmark)

    Muharemovic, O; Troelsen, A; Thomsen, M G

    2018-01-01

    INTRODUCTION: Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time...... imaging. Radiographers in the control group used a standard RSA protocol. RESULTS: At three months, radiographers in the case group significantly reduced (p .... No significant improvements were found in the control group at any time point. CONCLUSION: There is strong evidence that personalized RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute...

  19. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  20. PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM

    Directory of Open Access Journals (Sweden)

    S. Prasanna

    2014-03-01

    Full Text Available Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.

  1. A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2010-01-01

    We present a formal analysis of the Web Services Atomic Transaction (WS-AT) protocol. WS-AT is a part of the WS-Coordination framework and describes an algorithm for reaching agreement on the outcome of a distributed transaction. The protocol is modelled and verified using the model checker UPPAAL...

  2. Design and Analysis of Transport Protocols for Reliable High-Speed Communications

    NARCIS (Netherlands)

    Oláh, A.

    1997-01-01

    The design and analysis of transport protocols for reliable communications constitutes the topic of this dissertation. These transport protocols guarantee the sequenced and complete delivery of user data over networks which may lose, duplicate and reorder packets. Reliable transport services are

  3. Environmental modeling and health risk analysis (ACTS/RISK)

    National Research Council Canada - National Science Library

    Aral, M. M

    2010-01-01

    ... presents a review of the topics of exposure and health risk analysis. The Analytical Contaminant Transport Analysis System (ACTS) and Health RISK Analysis (RISK) software tools are an integral part of the book and provide computational platforms for all the models discussed herein. The most recent versions of these two softwa...

  4. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  5. A Hybrid Analysis for Security Protocols with State

    Science.gov (United States)

    2014-07-16

    http://www.mitre.org/publications/ technical-papers/completeness-of-cpsa. [19] Simon Meier, Cas Cremers , and David Basin. Efficient construction of...7] Cas Cremers and Sjouke Mauw. Operational semantics and verification of security protocols. Springer, 2012. [8] Anupam Datta, Ante Derek, John C

  6. [Protocols of health security in the light of some examples of risk management].

    Science.gov (United States)

    Postel-Vinay, Nicolas; Coquin, Yves

    2005-11-30

    Throughout medical training, medical risk management is a subject that has been insufficiently addressed and treated without a global vision. Yet the different dangers often make the front page of a media that addresses the question of health security when there is a failure of the system or new legal developments. Added to this disequilibrium of communication and training is the great complexity of risk management. Not only is the nature of the potentially dangerous agents extraordinarily varied but also the entity that detects the risk is sometimes a stranger to the causes of its appearance. The surrounding regulations are themselves complex and dense. Using the examples that have arisen over the last 2 or 3 years, this article describes the current French protocols in risk management, that rely upon the agencies delivering their expertise, certain of which are endowed with the power of policing these regulations. In practice, the doctor should understand the role of these agencies, know how to find the validated information that they can provide, and understand his role in this picture. A role that is perceived as far away as long as the risk has not emerged, but is in the forefront once the event arises.

  7. Cardiovascular Disease Population Risk Tool (CVDPoRT): predictive algorithm for assessing CVD risk in the community setting. A study protocol.

    Science.gov (United States)

    Taljaard, Monica; Tuna, Meltem; Bennett, Carol; Perez, Richard; Rosella, Laura; Tu, Jack V; Sanmartin, Claudia; Hennessy, Deirdre; Tanuseputro, Peter; Lebenbaum, Michael; Manuel, Douglas G

    2014-10-23

    Recent publications have called for substantial improvements in the design, conduct, analysis and reporting of prediction models. Publication of study protocols, with prespecification of key aspects of the analysis plan, can help to improve transparency, increase quality and protect against increased type I error. Valid population-based risk algorithms are essential for population health planning and policy decision-making. The purpose of this study is to develop, evaluate and apply cardiovascular disease (CVD) risk algorithms for the population setting. The Ontario sample of the Canadian Community Health Survey (2001, 2003, 2005; 77,251 respondents) will be used to assess risk factors focusing on health behaviours (physical activity, diet, smoking and alcohol use). Incident CVD outcomes will be assessed through linkage to administrative healthcare databases (619,886 person-years of follow-up until 31 December 2011). Sociodemographic factors (age, sex, immigrant status, education) and mediating factors such as presence of diabetes and hypertension will be included as predictors. Algorithms will be developed using competing risks survival analysis. The analysis plan adheres to published recommendations for the development of valid prediction models to limit the risk of overfitting and improve the quality of predictions. Key considerations are fully prespecifying the predictor variables; appropriate handling of missing data; use of flexible functions for continuous predictors; and avoiding data-driven variable selection procedures. The 2007 and 2009 surveys (approximately 50,000 respondents) will be used for validation. Calibration will be assessed overall and in predefined subgroups of importance to clinicians and policymakers. This study has been approved by the Ottawa Health Science Network Research Ethics Board. The findings will be disseminated through professional and scientific conferences, and in peer-reviewed journals. The algorithm will be accessible

  8. Credit Risk Evaluation : Modeling - Analysis - Management

    OpenAIRE

    Wehrspohn, Uwe

    2002-01-01

    An analysis and further development of the building blocks of modern credit risk management: -Definitions of default -Estimation of default probabilities -Exposures -Recovery Rates -Pricing -Concepts of portfolio dependence -Time horizons for risk calculations -Quantification of portfolio risk -Estimation of risk measures -Portfolio analysis and portfolio improvement -Evaluation and comparison of credit risk models -Analytic portfolio loss distributions The thesis contributes to the evaluatio...

  9. High incidence of pseudotumours after hip resurfacing even in low risk patients; results from an intensified MRI screening protocol.

    NARCIS (Netherlands)

    Weegen, W. van der; Smolders, J.M.; Sijbesma, T.; Hoekstra, H.J.; Brakel, K.; Susante, J.L.C. van

    2013-01-01

    We intensified our screening protocol for the presence of pseudotumours in a consecutive series of patients with a hip resurfacing arthroplasty (HRA), to establish whether we should be alert to the presence of 'silent' pseudotumours. Patients categorised with high risk (11 hips) and low risk (10

  10. Time Error Analysis of SOE System Using Network Time Protocol

    International Nuclear Information System (INIS)

    Keum, Jong Yong; Park, Geun Ok; Park, Heui Youn

    2005-01-01

    To find the accuracy of time in the fully digitalized SOE (Sequence of Events) system, we used a formal specification of the Network Time Protocol (NTP) Version 3, which is used to synchronize time keeping among a set of distributed computers. Through constructing a simple experimental environments and experimenting internet time synchronization, we analyzed the time errors of local clocks of SOE system synchronized with a time server via computer networks

  11. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  12. Performance Analysis of Untraceability Protocols for Mobile Agents Using an Adaptable Framework

    OpenAIRE

    LESZCZYNA RAFAL; GORSKI Janusz Kazimierz

    2006-01-01

    Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should extend a sole validation of their security and cover other quality aspects, primarily their efficiency. Thus after conducting a security analysis, we wanted to complement it with a performance analysis. For this purpose we developed a performance evaluation framework, which, as we realised, with certain adjustments, can ...

  13. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    Science.gov (United States)

    2006-12-01

    field of 9 identifies the ICMP message as an adverstisement . Code Mobile IP home agents and foreign agents use the value of 16 to prevent any nodes...ANALYSIS OF THE MOBILE IP PROTOCOL (RFC 3344 AND RELATED RFCS) by Chin Chin Ng December 2006 Thesis Co-Advisors: George W. Dinolt J. D...December 2006 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Performance Analysis of the Mobile IP Protocol (RFC 3344 and

  14. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4, Volume IV: Inherent Optical Properties: Instruments, Characterizations, Field Measurements and Data Analysis Protocols

    Science.gov (United States)

    Mueller, J. L.; Fargion, G. S.; McClain, C. R. (Editor); Pegau, S.; Zanefeld, J. R. V.; Mitchell, B. G.; Kahru, M.; Wieland, J.; Stramska, M.

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparision and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background, and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 is entirely superseded by the six volumes of Revision 4 listed above.

  15. Risk Analysis in Road Tunnels – Most Important Risk Indicators

    DEFF Research Database (Denmark)

    Berchtold, Florian; Knaust, Christian; Thöns, Sebastian

    2016-01-01

    Methodologies on fire risk analysis in road tunnels consider numerous factors affecting risks (risk indicators) and express the results by risk measures. But only few comprehensive studies on effects of risk indicators on risk measures are available. For this reason, this study quantifies...... the effects and highlights the most important risk indicators with the aim to support further developments in risk analysis. Therefore, a system model of a road tunnel was developed to determine the risk measures. The system model can be divided into three parts: the fire part connected to the fire model Fire...... Dynamics Simulator (FDS); the evacuation part connected to the evacuation model FDS+Evac; and the frequency part connected to a model to calculate the frequency of fires. This study shows that the parts of the system model (and their most important risk indicators) affect the risk measures in the following...

  16. Safe application of a restrictive transfusion protocol in moderate-risk patients undergoing cardiac operations.

    Science.gov (United States)

    Song, Howard K; von Heymann, Christian; Jespersen, Christian M; Karkouti, Keyvan; Korte, Wolfgang; Levy, Jerrold H; Ranucci, Marco; Saugstrup, Trine; Sellke, Frank W

    2014-05-01

    Perioperative red blood cell transfusion is associated with adverse outcomes after cardiac operations. Although restrictive transfusion protocols have been developed, their safety and efficacy are not well demonstrated, and considerable variation in transfusion practice persists. We report our experience with a restrictive transfusion protocol. We analyzed the outcomes in 409 patients undergoing cardiac operations enrolled in a trial conducted at 30 centers worldwide. Blood products were administered on the basis of a transfusion algorithm applied across all centers, with a restrictive transfusion trigger of hemoglobin less than or equal to 6 g/dL. Transfusion was acceptable but not mandatory for hemoglobin 6 to 8 g/dL. For hemoglobin 8 to 10 g/dL, transfusion was acceptable only with evidence for end-organ ischemia. The patient population was moderately complex, with 20.5% having combined procedures and 29.6% having nonelective operations. The mean EuroSCORE for the population was 4.3, which predicted a substantial incidence of morbidity and mortality. Actual outcomes were excellent, with observed mortality of 0.49% and rates of cerebrovascular accident, myocardial infarction, and acute renal failure 1.2%, 6.1%, and 0.98%, respectively. The frequency of red blood cell transfusion was 33.7%, which varied significantly by center. Most transfusions (71.9%) were administered for hemoglobin 6 to 8 g/dL; 21.4% were administered for hemoglobin 8 to 10 g/dL with evidence for end-organ ischemia; 65.0% of patients avoided allogeneic transfusion altogether. A restrictive transfusion protocol can be safely applied in the care of moderate-risk patients undergoing cardiac operations. This strategy has significant potential to reduce transfusion and resource utilization in these patients, standardize transfusion practices across institutions, and increase the safety of cardiac operations. Copyright © 2014 The Society of Thoracic Surgeons. Published by Elsevier Inc. All rights

  17. What is a risk. [Quantitative risk analysis

    Energy Technology Data Exchange (ETDEWEB)

    Schoen, G [Physikalisch-Technische Bundesanstalt, Braunschweig (Germany, F.R.)

    1979-02-01

    The following article is a revised version of a lecture given by the author during the VDE meeting 'Technical Expert Activities' in Brunswick. First of all, the concept of 'risk' is discussed which leads to a probability scale which then permits a definition of the 'justifiable risk' as the boundary between 'hazard' and 'safety'. The boundary is quantified indirectly from laws, regulations, instructions, etc. to the 'Technological rules' for special fields of application by minimum requirement data. These viewpoints described in detail are not only of substantial significance for the creation of safety regulations but also for their application and consequently for jurisdiction.

  18. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA).

    Science.gov (United States)

    Muharemovic, O; Troelsen, A; Thomsen, M G; Kallemose, T; Gosvig, K K

    2018-05-01

    Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time and the number of exposure repetitions. Forty patients undergoing primary total hip arthroplasty were equally randomized to either a case or a control group. Radiographers in the case group were assisted by personalized patient protocols containing information about each patient's post-operative RSA imaging. Radiographers in the control group used a standard RSA protocol. At three months, radiographers in the case group significantly reduced (p RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute to the reduction of examination time, thus ensuring a cost benefit for department and patient safety. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.

  19. Analysis of transmission speed of AX.25 Protocol implemented in satellital earth station UPTC

    Directory of Open Access Journals (Sweden)

    Oscar Fernando Vera Cely

    2015-11-01

    Full Text Available One of the important parameters for the proper functioning of satellital ground station projected on Pedagogical and Technological University of Colombia (UPTC is the efficiency in transmission speed on communications protocol. This paper shows the results of analysis of the transmission speed of the AX.25 protocol implemented in the communication system of the satellital ground station UPTC. It begins with a brief description of the implemented hardware; the behavior of the transmission rate is evaluated using a theoretical analysis based on equations to estimate this parameter in the operation of the protocol, then tests are performed using the hardware that the satellital ground station UPTC has and finally, the conclusions are presented. Based on comparison of the theoretical analysis results obtained experimentally, it became apparent that AX.25 protocol efficiency is higher when increasing the number of frames.

  20. Mobile Health Technology Interventions for Suicide Prevention: Protocol for a Systematic Review and Meta-Analysis.

    Science.gov (United States)

    Melia, Ruth; Francis, Kady; Duggan, Jim; Bogue, John; O'Sullivan, Mary; Chambers, Derek; Young, Karen

    2018-01-26

    Previous research has reported that two of the major barriers to help-seeking for individuals at risk of suicide are stigma and geographical isolation. Mobile technology offers a potential means of delivering evidence-based interventions with greater specificity to the individual, and at the time that it is needed. Despite documented motivation by at-risk individuals to use mobile technology to track mental health and to support psychological interventions, there is a shortfall of outcomes data on the efficacy of mobile health (mHealth) technology on suicide-specific outcomes. The objective of this study is to develop a protocol for a systematic review and meta-analysis that aims to evaluate the effectiveness of mobile technology-based interventions for suicide prevention. The search includes the Cochrane Central Register of Controlled Trials (CENTRAL: The Cochrane Library), MEDLINE, Embase, PsycINFO, CRESP and relevant sources of gray literature. Studies that have evaluated psychological or nonpsychological interventions delivered via mobile computing and communication technology, and have suicidality as an outcome measure will be included. Two authors will independently extract data and assess the study suitability in accordance with the Cochrane Collaboration Risk of Bias Tool. Studies will be included if they measure at least one suicide outcome variable (ie, suicidal ideation, suicidal intent, nonsuicidal self-injurious behavior, suicidal behavior). Secondary outcomes will be measures of symptoms of depression. Where studies are sufficiently homogenous and reported outcomes are amenable for pooled synthesis, meta-analysis will be performed. A narrative synthesis will be conducted if the data is unsuitable for a meta-analysis. The review is in progress, with findings expected by summer 2018. To date, evaluations of mobile technology-based interventions in suicide prevention have focused on evaluating content as opposed to efficacy. Indeed, previous research has

  1. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  2. Risk analysis in radiosurgery treatments using risk matrices

    International Nuclear Information System (INIS)

    Delgado, J. M.; Sanchez Cayela, C.; Ramirez, M. L.; Perez, A.

    2011-01-01

    The aim of this study is the risk analysis process stereotactic single-dose radiotherapy and evaluation of those initiating events that lead to increased risk and a possible solution in the design of barriers.

  3. Health risk behaviours amongst school adolescents: protocol for a mixed methods study

    Directory of Open Access Journals (Sweden)

    Youness El Achhab

    2016-11-01

    Full Text Available Abstract Background Determining risky behaviours of adolescents provides valuable information for designing appropriate intervention programmes for advancing adolescent’s health. However, these behaviours are not fully addressed by researchers in a comprehensive approach. We report the protocol of a mixed methods study designed to investigate the health risk behaviours of Moroccan adolescents with the goal of identifying suitable strategies to address their health concerns. Methods We used a sequential two-phase explanatory mixed method study design. The approach begins with the collection of quantitative data, followed by the collection of qualitative data to explain and enrich the quantitative findings. In the first phase, the global school-based student health survey (GSHS was administered to 800 students who were between 14 and 19 years of age. The second phase engaged adolescents, parents and teachers in focus groups and assessed education documents to explore the level of coverage of health education in the programme learnt in the middle school. To obtain opinions about strategies to reduce Moroccan adolescents’ health risk behaviours, a nominal group technique will be used. Discussion The findings of this mixed methods sequential explanatory study provide insights into the risk behaviours that need to be considered if intervention programmes and preventive strategies are to be designed to promote adolescent’s health in the Moroccan school.

  4. Are vaccine strain, type or administration protocol risk factors for canine parvovirus vaccine failure?

    Science.gov (United States)

    Altman, K D; Kelman, M; Ward, M P

    2017-10-01

    Canine parvovirus (CPV) is a highly contagious and worldwide cause of serious and often fatal disease in dogs, despite the widespread availability of vaccines. Which vaccine-related factors are associated with vaccination failure is largely unknown, and there are no reports from Australia. In this study - the first national population-level CPV study of its kind ever conducted - we analysed data on 594 cases of apparent CPV vaccination failure reported from an Australian national surveillance system to determine whether vaccine strain, type or administration protocol are risk factors for vaccination failures. The strain of CPV used in vaccine manufacture was not significantly associated with vaccination failure in clinical practice. The vaccine type (killed versus attenuated vaccine) for puppies diagnosed with CPV was associated with a lower mean age at time of vaccination (P=0.0495). The age at administration of the last CPV vaccination a puppy received prior to presenting with disease was a significant (P=0.0334) risk factor for vaccination failure, irrespective of whether the vaccine was marketed for a 10-week or 12-week or greater vaccination finish protocol. There was also a strong negative correlation between age at last vaccination prior to disease and vaccination failure (Pparvovirus vaccines, especially in outbreak situations. The large number of cases identified in this study confirms that CPV vaccination failure is occurring in Australia. Veterinarians should consider CPV as a differential diagnosis in cases with appropriate clinical presentation, regardless of the reported vaccination status of the dog. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  6. Risk Analysis Group annual progress report 1984

    International Nuclear Information System (INIS)

    1985-06-01

    The activities of the Risk Analysis Group at Risoe during 1984 are presented. These include descriptions in some detail of work on general development topics and risk analysis performed as contractor. (author)

  7. RISK ANALYSIS IN MILK PROCESSING

    Directory of Open Access Journals (Sweden)

    I. PIRVUTOIU

    2008-05-01

    Full Text Available This paper aimed to evaluate Risk bankruptcy using “Score Method” based on Canon and Holder’s Model. The data were collected from the Balance Sheet and Profit and Loss Account for the period 2005-2007, recorded by a Meat processing Plant (Rador Commercial Company .The study has put in evidence the financial situation of the company,the level of the main financial ratios fundamenting the calculation of Z score function value in the three years The low values of Z score function recorded every year reflects that the company is still facing backruptcy. However , the worst situation was recorded in the years 2005 and 2006, when baknruptcy risk was ranging between 70 – 80 % . In the year 2007, the risk bankruptcy was lower, ranging between 50-70 % , as Z function recorded a value lower than 4 .For Meat processing companies such an analysis is compulsory at present as long as business environment is very risky in our country.

  8. Analysis of NASA communications (Nascom) II network protocols and performance

    Science.gov (United States)

    Omidyar, Guy C.; Butler, Thomas E.

    1991-01-01

    The NASA Communications (Nascom) Division of the Mission Operations and Data Systems Directorate is to undertake a major initiative to develop the Nascom II (NII) network to achieve its long-range service objectives for operational data transport to support the Space Station Freedom Program, the Earth Observing System, and other projects. NII is the Nascom ground communications network being developed to accommodate the operational traffic of the mid-1990s and beyond. The authors describe various baseline protocol architectures based on current and evolving technologies. They address the internetworking issues suggested for reliable transfer of data over heterogeneous segments. They also describe the NII architecture, topology, system components, and services. A comparative evaluation of the current and evolving technologies was made, and suggestions for further study are described. It is shown that the direction of the NII configuration and the subsystem component design will clearly depend on the advances made in the area of broadband integrated services.

  9. Sylvia Plath: a protocol analysis of her last poems.

    Science.gov (United States)

    Leenaars, A A; Wenckstern, S

    1998-01-01

    Personal documents have a significant place in psychological research. Suicide notes, diaries, novels, poems, and so on allow us to better understand the suicidal mind. The works of Sylvia Plath--a poet who killed herself at age 30--are prime examples for such protocol study. This article examines the last 6 months of Plath's poetry, revealing a suicidal malaise. Associating the results to the lives of Cesare Pavese and the case study of Natalie, a Terman-Shneidman subject of the intellectually gifted, the study shows a unit thema that facilitates the process of death. The poems reveal such themes as unbearable pain, loss, and abandonment that likely contributed significantly to death becoming the only solution.

  10. Risk analysis; Analisis de riesgos

    Energy Technology Data Exchange (ETDEWEB)

    Baron, J H; Nunez McLeod, J; Rivera, S S [Universidad Nacional de Cuyo, Mendoza (Argentina). Instituto de Capacitacion Especial y Desarrollo de Ingenieria Asistida por Computadora (CEDIAC)

    1997-07-01

    This book contains a selection of research works performed in the CEDIAC Institute (Cuyo National University) in the area of Risk Analysis, with specific orientations to the subjects of uncertainty and sensitivity studies, software reliability, severe accident modeling, etc. This volume presents important material for all those researches who want to have an insight in the risk analysis field, as a tool to solution several problems frequently found in the engineering and applied sciences field, as well as for the academic teachers who want to keep up to date, including the new developments and improvements continuously arising in this field. [Spanish] Este libro contiene una seleccion de trabajos de investigacion realizados dentro del Instituto de Capacitacion Especial y Desarrollo de la Ingenieria Asistida por Computadora en el area del analisis de riesgos, con una orientacion hacia el estudio de incertidumbres y sensibilidad, confiabilidad de software, modelacion de accidentes severos, etc. Este volumen recoge un material de indudable importancia e interes para todos aquellos investigadores y profesionales que desean incursionar en este campo del analisis de riesgos como herramienta para la solucion de problemas frecuentemente encontrados en la ingenieria y las ciencias aplicadas, asi como para los academicos que desean mantenerse al dia, conociendo los nuevos desarrollos y tecnicas que constantemente aparecen en su area.

  11. A background to risk analysis. Vol. 3

    International Nuclear Information System (INIS)

    Taylor, J.R.

    1979-01-01

    This 4-volumes report gives a background of ideas, principles, and examples which might be of use in developing practical methods for risk analysis. Some of the risk analysis techniques described are somewhat experimental. The report is written in an introductory style, but where some point needs further justifi- cation or evaluation, this is given in the form of a chapter appenix. In this way, it is hoped that the report can serve two purposes, - as a basis for starting risk analysis work and as a basis for discussing effectiveness of risk analysis procedures. The report should be seen as a preliminary stage, prior to a program of industrial trials of risk analysis methods. Vol. 3 contains chapters on quantification of risk, failure and accident probability, risk analysis and design, and examles of risk analysis for process plant. (BP)

  12. A background risk analysis. Vol. 1

    International Nuclear Information System (INIS)

    Taylor, J.R.

    1979-01-01

    This 4-volumes report gives a background of ideas, principles, and examples which might be of use in developing practical methods for risk analysis. Some of the risk analysis techniques, described are somewhat experimental. The report is written in an introductory style, but where some point needs further justification or evaluation, this is given in the form of a chapter appendix. In this way, it is hoped that the report can serve two purposes, - as a basis for starting risk analysis work and as a basis for discussing effectiveness of risk analysis procedures. The report should be seen as a preliminary stage, prior to a program of industrial trials of risk analysis methods. Vol. 1 contains a short history of risk analysis, and chapters on risk, failures, errors and accidents, and general procedures for risk analysis. (BP)

  13. Protocol: An updated integrated methodology for analysis of metabolites and enzyme activities of ethylene biosynthesis

    Directory of Open Access Journals (Sweden)

    Geeraerd Annemie H

    2011-06-01

    Full Text Available Abstract Background The foundations for ethylene research were laid many years ago by researchers such as Lizada, Yang and Hoffman. Nowadays, most of the methods developed by them are still being used. Technological developments since then have led to small but significant improvements, contributing to a more efficient workflow. Despite this, many of these improvements have never been properly documented. Results This article provides an updated, integrated set of protocols suitable for the assembly of a complete picture of ethylene biosynthesis, including the measurement of ethylene itself. The original protocols for the metabolites 1-aminocyclopropane-1-carboxylic acid and 1-(malonylaminocyclopropane-1-carboxylic acid have been updated and downscaled, while protocols to determine in vitro activities of the key enzymes 1-aminocyclopropane-1-carboxylate synthase and 1-aminocyclopropane-1-carboxylate oxidase have been optimised for efficiency, repeatability and accuracy. All the protocols described were optimised for apple fruit, but have been proven to be suitable for the analysis of tomato fruit as well. Conclusions This work collates an integrated set of detailed protocols for the measurement of components of the ethylene biosynthetic pathway, starting from well-established methods. These protocols have been optimised for smaller sample volumes, increased efficiency, repeatability and accuracy. The detailed protocol allows other scientists to rapidly implement these methods in their own laboratories in a consistent and efficient way.

  14. Pharmacotherapies for fatigue in chronic liver disease (CLD): a systematic review and meta-analysis (protocol).

    Science.gov (United States)

    Effiong, Andem; Kumari, Prerna

    2018-02-14

    This is the protocol for a systematic review (and meta-analysis) of an intervention. The primary objective of this systematic review will be to assess the benefits and harms of pharmacological therapies (pharmacotherapies) for the management of fatigue in adults with CLD of any etiology. The effects of pharmacological therapies on fatigue in CLD will be compared against those of placebo, no intervention, or non-pharmacological interventions. Specifically, this review will examine whether pharmacological therapies improve CLD-associated fatigue, and if they do, what key elements are associated with their effectiveness. The results of this systematic review will assist clinicians, policy-makers, researchers, and people with CLD in decision-making on how best to manage fatigue and its associated symptoms. MEDLINE, SCOPUS, EMBASE, EU Clinical Trials Register, WHO International Clinical Trials Registry Platform, CENTRAL (The Cochrane Library), ClinicalTrials.gov, reference lists of articles and conference proceedings will be searched for relevant studies. No language or date restrictions will be applied. Eligible studies will include adults with CLD of any etiology. Included studies will be randomized controlled trials. From included studies, data on participant characteristics, study design, setting, research ethics compliance, and intervention outcomes will be extracted. Risk of bias in included studies will be assessed using the Cochrane Risk of Bias Tool. A random-effects meta-analysis will be conducted. If substantial or considerable levels of heterogeneity are detected, analysis will be limited to a narrative synthesis. This systematic review will examine the effectiveness of pharmacological therapies on fatigue reduction in people with CLD. Such therapies may be more effective than non-pharmacological interventions in treating fatigue symptoms in CLD. Evidence derived from the findings of this study will guide future practice, policy, and research. PROSPERO, CRD

  15. Human Factors Risk Analyses of a Doffing Protocol for Ebola-Level Personal Protective Equipment: Mapping Errors to Contamination.

    Science.gov (United States)

    Mumma, Joel M; Durso, Francis T; Ferguson, Ashley N; Gipson, Christina L; Casanova, Lisa; Erukunuakpor, Kimberly; Kraft, Colleen S; Walsh, Victoria L; Zimring, Craig; DuBose, Jennifer; Jacob, Jesse T

    2018-03-05

    Doffing protocols for personal protective equipment (PPE) are critical for keeping healthcare workers (HCWs) safe during care of patients with Ebola virus disease. We assessed the relationship between errors and self-contamination during doffing. Eleven HCWs experienced with doffing Ebola-level PPE participated in simulations in which HCWs donned PPE marked with surrogate viruses (ɸ6 and MS2), completed a clinical task, and were assessed for contamination after doffing. Simulations were video recorded, and a failure modes and effects analysis and fault tree analyses were performed to identify errors during doffing, quantify their risk (risk index), and predict contamination data. Fifty-one types of errors were identified, many having the potential to spread contamination. Hand hygiene and removing the powered air purifying respirator (PAPR) hood had the highest total risk indexes (111 and 70, respectively) and number of types of errors (9 and 13, respectively). ɸ6 was detected on 10% of scrubs and the fault tree predicted a 10.4% contamination rate, likely occurring when the PAPR hood inadvertently contacted scrubs during removal. MS2 was detected on 10% of hands, 20% of scrubs, and 70% of inner gloves and the predicted rates were 7.3%, 19.4%, 73.4%, respectively. Fault trees for MS2 and ɸ6 contamination suggested similar pathways. Ebola-level PPE can both protect and put HCWs at risk for self-contamination throughout the doffing process, even among experienced HCWs doffing with a trained observer. Human factors methodologies can identify error-prone steps, delineate the relationship between errors and self-contamination, and suggest remediation strategies.

  16. Comparative analysis of protocols for DNA extraction from soybean caterpillars.

    Science.gov (United States)

    Palma, J; Valmorbida, I; da Costa, I F D; Guedes, J V C

    2016-04-07

    Genomic DNA extraction is crucial for molecular research, including diagnostic and genome characterization of different organisms. The aim of this study was to comparatively analyze protocols of DNA extraction based on cell lysis by sarcosyl, cetyltrimethylammonium bromide, and sodium dodecyl sulfate, and to determine the most efficient method applicable to soybean caterpillars. DNA was extracted from specimens of Chrysodeixis includens and Spodoptera eridania using the aforementioned three methods. DNA quantification was performed using spectrophotometry and high molecular weight DNA ladders. The purity of the extracted DNA was determined by calculating the A260/A280 ratio. Cost and time for each DNA extraction method were estimated and analyzed statistically. The amount of DNA extracted by these three methods was sufficient for PCR amplification. The sarcosyl method yielded DNA of higher purity, because it generated a clearer pellet without viscosity, and yielded high quality amplification products of the COI gene I. The sarcosyl method showed lower cost per extraction and did not differ from the other methods with respect to preparation times. Cell lysis by sarcosyl represents the best method for DNA extraction in terms of yield, quality, and cost effectiveness.

  17. A content analysis of posthumous sperm procurement protocols with considerations for developing an institutional policy.

    Science.gov (United States)

    Bahm, Sarah M; Karkazis, Katrina; Magnus, David

    2013-09-01

    To identify and analyze existing posthumous sperm procurement (PSP) protocols in order to outline central themes for institutions to consider when developing future policies. Qualitative content analysis. Large academic institutions across the United States. We performed a literature search and contacted 40 institutions to obtain nine full PSP protocols. We then performed a content analysis on these policies to identify major themes and factors to consider when developing a PSP protocol. Presence of a PSP policy. We identified six components of a thorough PSP protocol: Standard of Evidence, Terms of Eligibility, Sperm Designee, Restrictions on Use in Reproduction, Logistics, and Contraindications. We also identified two different approaches to policy structure. In the Limited Role approach, institutions have stricter consent requirements and limit their involvement to the time of procurement. In the Family-Centered approach, substituted judgment is permitted but a mandatory wait period is enforced before sperm use in reproduction. Institutions seeking to implement a PSP protocol will benefit from considering the six major building blocks of a thorough protocol and where they would like to fall on the spectrum from a Limited Role to a Family-Centered approach. Copyright © 2013 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  18. RAMS (Risk Analysis - Modular System) methodology

    Energy Technology Data Exchange (ETDEWEB)

    Stenner, R.D.; Strenge, D.L.; Buck, J.W. [and others

    1996-10-01

    The Risk Analysis - Modular System (RAMS) was developed to serve as a broad scope risk analysis tool for the Risk Assessment of the Hanford Mission (RAHM) studies. The RAHM element provides risk analysis support for Hanford Strategic Analysis and Mission Planning activities. The RAHM also provides risk analysis support for the Hanford 10-Year Plan development activities. The RAMS tool draws from a collection of specifically designed databases and modular risk analysis methodologies and models. RAMS is a flexible modular system that can be focused on targeted risk analysis needs. It is specifically designed to address risks associated with overall strategy, technical alternative, and `what if` questions regarding the Hanford cleanup mission. RAMS is set up to address both near-term and long-term risk issues. Consistency is very important for any comparative risk analysis, and RAMS is designed to efficiently and consistently compare risks and produce risk reduction estimates. There is a wide range of output information that can be generated by RAMS. These outputs can be detailed by individual contaminants, waste forms, transport pathways, exposure scenarios, individuals, populations, etc. However, they can also be in rolled-up form to support high-level strategy decisions.

  19. Timing Analysis of the FlexRay Communication Protocol

    DEFF Research Database (Denmark)

    Pop, Traian; Pop, Paul; Eles, Petru

    2006-01-01

    FlexRay will very likely become the de-facto standard for in-vehicle communications. However, before it can be successfully used for safety-critical applications that require predictability, timing analysis techniques are necessary for providing bounds for the message communication times....... In this paper, we propose techniques for determining the timing properties of messages transmitted in both the static (ST) and the dynamic (DYN) segments of a FlexRay communication cycle. The analysis techniques for messages are integrated in the context of a holistic schedulability analysis that computes...

  20. Upper Midwest Gap Analysis Program, Image Processing Protocol

    National Research Council Canada - National Science Library

    Lillesand, Thomas

    1998-01-01

    This document presents a series of technical guidelines by which land cover information is being extracted from Landsat Thematic Mapper data as part of the Upper Midwest Gap Analysis Program (UMGAP...

  1. Cost analysis of hybrid adaptive routing protocol for heterogeneous ...

    Indian Academy of Sciences (India)

    NONITA SHARMA

    Event detection; wireless sensor networks; hybrid routing; cost benefit analysis; proactive routing; reactive routing. 1. ... additional energy, high processing power, etc. are deployed to extend the .... transmit to its parent node. (2) Reactive ...

  2. Simple Public Key Infrastructure Protocol Analysis and Design

    National Research Council Canada - National Science Library

    Vidergar, Alexander G

    2005-01-01

    ...). This thesis aims at proving the applicability of the Simple Public Key Infrastructure (SPKI) as a means of PKC. The strand space approach of Guttman and Thayer is used to provide an appropriate model for analysis...

  3. A pilot audit of a protocol for ambulatory investigation of predicted low-risk patients with possible pulmonary embolism.

    Science.gov (United States)

    McDonald, A H; Murphy, R

    2011-09-01

    Patients with possible pulmonary embolism (PE) commonly present to acute medical services. Research has led to the identification of low-risk patients suitable for ambulatory management. We report on a protocol designed to select low-risk patients for ambulatory investigation if confirmatory imaging is not available that day. The protocol was piloted in the Emergency Department and Medical Assessment Area at the Royal Infirmary of Edinburgh. We retrospectively analysed electronic patient records in an open observational audit of all patients managed in the ambulatory arm over five months of use. We analysed 45 patients' records. Of these, 91.1% required imaging to confirm or refute PE, 62.2% received a computed tomography pulmonary angiogram (CTPA). In 25% of patients, PE was confirmed with musculoskeletal pain (22.7%), and respiratory tract infection (15.9%) the next most prevalent diagnoses. Alternative diagnoses was provided by CTPA in 32% of cases. We identified no adverse events or readmissions but individualised follow-up was not attempted. The data from this audit suggests this protocol can be applied to select and manage low-risk patients suitable for ambulatory investigation of possible PE. A larger prospective comparative study would be required to accurately define the safety and effectiveness of this protocol.

  4. Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol

    International Nuclear Information System (INIS)

    Hirota, Osamu

    2007-01-01

    There exists a great gap between one-time pad with perfect secrecy and conventional mathematical encryption. The Yuen 2000 (Y00) protocol or αη scheme may provide a protocol which covers from the conventional security to the ultimate one, depending on implementations. This paper presents the complexity-theoretic security analysis on some models of the Y00 protocol with nonlinear pseudo-random-number-generator and quantum noise diffusion mapping (QDM). Algebraic attacks and fast correlation attacks are applied with a model of the Y00 protocol with nonlinear filtering like the Toyocrypt stream cipher as the running key generator, and it is shown that these attacks in principle do not work on such models even when the mapping between running key and quantum state signal is fixed. In addition, a security property of the Y00 protocol with QDM is clarified. Consequently, we show that the Y00 protocol has a potential which cannot be realized by conventional cryptography and that it goes beyond mathematical encryption with physical encryption

  5. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  6. Streamlining project delivery through risk analysis.

    Science.gov (United States)

    2015-08-01

    Project delivery is a significant area of concern and is subject to several risks throughout Plan Development : Process (PDP). These risks are attributed to major areas of project development, such as environmental : analysis, right-of-way (ROW) acqu...

  7. Use of a predictive protocol to measure the antimicrobial resistance risks associated with biocidal product usage.

    Science.gov (United States)

    Wesgate, Rebecca; Grasha, Pierre; Maillard, Jean-Yves

    2016-04-01

    In this study we assessed the propensity of biocide exposure in the development of antimicrobial resistance in bacteria. Our protocol is based on reporting changes in established antimicrobial susceptibility profiles in biocides and antibiotics after during use exposure to a product. The during use exposure reflects worse conditions of product use during application. It differs from the term low concentration, which usually reflects a concentration below the minimal inhibitory concentration, but not necessarily a concentration that occurs in practice. Our results showed that exposure to triclosan (0.0004%) was associated with a high risk of developing resistance and cross-resistance in Staphylococcus aureus and Escherichia coli. This was not observed with exposure to chlorhexidine (0.00005%) or a hydrogen peroxide-based biocidal product (in during use conditions). Interestingly, exposure to a low concentration of hydrogen peroxide (0.001%) carried a risk of emerging resistance to antibiotics if the presence of the oxidizing agent was maintained. We observed a number of unstable clinical resistances to antibiotics after exposure to the cationic biocide and oxidizing agent, notably to tobramycin and ticarcillin-clavulanic acid. Using a decision tree based on the change in antimicrobial susceptibility test results, we were able to provide information on the effect of biocide exposure on the development of bacterial resistance to antimicrobials. Such information should address the call from the U.S. Food and Drug Administration and European Union Biocidal Products Regulation for manufacturers to provide information on antimicrobial resistance and cross-resistance in bacteria after the use of their product. Copyright © 2016 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  8. Mobility and increased risk of HIV acquisition in South Africa: a mixed-method systematic review protocol.

    Science.gov (United States)

    Dzomba, Armstrong; Govender, Kaymarlin; Mashamba-Thompson, Tivani P; Tanser, Frank

    2018-02-27

    In South Africa (home of the largest HIV epidemic globally), there are high levels of mobility. While studies produced in the recent past provide useful perspectives to the mobility-HIV risk linkage, systematic analyses are needed for in-depth understanding of the complex dynamics between mobility and HIV risk. We plan to undertake an evidence-based review of existing literature connecting mobility and increased risky sexual behavior as well as risk of HIV acquisition in South Africa. We will conduct a mixed-method systematic review of peer-reviewed studies published between 2000 and 2015. In particular, we will search for relevant South African studies from the following databases: MEDLINE, EMBASE, Web of Science, and J-STOR databases. Studies explicitly examining HIV and labor migration will be eligible for inclusion, while non-empirical work and other studies on key vulnerable populations such as commercial sex workers (CSW) and men who have sex with men (MSM) will be excluded. The proposed mixed-method systematic review will employ a three-phase sequential approach [i.e., (i) identifying relevant studies through data extraction (validated by use of Distiller-SR data management software), (ii) qualitative synthesis, and (iii) quantitative synthesis including meta-analysis data]. Recurrent ideas and conclusions from syntheses will be compiled into key themes and further processed into categories and sub-themes constituting the primary and secondary outcomes of this study. Synthesis of main findings from different studies examining the subject issue here may uncover important research gaps in this literature, laying a strong foundation for research and development of sustainable localized migrant-specific HIV prevention strategies in South Africa. Our protocol was registered with PROSPERO under registration number: CRD 42017055580. ( https://www.crd.york.ac.uk/PROSPERO/display_record.asp?ID=CRD42017055580 ).

  9. Suicide Risk Protocols: Addressing the Needs of High Risk Youths Identified through Suicide Prevention Efforts and in Clinical Settings

    Science.gov (United States)

    Heilbron, Nicole; Goldston, David; Walrath, Christine; Rodi, Michael; McKeon, Richard

    2013-01-01

    Several agencies have emphasized the importance of establishing clear protocols or procedures to address the needs of youths who are identified as suicidal through suicide prevention programs or in emergency department settings. What constitutes optimal guidelines for developing and implementing such protocols, however, is unclear. At the request…

  10. Performance Analysis of an Enhanced PRMA-HS Protocol for LEO Satellite Communication

    Institute of Scientific and Technical Information of China (English)

    ZHUO Yong-ning; YAN Shao-hu; WU Shi-qi

    2005-01-01

    The packet reservation multiple access with hindering state (PRMA-HS) is a protocol suitable for LEO satellite mobile communication. Although working well with light system payload (amount of user terminals), the protocol imposes high channel congestion on system with heavy payload, thus degrades the system's quality of service. To controlling the channel congestion, a scheme of enhanced PRMA-HS protocol is proposed, which aims to reduce the collision of voice packets by adopting a mechanism of access control. Through theoretic analysis, the system's mathematic model is presented and the packet drop probability of the scheme is deduced. To testify the performance of the scheme, a simulation is performed and the results support our analysis.

  11. Understanding context in knowledge translation: a concept analysis study protocol.

    Science.gov (United States)

    Squires, Janet E; Graham, Ian D; Hutchinson, Alison M; Linklater, Stefanie; Brehaut, Jamie C; Curran, Janet; Ivers, Noah; Lavis, John N; Michie, Susan; Sales, Anne E; Fiander, Michelle; Fenton, Shannon; Noseworthy, Thomas; Vine, Jocelyn; Grimshaw, Jeremy M

    2015-05-01

    To conduct a concept analysis of clinical practice contexts (work environments) that facilitate or militate against the uptake of research evidence by healthcare professionals in clinical practice. This will involve developing a clear definition of context by describing its features, domains and defining characteristics. The context where clinical care is delivered influences that care. While research shows that context is important to knowledge translation (implementation), we lack conceptual clarity on what is context, which contextual factors probably modify the effect of knowledge translation interventions (and hence should be considered when designing interventions) and which contextual factors themselves could be targeted as part of a knowledge translation intervention (context modification). Concept analysis. The Walker and Avant concept analysis method, comprised of eight systematic steps, will be used: (1) concept selection; (2) determination of aims; (3) identification of uses of context; (4) determination of defining attributes of context; (5) identification/construction of a model case of context; (6) identification/construction of additional cases of context; (7) identification/construction of antecedents and consequences of context; and (8) definition of empirical referents of context. This study is funded by the Canadian Institutes of Health Research (January 2014). This study will result in a much needed framework of context for knowledge translation, which identifies specific elements that, if assessed and used to tailor knowledge translation activities, will result in increased research use by nurses and other healthcare professionals in clinical practice, ultimately leading to better patient care. © 2014 John Wiley & Sons Ltd.

  12. Complementary feeding and the early origins of obesity risk: a study protocol

    OpenAIRE

    Muniandy, Naleena Devi; Allotey, Pascale A; Soyiri, Ireneous N; Reidpath, Daniel D

    2016-01-01

    Introduction The rise in the prevalence of childhood obesity worldwide calls for an intervention earlier in the life cycle. Studies show that nutrition during early infancy may contribute to later obesity. Hence, this study is designed to determine if the variation in complementary feeding practices poses a risk for the development of obesity later in life. A mixed methods approach will be used in conducting this study. Methods and analysis The target participants are infants born from Januar...

  13. A systematic review protocol: social network analysis of tobacco use.

    Science.gov (United States)

    Maddox, Raglan; Davey, Rachel; Lovett, Ray; van der Sterren, Anke; Corbett, Joan; Cochrane, Tom

    2014-08-08

    Tobacco use is the single most preventable cause of death in the world. Evidence indicates that behaviours such as tobacco use can influence social networks, and that social network structures can influence behaviours. Social network analysis provides a set of analytic tools to undertake methodical analysis of social networks. We will undertake a systematic review to provide a comprehensive synthesis of the literature regarding social network analysis and tobacco use. The review will answer the following research questions: among participants who use tobacco, does social network structure/position influence tobacco use? Does tobacco use influence peer selection? Does peer selection influence tobacco use? We will follow the Preferred Reporting Items for Systemic Reviews and Meta-Analyses (PRISMA) guidelines and search the following databases for relevant articles: CINAHL (Cumulative Index to Nursing and Allied Health Literature); Informit Health Collection; PsycINFO; PubMed/MEDLINE; Scopus/Embase; Web of Science; and the Wiley Online Library. Keywords include tobacco; smoking; smokeless; cigarettes; cigar and 'social network' and reference lists of included articles will be hand searched. Studies will be included that provide descriptions of social network analysis of tobacco use.Qualitative, quantitative and mixed method data that meets the inclusion criteria for the review, including methodological rigour, credibility and quality standards, will be synthesized using narrative synthesis. Results will be presented using outcome statistics that address each of the research questions. This systematic review will provide a timely evidence base on the role of social network analysis of tobacco use, forming a basis for future research, policy and practice in this area. This systematic review will synthesise the evidence, supporting the hypothesis that social network structures can influence tobacco use. This will also include exploring the relationship between social

  14. A National Surveillance Survey on Noncommunicable Disease Risk Factors: Suriname Health Study Protocol

    Science.gov (United States)

    Smits, Christel CF; Jaddoe, Vincent WV; Hofman, Albert; Toelsie, Jerry R

    2015-01-01

    Background Noncommunicable diseases (NCDs) are the leading cause of death in low- and middle-income countries. Therefore, the surveillance of risk factors has become an issue of major importance for planning and implementation of preventive measures. Unfortunately, in these countries data on NCDs and their risk factors are limited. This also prevails in Suriname, a middle-income country of the Caribbean, with a multiethnic/multicultural population living in diverse residential areas. For these reasons, “The Suriname Health Study” was designed. Objective The main objective of this study is to estimate the prevalence of NCD risk factors, including metabolic syndrome, hypertension, and diabetes in Suriname. Differences between specific age groups, sexes, ethnic groups, and geographical areas will be emphasized. In addition, risk groups will be identified and targeted actions will be designed and evaluated. Methods In this study, several methodologies were combined. A stratified multistage cluster sample was used to select the participants of 6 ethnic groups (Hindustani, Creole, Javanese, Maroon, Chinese, Amerindians, and mixed) divided into 5 age groups (between 15 and 65 years) who live in urban/rural areas or the hinterland. A standardized World Health Organization STEPwise approach to surveillance questionnaire was adapted and used to obtain information about demographic characteristics, lifestyle, and risk factors. Physical examinations were performed to measure blood pressure, height, weight, and waist circumference. Biochemical analysis of collected blood samples evaluated the levels of glucose, high-density-lipoprotein cholesterol, total cholesterol, and triglycerides. Statistical analysis will be used to identify the burden of modifiable and unmodifiable risk factors in the aforementioned subgroups. Subsequently, tailor-made interventions will be prepared and their effects will be evaluated. Results The data as collected allow for national inference and

  15. A simple protocol for NMR analysis of the enantiomeric purity of chiral hydroxylamines.

    Science.gov (United States)

    Tickell, David A; Mahon, Mary F; Bull, Steven D; James, Tony D

    2013-02-15

    A practically simple three-component chiral derivatization protocol for determining the enantiopurity of chiral hydroxylamines by (1)H NMR spectroscopic analysis is described, involving their treatment with 2-formylphenylboronic acid and enantiopure BINOL to afford a mixture of diastereomeric nitrono-boronate esters whose ratio is an accurate reflection of the enantiopurity of the parent hydroxylamine.

  16. Protocol Analysis of Group Problem Solving in Mathematics: A Cognitive-Metacognitive Framework for Assessment.

    Science.gov (United States)

    Artzt, Alice F.; Armour-Thomas, Eleanor

    The roles of cognition and metacognition were examined in the mathematical problem-solving behaviors of students as they worked in small groups. As an outcome, a framework that links the literature of cognitive science and mathematical problem solving was developed for protocol analysis of mathematical problem solving. Within this framework, each…

  17. A Concise Protocol for the Validation of Language ENvironment Analysis (LENA) Conversational Turn Counts in Vietnamese

    Science.gov (United States)

    Ganek, Hillary V.; Eriks-Brophy, Alice

    2018-01-01

    The aim of this study was to present a protocol for the validation of the Language ENvironment Analysis (LENA) System's conversational turn count (CTC) for Vietnamese speakers. Ten families of children aged between 22 and 42 months, recruited near Ho Chi Minh City, participated in this project. Each child wore the LENA audio recorder for a full…

  18. Analysis of MD5 authentication in various routing protocols using simulation tools

    Science.gov (United States)

    Dinakaran, M.; Darshan, K. N.; Patel, Harsh

    2017-11-01

    Authentication being an important paradigm of security and Computer Networks require secure paths to make the flow of the data even more secure through some security protocols. So MD-5(Message Digest 5) helps in providing data integrity to the data being sent through it and authentication to the network devices. This paper gives a brief introduction to the MD-5, simulation of the networks by including MD-5 authentication using various routing protocols like OSPF, EIGRP and RIPv2. GNS3 is being used to simulate the scenarios. Analysis of the MD-5 authentication is done in the later sections of the paper.

  19. Optimization of oligonucleotide arrays and RNA amplification protocols for analysis of transcript structure and alternative splicing.

    Science.gov (United States)

    Castle, John; Garrett-Engele, Phil; Armour, Christopher D; Duenwald, Sven J; Loerch, Patrick M; Meyer, Michael R; Schadt, Eric E; Stoughton, Roland; Parrish, Mark L; Shoemaker, Daniel D; Johnson, Jason M

    2003-01-01

    Microarrays offer a high-resolution means for monitoring pre-mRNA splicing on a genomic scale. We have developed a novel, unbiased amplification protocol that permits labeling of entire transcripts. Also, hybridization conditions, probe characteristics, and analysis algorithms were optimized for detection of exons, exon-intron edges, and exon junctions. These optimized protocols can be used to detect small variations and isoform mixtures, map the tissue specificity of known human alternative isoforms, and provide a robust, scalable platform for high-throughput discovery of alternative splicing.

  20. Allowing Students to Select Deliverables for Peer Review: Analysis of a Free-Selection Protocol

    DEFF Research Database (Denmark)

    Papadopoulos, Pantelis M.; Lagkas, Thomas; Demetriadis, Stavros

    2011-01-01

    This study analyzes the benefits and limitations of a “free-selection” peer assignment protocol by comparing them to the widely implemented “assigned-pair” protocol. The primary motivation was to circumvent the issues that often appear to the instructors implementing peer review activities with pre......-Selection, where students were able to explore and select peer work for review. Result analysis showed a very strong tendency in favor of the Free-Selection students regarding both domain specific (conceptual) and domain-general (reviewing) knowledge....

  1. Risk analysis and safety rationale

    International Nuclear Information System (INIS)

    Bengtsson, G.

    1989-01-01

    Decision making with respect to safety is becoming more and more complex. The risk involved must be taken into account together with numerous other factors such as the benefits, the uncertainties and the public perception. Can the decision maker be aided by some kind of system, general rules of thumb, or broader perspective on similar decisions? This question has been addressed in a joint Nordic project relating to nuclear power. Modern techniques for risk assessment and management have been studied, and parallels drawn to such areas as offshore safety and management of toxic chemicals in the environment. The report summarises the finding of 5 major technical reports which have been published in the NORD-series. The topics includes developments, uncertainties and limitations in probabilistic safety assessments, negligible risks, risk-cost trade-offs, optimisation of nuclear safety and radiation protection, and the role of risks in the decision making process. (author) 84 refs

  2. DreamTel; Diabetes risk evaluation and management tele-monitoring study protocol.

    Science.gov (United States)

    Tobe, Sheldon W; Wentworth, Joan; Ironstand, Laurie; Hartman, Susan; Hoppe, Jackie; Whiting, Judi; Kennedy, Janice; McAllister, Colin; Kiss, Alex; Perkins, Nancy; Vincent, Lloyd; Pylypchuk, George; Lewanczuk, Richard Z

    2009-05-09

    The rising prevalence of type 2 diabetes underlines the importance of secondary strategies for the prevention of target organ damage. While access to diabetes education centers and diabetes intensification management has been shown to improve blood glucose control, these services are not available to all that require them, particularly in rural and northern areas. The provision of these services through the Home Care team is an advance that can overcome these barriers. Transfer of blood glucose data electronically from the home to the health care provider may improve diabetes management. The study population will consist of patients with type 2 diabetes with uncontrolled A1c levels living on reserve in the Battlefords region of Saskatchewan, Canada. This pilot study will take place over three phases. In the first phase over three months the impact of the introduction of the Bluetooth enabled glucose monitor will be assessed. In the second phase over three months, the development of guidelines based treatment algorithms for diabetes intensification will be completed. In the third phase lasting 18 months, study subjects will have diabetes intensification according to the algorithms developed. The first phase will determine if the use of the Bluetooth enabled blood glucose devices which can transmit results electronically will lead to changes in A1c levels. It will also determine the feasibility of recruiting subjects to use this technology. The rest of the Diabetes Risk Evaluation and Management Tele-monitoring (DreamTel) study will determine if the delivery of a diabetes intensification management program by the Home Care team supported by the Bluetooth enabled glucose meters leads to improvements in diabetes management. Protocol NCT00325624.

  3. DreamTel; Diabetes risk evaluation and management tele-monitoring study protocol

    Directory of Open Access Journals (Sweden)

    Kiss Alex

    2009-05-01

    Full Text Available Abstract Background The rising prevalence of type 2 diabetes underlines the importance of secondary strategies for the prevention of target organ damage. While access to diabetes education centers and diabetes intensification management has been shown to improve blood glucose control, these services are not available to all that require them, particularly in rural and northern areas. The provision of these services through the Home Care team is an advance that can overcome these barriers. Transfer of blood glucose data electronically from the home to the health care provider may improve diabetes management. Methods and design The study population will consist of patients with type 2 diabetes with uncontrolled A1c levels living on reserve in the Battlefords region of Saskatchewan, Canada. This pilot study will take place over three phases. In the first phase over three months the impact of the introduction of the Bluetooth enabled glucose monitor will be assessed. In the second phase over three months, the development of guidelines based treatment algorithms for diabetes intensification will be completed. In the third phase lasting 18 months, study subjects will have diabetes intensification according to the algorithms developed. Discussion The first phase will determine if the use of the Bluetooth enabled blood glucose devices which can transmit results electronically will lead to changes in A1c levels. It will also determine the feasibility of recruiting subjects to use this technology. The rest of the Diabetes Risk Evaluation and Management Tele-monitoring (DreamTel study will determine if the delivery of a diabetes intensification management program by the Home Care team supported by the Bluetooth enabled glucose meters leads to improvements in diabetes management. Trial Registration Protocol NCT00325624

  4. A background to risk analysis. Vol. 2

    International Nuclear Information System (INIS)

    Taylor, J.R.

    1979-01-01

    This 4-volumes report gives a background of ideas, principles and examples which might be of use in developing practical methods for risk analysis. Some of the risk analysis techniques described are somewhat experimental. The report is written in an introductory style, but where some point needs further justification or evaluation, this is given in the form of a chapter appendix. In this way, it is hoped that the report can serve two purposes, - as a basis for starting risk analysis work and as a basis for discussing effectiveness of risk analysis procedures. The report should be seen as a preliminary stage, prior to a program of industrial trials of risk analysis methods. Vol. 2 treats generic methods of qualitative failure analysis. (BP)

  5. Risk Analysis of Telecom Enterprise Financing

    Institute of Scientific and Technical Information of China (English)

    YU Hua; SHU Hua-ying

    2005-01-01

    The main research objects in this paper are the causes searching and risk estimating method for telecom enterprises' financial risks. The multi-mode financing for telecom enterprises makes it flexible to induce the capital and obtain the profit by corresponding projects. But there are also potential risks going with these financing modes. After making analysis of categories and causes of telecom enterprises' financing risk, a method by Analytic Hierarchy Process (AHP) is put forward to estimating the financing risk. And the author makes her suggestion and opinion by example analysis, in order to provide some ideas and basis for telecom enterprise's financing decision-making.

  6. Protocol for Microplastics Sampling on the Sea Surface and Sample Analysis

    Science.gov (United States)

    Kovač Viršek, Manca; Palatinus, Andreja; Koren, Špela; Peterlin, Monika; Horvat, Petra; Kržan, Andrej

    2016-01-01

    Microplastic pollution in the marine environment is a scientific topic that has received increasing attention over the last decade. The majority of scientific publications address microplastic pollution of the sea surface. The protocol below describes the methodology for sampling, sample preparation, separation and chemical identification of microplastic particles. A manta net fixed on an »A frame« attached to the side of the vessel was used for sampling. Microplastic particles caught in the cod end of the net were separated from samples by visual identification and use of stereomicroscopes. Particles were analyzed for their size using an image analysis program and for their chemical structure using ATR-FTIR and micro FTIR spectroscopy. The described protocol is in line with recommendations for microplastics monitoring published by the Marine Strategy Framework Directive (MSFD) Technical Subgroup on Marine Litter. This written protocol with video guide will support the work of researchers that deal with microplastics monitoring all over the world. PMID:28060297

  7. Security analysis of standards-driven communication protocols for healthcare scenarios.

    Science.gov (United States)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  8. PRA and Risk Informed Analysis

    International Nuclear Information System (INIS)

    Bernsen, Sidney A.; Simonen, Fredric A.; Balkey, Kenneth R.

    2006-01-01

    The Boiler and Pressure Vessel Code (BPVC) of the American Society of Mechanical Engineers (ASME) has introduced a risk based approach into Section XI that covers Rules for Inservice Inspection of Nuclear Power Plant Components. The risk based approach requires application of the probabilistic risk assessments (PRA). Because no industry consensus standard existed for PRAs, ASME has developed a standard to evaluate the quality level of an available PRA needed to support a given risk based application. The paper describes the PRA standard, Section XI application of PRAs, and plans for broader applications of PRAs to other ASME nuclear codes and standards. The paper addresses several specific topics of interest to Section XI. Important consideration are special methods (surrogate components) used to overcome the lack of PRA treatments of passive components in PRAs. The approach allows calculations of conditional core damage probabilities both for component failures that cause initiating events and failures in standby systems that decrease the availability of these systems. The paper relates the explicit risk based methods of the new Section XI code cases to the implicit consideration of risk used in the development of Section XI. Other topics include the needed interactions of ISI engineers, plant operating staff, PRA specialists, and members of expert panels that review the risk based programs

  9. Advances in Risk Analysis with Big Data.

    Science.gov (United States)

    Choi, Tsan-Ming; Lambert, James H

    2017-08-01

    With cloud computing, Internet-of-things, wireless sensors, social media, fast storage and retrieval, etc., organizations and enterprises have access to unprecedented amounts and varieties of data. Current risk analysis methodology and applications are experiencing related advances and breakthroughs. For example, highway operations data are readily available, and making use of them reduces risks of traffic crashes and travel delays. Massive data of financial and enterprise systems support decision making under risk by individuals, industries, regulators, etc. In this introductory article, we first discuss the meaning of big data for risk analysis. We then examine recent advances in risk analysis with big data in several topic areas. For each area, we identify and introduce the relevant articles that are featured in the special issue. We conclude with a discussion on future research opportunities. © 2017 Society for Risk Analysis.

  10. 38 CFR 75.115 - Risk analysis.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Risk analysis. 75.115 Section 75.115 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS (CONTINUED) INFORMATION SECURITY MATTERS Data Breaches § 75.115 Risk analysis. If a data breach involving sensitive personal information that is processed or...

  11. A background to risk analysis. Vol. 4

    International Nuclear Information System (INIS)

    Taylor, J.R.

    1979-01-01

    This 4-volumes report gives a background of ideas, principles, and examples which might be of use in developing practical methods for risk analysis. Some of the risk analysis techniques described are somewhat experimental. The report is written in an introductory style, but where some point needs further justification or evaluation, this is given in the form of a chapter appendix. In this way, it is hoped that the report can serve two purposes, - as a basis for starting risk analysis work and as a basis for discussing effectiveness of risk analysis procedures. The report should be seen as a preliminary stage, prior to a program of industrial trials of risk analysis methods. Vol. 4 treats human error in plant operation. (BP)

  12. Reliability and validity of risk analysis

    International Nuclear Information System (INIS)

    Aven, Terje; Heide, Bjornar

    2009-01-01

    In this paper we investigate to what extent risk analysis meets the scientific quality requirements of reliability and validity. We distinguish between two types of approaches within risk analysis, relative frequency-based approaches and Bayesian approaches. The former category includes both traditional statistical inference methods and the so-called probability of frequency approach. Depending on the risk analysis approach, the aim of the analysis is different, the results are presented in different ways and consequently the meaning of the concepts reliability and validity are not the same.

  13. iLAP: a workflow-driven software for experimental protocol development, data acquisition and analysis

    Directory of Open Access Journals (Sweden)

    McNally James

    2009-01-01

    Full Text Available Abstract Background In recent years, the genome biology community has expended considerable effort to confront the challenges of managing heterogeneous data in a structured and organized way and developed laboratory information management systems (LIMS for both raw and processed data. On the other hand, electronic notebooks were developed to record and manage scientific data, and facilitate data-sharing. Software which enables both, management of large datasets and digital recording of laboratory procedures would serve a real need in laboratories using medium and high-throughput techniques. Results We have developed iLAP (Laboratory data management, Analysis, and Protocol development, a workflow-driven information management system specifically designed to create and manage experimental protocols, and to analyze and share laboratory data. The system combines experimental protocol development, wizard-based data acquisition, and high-throughput data analysis into a single, integrated system. We demonstrate the power and the flexibility of the platform using a microscopy case study based on a combinatorial multiple fluorescence in situ hybridization (m-FISH protocol and 3D-image reconstruction. iLAP is freely available under the open source license AGPL from http://genome.tugraz.at/iLAP/. Conclusion iLAP is a flexible and versatile information management system, which has the potential to close the gap between electronic notebooks and LIMS and can therefore be of great value for a broad scientific community.

  14. [Professional divers: analysis of critical issues and proposal of a health protocol for work fitness].

    Science.gov (United States)

    Pedata, Paola; Corvino, Anna Rita; Napolitano, Raffaele Carmine; Garzillo, Elpidio Maria; Furfaro, Ciro; Lamberti, Monica

    2016-01-20

    From many years now, thanks to the development of modern diving techniques, there has been a rapid spread of diving activities everywhere. In fact, divers are ever more numerous both among the Armed Forces and civilians who dive for work, like fishing, biological research and archeology. The aim of the study was to propose a health protocol for work fitness of professional divers keeping in mind the peculiar work activity, existing Italian legislation that is almost out of date and the technical and scientific evolution in this occupational field. We performed an analysis of the most frequently occurring diseases among professional divers and of the clinical investigation and imaging techniques used for work fitness assessment of professional divers. From analysis of the health protocol recommended by D.M. 13 January 1979 (Ministerial Decree), that is most used by occupational health physician, several critical issues emerged. Very often the clinical investigation and imaging techniques still used are almost obsolete, ignoring the execution of simple and inexpensive investigations that are more useful for work fitness assessment. Considering the out-dated legislation concerning diving disciplines, it is necessary to draw up a common health protocol that takes into account clinical and scientific knowledge and skills acquired in this area. This protocol's aim is to propose a useful tool for occupational health physicians who work in this sector.

  15. Correlation dimension based nonlinear analysis of network traffics with different application protocols

    International Nuclear Information System (INIS)

    Wang Jun-Song; Yuan Jing; Li Qiang; Yuan Rui-Xi

    2011-01-01

    This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols—HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic, furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components. (general)

  16. Probabilistic risk analysis for nuclear power plants

    International Nuclear Information System (INIS)

    Hauptmanns, U.

    1988-01-01

    Risk analysis is applied if the calculation of risk from observed failures is not possible, because events contributing substantially to risk are too seldom, as in the case of nuclear reactors. The process of analysis provides a number of benefits. Some of them are listed. After this by no means complete enumeration of possible benefits to be derived from a risk analysis. An outline of risk studiesd for PWR's with some comments on the models used are given. The presentation is indebted to the detailed treatment of the subject given in the PRA Procedures Guide. Thereafter some results of the German Risk Study, Phase B, which is under way are communicated. The paper concludes with some remarks on probabilistic considerations in licensing procedures. (orig./DG)

  17. Sensitivity Analysis of Per-Protocol Time-to-Event Treatment Efficacy in Randomized Clinical Trials

    Science.gov (United States)

    Gilbert, Peter B.; Shepherd, Bryan E.; Hudgens, Michael G.

    2013-01-01

    Summary Assessing per-protocol treatment effcacy on a time-to-event endpoint is a common objective of randomized clinical trials. The typical analysis uses the same method employed for the intention-to-treat analysis (e.g., standard survival analysis) applied to the subgroup meeting protocol adherence criteria. However, due to potential post-randomization selection bias, this analysis may mislead about treatment efficacy. Moreover, while there is extensive literature on methods for assessing causal treatment effects in compliers, these methods do not apply to a common class of trials where a) the primary objective compares survival curves, b) it is inconceivable to assign participants to be adherent and event-free before adherence is measured, and c) the exclusion restriction assumption fails to hold. HIV vaccine efficacy trials including the recent RV144 trial exemplify this class, because many primary endpoints (e.g., HIV infections) occur before adherence is measured, and nonadherent subjects who receive some of the planned immunizations may be partially protected. Therefore, we develop methods for assessing per-protocol treatment efficacy for this problem class, considering three causal estimands of interest. Because these estimands are not identifiable from the observable data, we develop nonparametric bounds and semiparametric sensitivity analysis methods that yield estimated ignorance and uncertainty intervals. The methods are applied to RV144. PMID:24187408

  18. Bias in risk-benefit analysis

    International Nuclear Information System (INIS)

    Mazur, A.

    1985-01-01

    Risk-benefit analysis has become popular in the past decade as a means of improving decision making, especially in the area of technology policy. Here risk-benefit analysis is compared to other (equally defensible) approaches to decision making, showing how it favors some political interests more than others, and suggesting why it has recently come to the fore as a tool of political analysis. A considerable portion of the discussion concerns nuclear power. 6 references

  19. Clinical trials of CCLSG L874 and I874 protocols without cranial irradiation for standard-risk acute lymphoblastic leukemia in childhood

    International Nuclear Information System (INIS)

    Koizumi, Shoichi; Fujimoto, Takeo; Tsurusawa, Masahito

    1992-01-01

    In the CCLSG-874 protocol for children with low-risk (LR) and intermediate-risk (IR) acute lymphoblastic leukemia (ALL), two regimens with or without cranial irradiation (CI) were compared with respect to their ability to prevent central nervous system (CNS) leukemia and to improve overall outcome of ALL. From 1987 to 1990, 82 and 109 evaluable patients were registered into L874 and I874 protocols for LR and IR patients, respectively. All responders to induction therapy were randomized to treatment with 18 Gy of CI plus intrathecal methotrexate (MTX it) or to treatment with high-dose MTX plus MTX it. Patients were then treated with standard maintenance regimens of L874 and I874. At a median follow-up of 39 months (range 14-58 months) there was no difference in the rate of hematologic relapse between the CI group and MTX group. The rate of CNS relapse in the MTX group seemed to be higher (3 of 39 in L874 and 2 of 54 in I874) than that in the CI group (1 of 43 in L874 and 0 of 55 in I874), but these data were not statistically significant. The rates of 4-year event-free survival (EFS) in L874 were 81.1±7.6% (mean±SE) and 75.2±7.9% (ns) for the CI and MTX group, respectively, and the rates of EFS in I874 were 70.0±13.6% and 70.0±9.0% (ns) for the CI and MTX group, respectively. These data suggest that MTX alone may be as effective as CI to prolong disease-free survival in LR and IR ALL although further continuous studies are needed. Analysis of serial CCLSG protocols for ALL from 1981 revealed that the rate of EFS of ALL allover including all risk groups has gradually been increasing from 44.2±3.6% for 811 protocol and 53.1±3.5% for 841 to 65.5±3.6% for the present 874 protocol. (author)

  20. Collision Risk Analysis for HSC

    DEFF Research Database (Denmark)

    Urban, Jesper; Pedersen, Preben Terndrup; Simonsen, Bo Cerup

    1999-01-01

    High Speed Craft (HSC) have a risk profile, which is distinctly different from conventional ferries. Due to different hull building material, structural layout, compartmentation and operation, both frequency and consequences of collision and grounding accidents must be expected to be different fr...

  1. Generalized indices for radiation risk analysis

    International Nuclear Information System (INIS)

    Bykov, A.A.; Demin, V.F.

    1989-01-01

    A new approach to ensuring nuclear safety has begun forming since the early eighties. The approach based on the probabilistic safety analysis, the principles of acceptable risk, the optimization of safety measures, etc. has forced a complex of adequate quantitative methods of assessment, safety analysis and risk management to be developed. The method of radiation risk assessment and analysis hold a prominent place in the complex. National and international research and regulatory organizations ICRP, IAEA, WHO, UNSCEAR, OECD/NEA have given much attention to the development of the conceptual and methodological basis of those methods. Some resolutions of the National Commission of Radiological Protection (NCRP) and the Problem Commission on Radiation Hygiene of the USSR Ministry of Health should be also noted. Both CBA (cost benefit analysis) and other methods of radiation risk analysis and safety management use a system of natural and socio-economic indices characterizing the radiation risk or damage. There exist a number of problems associated with the introduction, justification and use of these indices. For example, the price, a, of radiation damage, or collective dose unit, is a noteworthy index. The difficulties in its qualitative and quantitative determination are still an obstacle for a wide application of CBA to the radiation risk analysis and management. During recent 10-15 years these problems have been a subject of consideration for many authors. The present paper also considers the issues of the qualitative and quantitative justification of the indices of radiation risk analysis

  2. The Intergovernmental Marine Bioenergy and Carbon Sequestration Protocol: Environmental and Political Risk Reduction of Global Carbon Management (The IMBECS Protocol Draft)

    Science.gov (United States)

    Hayes, M.

    2014-12-01

    The IMBECS Protocol concept employs large cultivation and biorefinery installations, within the five Subtropical Convergence Zones (STCZs), to support the production of commodities such as carbon negative biofuels, seafood, organic fertilizer, polymers and freshwater, as a flexible and cost effective means of Global Warming Mitigation (GWM) with the primary objective being the global scale replacement of fossil fuels (FF). This governance approach is categorically distinct from all other large scale GWM governance concepts. Yet, many of the current marine related GWM technologies are adaptable to this proposals. The IMBECS technology would be managed by an intergovernmentally sanctioned non-profit foundation which would have the following functions/mission: Synthesises relevant treaty language Performs R&D activities and purchases relevant patents Under intergovernmental commission, functions as the primary responsible international actorfor environmental standards, production quotas and operational integrity Licence technology to for-profit actors under strict production/environmental standards Enforce production and environmental standards along with production quotas Provide a high level of transparency to all stakeholders Provide legal defence The IMBECS Protocol is conceptually related to the work found in the following documents/links. This list is not exhaustive: Climate Change Geoengineering The Science and Politics of Global Climate Change: A guide to the debate IPCC Special Report on Renewable Energy and Climate Change Mitigation DoE Roadmap for Algae Biofuels PodEnergy Ocean Agronomy development leaders and progenitor of this proposal. Artificial Upwelling of Deep Seawater Using the Perpetual Salt Fountain for Cultivation of Ocean Desert NASAs' OMEGA study. Cool Planet; Land based version of a carbon negative biofuel concept. Cellana; Leading developer of algae based bioproducts. The State of World Fisheries and Aquaculture Mariculture: A global analysis

  3. Radiation risk statement in the participant information for a research protocol that involves exposure to ionising radiation

    International Nuclear Information System (INIS)

    Caon, Martin

    2005-01-01

    A Human Research Ethics Committee (HREC) is required to scrutinise the protocols of clinical drug trials that recruit patients as participants. If the study involves exposing the participants to ionizing radiation the information provided to the participant should contain a radiation risk statement that is understandable by the Committee and the participant. The information that should be included in the risk statement is available from a variety of published sources and is discussed. The ARPANSA Code of Practice Exposure of Humans to Ionizing Radiation for Research Purposes (2005) states explicitly what the responsibilities of the researcher and the HREC are. Some research protocols do not provide the information required by good radiation protection practice and explicitly called for by the Code. Nine points (including: state that ionizing radiation is involved; that the radiation is additional to standard care; the effective dose to be received; the dose compared to natural background; the dose to the most exposed organs; a statement of risk; the benefits accruing from the exposure; ask the participant about previous exposures; name a contact person from whom information may be sought) that should be considered for inclusion in the participant information are presented and discussed. An example of a radiation risk statement is provided

  4. Caries risk assessment tool and prevention protocol for public health nurses in mother and child health centers, Israel.

    Science.gov (United States)

    Natapov, Lena; Dekel-Markovich, Dan; Granit-Palmon, Hadas; Aflalo, Efrat; Zusman, Shlomo Paul

    2018-01-01

    Dental caries is the most prevalent chronic disease in children. Caries risk assessment tools enable the dentists, physicians, and nondental health care providers to assess the individual's risk. Intervention by nurses in primary care settings can contribute to the establishment of oral health habits and prevention of dental disease. In Israel, Mother and Child Health Centers provide free preventive services for pregnant women and children by public health nurses. A caries prevention program in health centers started in 2015. Nurses underwent special training regarding caries prevention. A customized Caries Risk Assessment tool and Prevention Protocol for nurses, based on the AAPD tool, was introduced. A two-step evaluation was conducted which included a questionnaire and in-depth phone interviews. Twenty-eight (out of 46) health centers returned a completed questionnaire. Most nurses believed that oral health preventive services should be incorporated into their daily work. In the in-depth phone interviews, nurses stated that the integration of the program into their busy daily schedule was realistic and appropriate. The lack of specific dental module for computer program was mentioned as an implementation difficulty. The wide use of our tool by nurses supports its simplicity and feasibility which enables quick calculation and informed decision making. The nurses readily embraced the tool and it became an integral part of their toolkit. We provide public health nurses with a caries risk assessment tool and prevention protocol thus integrating oral health into general health of infants and toddlers. © 2017 Wiley Periodicals, Inc.

  5. Safety analysis, risk assessment, and risk acceptance criteria

    International Nuclear Information System (INIS)

    Jamali, K.

    1997-01-01

    This paper discusses a number of topics that relate safety analysis as documented in the Department of Energy (DOE) safety analysis reports (SARs), probabilistic risk assessments (PRA) as characterized primarily in the context of the techniques that have assumed some level of formality in commercial nuclear power plant applications, and risk acceptance criteria as an outgrowth of PRA applications. DOE SARs of interest are those that are prepared for DOE facilities under DOE Order 5480.23 and the implementing guidance in DOE STD-3009-94. It must be noted that the primary area of application for DOE STD-3009 is existing DOE facilities and that certain modifications of the STD-3009 approach are necessary in SARs for new facilities. Moreover, it is the hazard analysis (HA) and accident analysis (AA) portions of these SARs that are relevant to the present discussions. Although PRAs can be qualitative in nature, PRA as used in this paper refers more generally to all quantitative risk assessments and their underlying methods. HA as used in this paper refers more generally to all qualitative risk assessments and their underlying methods that have been in use in hazardous facilities other than nuclear power plants. This discussion includes both quantitative and qualitative risk assessment methods. PRA has been used, improved, developed, and refined since the Reactor Safety Study (WASH-1400) was published in 1975 by the Nuclear Regulatory Commission (NRC). Much debate has ensued since WASH-1400 on exactly what the role of PRA should be in plant design, reactor licensing, 'ensuring' plant and process safety, and a large number of other decisions that must be made for potentially hazardous activities. Of particular interest in this area is whether the risks quantified using PRA should be compared with numerical risk acceptance criteria (RACs) to determine whether a facility is 'safe.' Use of RACs requires quantitative estimates of consequence frequency and magnitude

  6. Targeted agents for patients with advanced/metastatic pancreatic cancer: A protocol for systematic review and network meta-analysis.

    Science.gov (United States)

    Di, Baoshan; Pan, Bei; Ge, Long; Ma, Jichun; Wu, Yiting; Guo, Tiankang

    2018-03-01

    Pancreatic cancer (PC) is a devastating malignant tumor. Although surgical resection may offer a good prognosis and prolong survival, approximately 80% patients with PC are always diagnosed as unresectable tumor. National Comprehensive Cancer Network's (NCCN) recommended gemcitabine-based chemotherapy as efficient treatment. While, according to recent studies, targeted agents might be a better available option for advanced or metastatic pancreatic cancer patients. The aim of this systematic review and network meta-analysis will be to examine the differences of different targeted interventions for advanced/metastatic PC patients. We will conduct this systematic review and network meta-analysis using Bayesian method and according to Preferred Reporting Items for Systematic review and Meta-Analysis Protocols (PRISMA-P) statement. To identify relevant studies, 6 electronic databases including PubMed, EMBASE, the Cochrane Central Register of Controlled Trials (CENTRAL), Web of science, CNKI (Chinese National Knowledge Infrastructure), and CBM (Chinese Biological Medical Database) will be searched. The risk of bias in included randomized controlled trials (RCTs) will be assessed using the Cochrane Handbook version 5.1.0. And we will use GRADE approach to assess the quality of evidence from network meta-analysis. Data will be analyzed using R 3.4.1 software. To the best of our knowledge, this systematic review and network meta-analysis will firstly use both direct and indirect evidence to compare the differences of different targeted agents and targeted agents plus chemotherapy for advanced/metastatic pancreatic cancer patients. This is a protocol of systematic review and meta-analysis, so the ethical approval and patient consent are not required. We will disseminate the results of this review by submitting to a peer-reviewed journal.

  7. Modelling and analysis of distributed simulation protocols with distributed graph transformation

    OpenAIRE

    Lara, Juan de; Taentzer, Gabriele

    2005-01-01

    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. J. de Lara, and G. Taentzer, "Modelling and analysis of distributed simulation protocols with distributed graph transformation...

  8. An improved method of studying user-system interaction by combining transaction log analysis and protocol analysis

    Directory of Open Access Journals (Sweden)

    Jillian R. Griffiths

    2002-01-01

    Full Text Available The paper reports a novel approach to studying user-system interaction that captures a complete record of the searcher's actions, the system responses and synchronised talk-aloud comments from the searcher. The data is recorded unobtrusively and is available for later analysis. The approach is set in context by a discussion of transaction logging and protocol analysis and examples of the search logging in operation are presented

  9. New method development in prehistoric stone tool research: evaluating use duration and data analysis protocols.

    Science.gov (United States)

    Evans, Adrian A; Macdonald, Danielle A; Giusca, Claudiu L; Leach, Richard K

    2014-10-01

    Lithic microwear is a research field of prehistoric stone tool (lithic) analysis that has been developed with the aim to identify how stone tools were used. It has been shown that laser scanning confocal microscopy has the potential to be a useful quantitative tool in the study of prehistoric stone tool function. In this paper, two important lines of inquiry are investigated: (1) whether the texture of worn surfaces is constant under varying durations of tool use, and (2) the development of rapid objective data analysis protocols. This study reports on the attempt to further develop these areas of study and results in a better understanding of the complexities underlying the development of flexible analytical algorithms for surface analysis. The results show that when sampling is optimised, surface texture may be linked to contact material type, independent of use duration. Further research is needed to validate this finding and test an expanded range of contact materials. The use of automated analytical protocols has shown promise but is only reliable if sampling location and scale are defined. Results suggest that the sampling protocol reports on the degree of worn surface invasiveness, complicating the ability to investigate duration related textural characterisation. Copyright © 2014. Published by Elsevier Ltd.

  10. GIS risk analysis of hazardous materials transport

    International Nuclear Information System (INIS)

    Anders, C.; Olsten, J.

    1991-01-01

    The Geographic Information System (GIS) was used to assess the risks and vulnerability of transporting hazardous materials and wastes (such as gasoline, explosives, poisons, etc) on the Arizona highway system. This paper discusses the methodology that was utilized, and the application of GIS systems to risk analysis problems

  11. Dealing with phenomenological uncertainty in risk analysis

    International Nuclear Information System (INIS)

    Theofanous, T.G.

    1994-01-01

    The Risk-Oriented Accident Analysis Methodology (ROAAM) is summarized and developed further towards a formal definition. The key ideas behind the methodology and these more formal aspects are also presented and discussed

  12. Risk and safety analysis of nuclear systems

    National Research Council Canada - National Science Library

    Lee, John C; McCormick, Norman J

    2011-01-01

    .... The first half of the book covers the principles of risk analysis, the techniques used to develop and update a reliability data base, the reliability of multi-component systems, Markov methods used...

  13. Risk analysis for nuclear power plants

    International Nuclear Information System (INIS)

    Koelzer, W.

    1983-01-01

    The German risk analysis program for nuclear power plants aiming at the man and the environment is presented. An accident consequence model to calculate the radiological impact and the potential health effects is described. (E.G.) [pt

  14. [Perinatal bioethics: euthanasia or end-of-life decisions? Analysis of the Groningen Protocol].

    Science.gov (United States)

    Halac, Jacobo; Halac, Eduardo; Moya, Martín P; Olmas, José M; Dopazo, Silvina L; Dolagaray, Nora

    2009-12-01

    The so called "Groningen Protocol" was conceived as a framework to discuss the euthanasia in neonates. Originally, it presents three groups of babies who might be candidates to this option. We analyzed the protocol in its original context and that of the Dutch society in which it was created. The analysis started with a careful reading of the protocol in both English and Dutch versions, translated later into Spanish. The medical and nursing staff participated in discussing it. A final consensus was reached. The Institutional Ethics Committee at our hospital discussed it freely and made recommendations for its application as a guideline to honestly discuss with parents the clinical condition of their babies, without permitting the option included literally in the word euthanasia. We selected four extremely ill infants. Their parents were interviewed at least twice daily: three stages were identified: the initial one of promoting all possible treatments; a second one of guarded and cautious request for the staff to evaluate "suffering", and a last one where requests were made to reduce therapeutic efforts to provide dignified death. A week after the death of their infants, they were presented with the facts of the protocol and the limits of our legal system. In all four cases the parents suggested that they would have chosen ending the life of their infants, in order to avoid them undue suffering. They clearly pointed out that this option emerged as a viable one to them once the ultimate outcome was evident. The protocol must not be viewed as a guideline for euthanasia in newborns, but rather as a mean to discuss the critical condition of an infant with the parents. Its direct implementation in our setting remains difficult. As a clear limitation for its overall application remains the definition of what is considered "unbearable suffering" in newborns, and how to certify when the infant has "no prospect". We emphasize the benefits of securing the help of the Ethics

  15. Individual and occupational risk factors for knee osteoarthritis – Study protocol of a case control study

    Directory of Open Access Journals (Sweden)

    Bouillon Bertil

    2008-02-01

    Full Text Available Abstract Background Knee osteoarthritis (OA is one of the frequent and functionally impairing disorders of the musculoskeletal system. In the literature, a number of occupational risk factors are discussed as being related to the development and progress of knee joint diseases, e.g. working in kneeling or squatting posture, lifting and carrying of heavy weights. The importance of the single risk factors and the possibility of prevention are currently under discussion. Besides the occupational factors, a number of individual risk factors are important, too. The distinction between work-related factors and individual factors is crucial in assessing the risk and in deriving preventive measures in occupational health. In existing studies, the occupational stress is determined mainly by surveys in employees and/or by making assumptions about individual occupations. Direct evaluation of occupational exposure has been performed only exceptionally. The aim of the research project ArGon is the assessment of different occupational factors in relation to individual factors (e.g. constitutional factors, leisure time activities, sports, which might influence the development and/or progression of knee (OA. The project is designed as a case control study. Methods/Design To raise valid data about the physical stress associated with occupational and leisure time activities, patients with and without knee OA are questioned by means of a standardised questionnaire and an interview. The required sample size was estimated to 800 cases and an equal number of controls. The degree and localisation of the knee cartilage or joint damages in the cases are documented on the basis of radiological, arthroscopic and/or operative findings in a patient record. Furthermore, occupational exposure is analysed at selected workplaces. To evaluate the answers provided in the questionnaire, work analysis is performed. Discussion In this research project, specific information on the

  16. Probabilistic risk analysis in chemical engineering

    International Nuclear Information System (INIS)

    Schmalz, F.

    1991-01-01

    In risk analysis in the chemical industry, recognising potential risks is considered more important than assessing their quantitative extent. Even in assessing risks, emphasis is not on the probability involved but on the possible extent. Qualitative assessment has proved valuable here. Probabilistic methods are used in individual cases where the wide implications make it essential to be able to assess the reliability of safety precautions. In this case, assessment therefore centres on the reliability of technical systems and not on the extent of a chemical risk. 7 figs

  17. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    Science.gov (United States)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  18. Performance Analysis of a Cluster-Based MAC Protocol for Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jesús Alonso-Zárate

    2010-01-01

    Full Text Available An analytical model to evaluate the non-saturated performance of the Distributed Queuing Medium Access Control Protocol for Ad Hoc Networks (DQMANs in single-hop networks is presented in this paper. DQMAN is comprised of a spontaneous, temporary, and dynamic clustering mechanism integrated with a near-optimum distributed queuing Medium Access Control (MAC protocol. Clustering is executed in a distributed manner using a mechanism inspired by the Distributed Coordination Function (DCF of the IEEE 802.11. Once a station seizes the channel, it becomes the temporary clusterhead of a spontaneous cluster and it coordinates the peer-to-peer communications between the clustermembers. Within each cluster, a near-optimum distributed queuing MAC protocol is executed. The theoretical performance analysis of DQMAN in single-hop networks under non-saturation conditions is presented in this paper. The approach integrates the analysis of the clustering mechanism into the MAC layer model. Up to the knowledge of the authors, this approach is novel in the literature. In addition, the performance of an ad hoc network using DQMAN is compared to that obtained when using the DCF of the IEEE 802.11, as a benchmark reference.

  19. Organ donation in the ICU: A document analysis of institutional policies, protocols, and order sets.

    Science.gov (United States)

    Oczkowski, Simon J W; Centofanti, John E; Durepos, Pamela; Arseneau, Erika; Kelecevic, Julija; Cook, Deborah J; Meade, Maureen O

    2018-04-01

    To better understand how local policies influence organ donation rates. We conducted a document analysis of our ICU organ donation policies, protocols and order sets. We used a systematic search of our institution's policy library to identify documents related to organ donation. We used Mindnode software to create a publication timeline, basic statistics to describe document characteristics, and qualitative content analysis to extract document themes. Documents were retrieved from Hamilton Health Sciences, an academic hospital system with a high volume of organ donation, from database inception to October 2015. We retrieved 12 active organ donation documents, including six protocols, two policies, two order sets, and two unclassified documents, a majority (75%) after the introduction of donation after circulatory death in 2006. Four major themes emerged: organ donation process, quality of care, patient and family-centred care, and the role of the institution. These themes indicate areas where documented institutional standards may be beneficial. Further research is necessary to determine the relationship of local policies, protocols, and order sets to actual organ donation practices, and to identify barriers and facilitators to improving donation rates. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Efficacy of Mobile Serious Games in Increasing HIV Risk Perception in Swaziland: A Randomized Control Trial (SGprev Trial) Research Protocol.

    Science.gov (United States)

    Lukhele, Bhekumusa Wellington; Musumari, Patou; El-Saaidi, Christina; Techasrivichien, Teeranee; Suguimoto, S Pilar; Ono Kihara, Masako; Kihara, Masahiro

    2016-11-22

    -list control group at 4-weeks post-intervention. We will use standardized regression coefficients to calculate the effect of the intervention on our primary outcome with P values. We will conduct both intention to treat and as treated analysis. This study is funded by Hayao Nakayama Foundation for Science & Technology and Culture; Grant number H26-A2-41. The research and development approval has been obtained from Kyoto University Graduate School and Faculty of Medicine Ethics Committee, Japan, and Swaziland's Ministry of Health Ethics and Scientific committee. Results are expected in February 2017. This study will provide evidence on the efficiency of a mobile phone interactive game in increasing HIV risk perception in Swaziland. Our findings may also be generalizable to similar settings in SSA. University Hospital Medical Information Network Clinical Trial Registry ID number (UMIN-CTR):UMIN000021781; URL:https://upload.umin.ac.jp/cgi-open-bin/ctr_e/ctr_view.cgi?recptno=R000025103 (Archived by WebCite at http://www.webcitation.org/6hOphB11a). ©Bhekumusa Wellington Lukhele, Patou Musumari, Christina El-Saaidi, Teeranee Techasrivichien, S. Pilar Suguimoto, Masako Ono Kihara, Masahiro Kihara. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 22.11.2016.

  1. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    ’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture......Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication...... the designer’s authentic line of reasoning. To illustrate how RPA can be used, the site planning case is briefly presented, and part of the replicated line of reasoning analysed. One result of the analysis is a glimpse of a ‘logic of design’; another is an insight which sheds new light on Darke’s classical...

  2. Performance Analysis of an Optical CDMA MAC Protocol With Variable-Size Sliding Window

    Science.gov (United States)

    Mohamed, Mohamed Aly A.; Shalaby, Hossam M. H.; Abdel-Moety El-Badawy, El-Sayed

    2006-10-01

    A media access control protocol for optical code-division multiple-access packet networks with variable length data traffic is proposed. This protocol exhibits a sliding window with variable size. A model for interference-level fluctuation and an accurate analysis for channel usage are presented. Both multiple-access interference (MAI) and photodetector's shot noise are considered. Both chip-level and correlation receivers are adopted. The system performance is evaluated using a traditional average system throughput and average delay. Finally, in order to enhance the overall performance, error control codes (ECCs) are applied. The results indicate that the performance can be enhanced to reach its peak using the ECC with an optimum number of correctable errors. Furthermore, chip-level receivers are shown to give much higher performance than that of correlation receivers. Also, it has been shown that MAI is the main source of signal degradation.

  3. Reliability and risk analysis methods research plan

    International Nuclear Information System (INIS)

    1984-10-01

    This document presents a plan for reliability and risk analysis methods research to be performed mainly by the Reactor Risk Branch (RRB), Division of Risk Analysis and Operations (DRAO), Office of Nuclear Regulatory Research. It includes those activities of other DRAO branches which are very closely related to those of the RRB. Related or interfacing programs of other divisions, offices and organizations are merely indicated. The primary use of this document is envisioned as an NRC working document, covering about a 3-year period, to foster better coordination in reliability and risk analysis methods development between the offices of Nuclear Regulatory Research and Nuclear Reactor Regulation. It will also serve as an information source for contractors and others to more clearly understand the objectives, needs, programmatic activities and interfaces together with the overall logical structure of the program

  4. Gender Analysis of Risk in Innovation System

    DEFF Research Database (Denmark)

    Ayinde, Ope; Muchie, Mammo; Abaniyan, E. O.

    2011-01-01

    the new maize variety. The analytical tools used include descriptive statistics, regression model; risk utility functions and risk parameter analysis. The result showed that invasion by animals, disease and pest, lack of access to credit wind and price fluctuation were the major risk facing the maize......This study analyzed risk by gender in innovation in Kwara state, Nigeria, using downy mildew resistant maize production as case study. The study employed primary and secondary data. The primary data were collected from well-structured questionnaires administered to both male and female producing...... producers in the area in the usage of the new innovation. The study also revealed that male producers were willing to take risk in the new maize variety production than the female, while the females were more indifferent to the risk involved in the new maize production variety than males. None...

  5. Intentional risk management through complex networks analysis

    CERN Document Server

    Chapela, Victor; Moral, Santiago; Romance, Miguel

    2015-01-01

    This book combines game theory and complex networks to examine intentional technological risk through modeling. As information security risks are in constant evolution,  the methodologies and tools to manage them must evolve to an ever-changing environment. A formal global methodology is explained  in this book, which is able to analyze risks in cyber security based on complex network models and ideas extracted from the Nash equilibrium. A risk management methodology for IT critical infrastructures is introduced which provides guidance and analysis on decision making models and real situations. This model manages the risk of succumbing to a digital attack and assesses an attack from the following three variables: income obtained, expense needed to carry out an attack, and the potential consequences for an attack. Graduate students and researchers interested in cyber security, complex network applications and intentional risk will find this book useful as it is filled with a number of models, methodologies a...

  6. Analysis of 213 currently used rehabilitation protocols in foot and ankle fractures.

    Science.gov (United States)

    Pfeifer, Christian G; Grechenig, Stephan; Frankewycz, Borys; Ernstberger, Antonio; Nerlich, Michael; Krutsch, Werner

    2015-10-01

    Fractures of the ankle, hind- and midfoot are amongst the five most common fractures. Besides initial operative or non-operative treatment, rehabilitation of the patients plays a crucial role for fracture union and long term functional outcome. Limited evidence is available with regard to what a rehabilitation regimen should include and what guidelines should be in place for the initial clinical course of these patients. This study therefore investigated the current rehabilitation concepts after fractures of the ankle, hind- and midfoot. Written rehabilitation protocols provided by orthopedic and trauma surgery institutions in terms of recommendations for weight bearing, range of motion (ROM), physiotherapy and choice of orthosis were screened and analysed. All protocols for lateral ankle fractures type AO 44A1, AO 44B1 and AO 44C1, for calcaneal fractures and fractures of the metatarsal as well as other not specific were included. Descriptive analysis was carried out and statistical analysis applied where appropriate. 209 rehabilitation protocols for ankle fractures type AO 44B1 and AO 44C1, 98 for AO 44A1, 193 for metatarsal fractures, 142 for calcaneal fractures, 107 for 5(th) metatarsal base fractures and 70 for 5(th) metatarsal Jones fractures were evaluated. The mean time recommended for orthosis treatment was 6.04 (SD 0.04) weeks. While the majority of protocols showed a trend towards increased weight bearing and increased ROM over time, the best consensus was noted for weight bearing recommendations. Our study shows that there exists a huge variability in rehabilitation of fractures of the ankle-, hind- and midfoot. This may be contributed to a lack of consensus (e.g. missing publication of guidelines), individualized patient care (e.g. in fragility fractures) or lack of specialization. This study might serve as basis for prospective randomized controlled trials in order to optimize rehabilitation for these common fractures. Copyright © 2015 Elsevier Ltd

  7. A problem-solving intervention for cardiovascular disease risk reduction in veterans: Protocol for a randomized controlled trial.

    Science.gov (United States)

    Nieuwsma, Jason A; Wray, Laura O; Voils, Corrine I; Gierisch, Jennifer M; Dundon, Margaret; Coffman, Cynthia J; Jackson, George L; Merwin, Rhonda; Vair, Christina; Juntilla, Karen; White-Clark, Courtney; Jeffreys, Amy S; Harris, Amy; Owings, Michael; Marr, Johnpatrick; Edelman, David

    2017-09-01

    Health behaviors related to diet, tobacco usage, physical activity, medication adherence, and alcohol use are highly determinative of risk for developing cardiovascular disease. This paper describes a study protocol to evaluate a problem-solving intervention that aims to help patients at risk for developing cardiovascular disease address barriers to adopting positive health behaviors in order to reduce cardiovascular risk. Eligible patients are adults enrolled in Veterans Affairs (VA) health care who have not experienced a cardiovascular event but are at elevated risk based on their Framingham Risk Score (FRS). Participants in this two-site study are randomized to either the intervention or care as usual, with a target of 400 participants. The study intervention, Healthy Living Problem-Solving (HELPS), consists of six group sessions conducted approximately monthly interspersed with individualized coaching calls to help participants apply problem-solving principles. The primary outcome is FRS, analyzed at the beginning and end of the study intervention (6months). Participants also complete measures of physical activity, caloric intake, self-efficacy, group cohesion, problem-solving capacities, and demographic characteristics. Results of this trial will inform behavioral interventions to change health behaviors in those at risk for cardiovascular disease and other health conditions. ClinicalTrials.gov identifier NCT01838226. Published by Elsevier Inc.

  8. TH-C-18A-08: A Management Tool for CT Dose Monitoring, Analysis, and Protocol Review

    International Nuclear Information System (INIS)

    Wang, J; Chan, F; Newman, B; Larson, D; Leung, A; Fleischmann, D; Molvin, L; Marsh, D; Zorich, C; Phillips, L

    2014-01-01

    Purpose: To develop a customizable tool for enterprise-wide managing of CT protocols and analyzing radiation dose information of CT exams for a variety of quality control applications Methods: All clinical CT protocols implemented on the 11 CT scanners at our institution were extracted in digital format. The original protocols had been preset by our CT management team. A commercial CT dose tracking software (DoseWatch,GE healthcare,WI) was used to collect exam information (exam date, patient age etc.), scanning parameters, and radiation doses for all CT exams. We developed a Matlab-based program (MathWorks,MA) with graphic user interface which allows to analyze the scanning protocols with the actual dose estimates, and compare the data to national (ACR,AAPM) and internal reference values for CT quality control. Results: The CT protocol review portion of our tool allows the user to look up the scanning and image reconstruction parameters of any protocol on any of the installed CT systems among about 120 protocols per scanner. In the dose analysis tool, dose information of all CT exams (from 05/2013 to 02/2014) was stratified on a protocol level, and within a protocol down to series level, i.e. each individual exposure event. This allows numerical and graphical review of dose information of any combination of scanner models, protocols and series. The key functions of the tool include: statistics of CTDI, DLP and SSDE, dose monitoring using user-set CTDI/DLP/SSDE thresholds, look-up of any CT exam dose data, and CT protocol review. Conclusion: our inhouse CT management tool provides radiologists, technologists and administration a first-hand near real-time enterprise-wide knowledge on CT dose levels of different exam types. Medical physicists use this tool to manage CT protocols, compare and optimize dose levels across different scanner models. It provides technologists feedback on CT scanning operation, and knowledge on important dose baselines and thresholds

  9. WIPP fire hazards and risk analysis

    International Nuclear Information System (INIS)

    1991-05-01

    The purpose of this analysis was to conduct a fire hazards risk analysis of the Transuranic (TRU) contact-handled waste receipt, emplacement, and disposal activities at the Waste Isolation Pilot Plant (WIPP). The technical bases and safety envelope for these operations are defined in the approved WIPP Final Safety Analysis Report (FSAR). Although the safety documentation for the initial phase of the Test Program, the dry bin scale tests, has not yet been approved by the Department of Energy (DOE), reviews of the draft to date, including those by the Advisory Committee on Nuclear Facility Safety (ACNFS), have concluded that the dry bin scale tests present no significant risks in excess of those estimated in the approved WIPP FSAR. It is the opinion of the authors and reviewers of this analysis, based on sound engineering judgment and knowledge of the WIPP operations, that a Fire Hazards and Risk Analysis specific to the dry bin scale test program is not warranted prior to first waste receipt. This conclusion is further supported by the risk analysis presented in this document which demonstrates the level of risk to WIPP operations posed by fire to be extremely low. 15 refs., 41 figs., 48 tabs

  10. Relative risk analysis of several manufactured nanomaterials: an insurance industry context.

    Science.gov (United States)

    Robichaud, Christine Ogilvie; Tanzil, Dicksen; Weilenmann, Ulrich; Wiesner, Mark R

    2005-11-15

    A relative risk assessment is presented for the industrial fabrication of several nanomaterials. The production processes for five nanomaterials were selected for this analysis, based on their current or near-term potential for large-scale production and commercialization: single-walled carbon nanotubes, bucky balls (C60), one variety of quantum dots, alumoxane nanoparticles, and nano-titanium dioxide. The assessment focused on the activities surrounding the fabrication of nanomaterials, exclusive of any impacts or risks with the nanomaterials themselves. A representative synthesis method was selected for each nanomaterial based on its potential for scaleup. A list of input materials, output materials, and waste streams for each step of fabrication was developed and entered into a database that included key process characteristics such as temperature and pressure. The physical-chemical properties and quantities of the inventoried materials were used to assess relative risk based on factors such as volatility, carcinogenicity, flammability, toxicity, and persistence. These factors were first used to qualitatively rank risk, then combined using an actuarial protocol developed by the insurance industry for the purpose of calculating insurance premiums for chemical manufacturers. This protocol ranks three categories of risk relative to a 100 point scale (where 100 represents maximum risk): incident risk, normal operations risk, and latent contamination risk. Results from this analysis determined that relative environmental risk from manufacturing each of these five materials was comparatively low in relation to other common industrial manufacturing processes.

  11. Evaluation of a Low-risk Mild Traumatic Brain Injury and Intracranial Hemorrhage Emergency Department Observation Protocol.

    Science.gov (United States)

    Yun, Brian J; Borczuk, Pierre; Wang, Lulu; Dorner, Stephen; White, Benjamin A; Raja, Ali S

    2017-11-20

    ] = 0.25-0.82, p = 0.009) in the observation unit. After a stay in the EDOU, 26% (37/143) of patients required an inpatient admission before implementation of the protocol and 13% (20/153) of patients required an inpatient admission after protocol implementation. There was no statistically significant difference in log transformed EDOU length of stay (LOS) between the groups after adjusting for propensity score (p = 0.34). While there was no difference in EDOU LOS, implementing a low-risk mild TBI and ICH protocol in the EDOU may decrease the rate of inpatient admissions from the EDOU. A protocol-driven observation unit may help physicians by standardizing eligibility criteria and by providing guidance on management. As the propensity score method limits our ability to create a straightforward predictive model, a future larger study should validate the results. © 2017 by the Society for Academic Emergency Medicine.

  12. Standardised risk analysis as a communication tool

    International Nuclear Information System (INIS)

    Pluess, Ch.; Montanarini, M.; Bernauer, M.

    1998-01-01

    Full text of publication follows: several European countries require a risk analysis for the production, storage or transport a dangerous goods. This requirement imposes considerable administrative effort for some sectors of the industry. In order to minimize the effort of such studies, a generic risk analysis for an industrial sector proved to help. Standardised procedures can consequently be derived for efficient performance of the risk investigations. This procedure was successfully established in Switzerland for natural gas transmission lines and fossil fuel storage plants. The development process of the generic risk analysis involved an intense discussion between industry and authorities about methodology of assessment and the criteria of acceptance. This process finally led to scientific consistent modelling tools for risk analysis and to an improved communication from the industry to the authorities and the public. As a recent example, the Holland-Italy natural gas transmission pipeline is demonstrated, where this method was successfully employed. Although this pipeline traverses densely populated areas in Switzerland, using this established communication method, the risk problems could be solved without delaying the planning process. (authors)

  13. Risk analysis of industrial plants operation

    International Nuclear Information System (INIS)

    Hubert, Philippe

    1989-12-01

    This study examines the possibilities of systematic technology risk analysis in view of territorial management (city, urban community, region), including chronic and accidental risks. The objective was to relate this evaluation with those done for permanent water and air pollution. Risk management for pollution are done for a long time. A number of studies were done in urban communities and regions both for air and water pollution. The second objective is related to management of industrial risks: nuclear, petrochemical, transport of hazardous material, pipelines, etc. At the beginning, three possibilities of effects are taken into account: human health, economic aspect and water, and possibilities of evaluation are identified. Elements of risk identification are presented for quantification of results [fr

  14. Risk analysis of alternative energy sources

    International Nuclear Information System (INIS)

    Kazmer, D.R.

    1982-01-01

    The author explores two points raised by Miller Spangler in a January 1981 issue: public perception of risks involving nuclear power plants relative to those of conventional plants and criteria for evaluating the way risk analyses are made. On the first point, he concludes that translating public attitudes into the experts' language of probability and risk could provide better information and understanding of both the attitudes and the risks. Viewing risk analysis methodologies as filters which help to test historical change, he suggests that the lack of information favors a lay jury approach for energy decisions. Spangler responds that Congress is an example of lay decision making, but that a lay jury, given public disinterest and polarization, would probably not improve social justice on the nuclear issue. 5 references, 4 figures

  15. LANDSAFE: LANDING SITE RISK ANALYSIS SOFTWARE FRAMEWORK

    OpenAIRE

    Schmidt, Ralph; Bostelmann, Jonas; Cornet, Yves; Heipke, Christian; Philippe, Christian; Poncelet, Nadia; de Rosa, Diego; Vandeloise, Yannick

    2012-01-01

    The European Space Agency (ESA) is planning a Lunar Lander mission in the 2018 timeframe that will demonstrate precise soft landing at the polar regions of the Moon. To ensure a safe and successful landing a careful risk analysis has to be carried out. This is comprised of identifying favorable target areas and evaluating the surface conditions in these areas. Features like craters, boulders, steep slopes, rough surfaces and shadow areas have to be identified in order to assess the risk assoc...

  16. Impact Analysis for Risks in Informatics Systems

    OpenAIRE

    Baicu, Floarea; Baches, Maria Alexandra

    2013-01-01

    In this paper are presented methods of impact analysis on informatics system security accidents, qualitative and quantitative methods, starting with risk and informational system security definitions. It is presented the relationship between the risks of exploiting vulnerabilities of security system, security level of these informatics systems, probability of exploiting the weak points subject to financial losses of a company, respectively impact of a security accident on the company. Herewit...

  17. Anorexia nervosa and cancer: a protocol for a systematic review and meta-analysis of observational studies.

    Science.gov (United States)

    Catalá-López, Ferrán; Hutton, Brian; Driver, Jane A; Ridao, Manuel; Valderas, José M; Gènova-Maleras, Ricard; Forés-Martos, Jaume; Alonso-Arroyo, Adolfo; Saint-Gerons, Diego Macías; Vieta, Eduard; Valencia, Alfonso; Tabarés-Seisdedos, Rafael

    2017-07-11

    Anorexia nervosa is characterized by a severe restriction of caloric intake, low body weight, fear of gaining weight or of becoming fat, and disturbance of body image. Pathogenesis of the disorder may include genetic predisposition, hormonal changes and a combination of environmental, psychosocial, and cultural factors. Cancer is the second leading cause of death worldwide. At present, no systematic reviews and meta-analyses have evaluated the risk of cancer in people with anorexia nervosa. The objective of this study will be to evaluate the association between anorexia nervosa and the risk of developing or dying from cancer. This study protocol is part of a systematic collection and assessment of multiple systematic reviews and meta-analyses (umbrella review) evaluating the association of cancer and multiple central nervous system disorders. We designed a specific protocol for a new systematic review and meta-analysis of observational studies of anorexia nervosa with risk of developing or dying from any cancer. Data sources will be PubMed, Embase, Scopus, Web of Science, and manual screening of references. Observational studies (case-control and cohort) in humans that examined the association between anorexia nervosa and risk of developing or dying from cancer will be sought. The primary outcomes will be cancer incidence and cancer mortality in association with anorexia nervosa. Secondary outcomes will be site-specific cancer incidence and mortality, respectively. Screening of abstracts and full texts, and data abstraction will be performed by two team members independently. Conflicts at all levels of screening and abstraction will be resolved through discussion. The quality of studies will be assessed by using the Ottawa-Newcastle scale by two team members independently. Random effects models will be conducted where appropriate. Subgroup and additional analyses will be conducted to explore the potential sources of heterogeneity. The World Cancer Research Fund

  18. Financial incentive policies at workplace cafeterias for preventing obesity--a systematic review and meta-analysis (Protocol).

    Science.gov (United States)

    Sawada, Kimi; Ota, Erika; Shahrook, Sadequa; Mori, Rintaro

    2014-10-28

    Various studies are currently investigating ways to prevent lifestyle-related diseases and obesity among workers through interventions using incentive strategies, including price discounts for low-fat snacks and sugar-free beverages at workplace cafeterias or vending machines, and the provision of a free salad bar in cafeterias. Rather than assessing individual or group interventions, we will focus on the effectiveness of nutrition education programs at the population level, which primarily incorporate financial incentive strategies to prevent obesity. This paper describes the protocol of a systematic review that will examine the effectiveness of financial incentive programs at company cafeterias in improving dietary habits, nutrient intake, and obesity prevention. We will conduct searches in the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, Embase, and PsycINFO. Interventions will be assessed using data from randomized control trials (RCTs) and cluster RCTs. However, if few such trials exist, we will include quasi-RCTs. We will exclude controlled before-and-after studies and crossover RCTs. We will assess food-based interventions that include financial incentive strategies (discount strategies or social marketing) for workplace cafeterias, vending machines, and kiosks. Two authors will independently review studies for inclusion and will resolve differences by discussion and, if required, through consultation with a third author. We will assess the risk of bias of included studies according to the Cochrane Collaboration's "risk of bias" tool. The purpose of this paper is to outline the study protocol for a systematic review and meta-analysis that will investigate the effectiveness of population-level, incentive-focused interventions at the workplace cafeteria that aim to promote and prevent obesity. This review will give an important overview of the available evidence about the effectiveness of incentive-based environmental interventions to

  19. A fresh look at the freeze-all protocol: a SWOT analysis.

    Science.gov (United States)

    Blockeel, Christophe; Drakopoulos, Panagiotis; Santos-Ribeiro, Samuel; Polyzos, Nikolaos P; Tournaye, Herman

    2016-03-01

    The 'freeze-all' strategy with the segmentation of IVF treatment, namely with the use of a GnRH antagonist protocol, GnRH agonist triggering, the elective cryopreservation of all embryos by vitrification and a frozen-thawed embryo transfer in a subsequent cycle, has become more popular. However, the approach still encounters drawbacks. In this opinion paper, a SWOT (strengths, weaknesses, opportunities and threats) analysis sheds light on the different aspects of this strategy. © The Author 2016. Published by Oxford University Press on behalf of the European Society of Human Reproduction and Embryology. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  20. A protocol improves GP recording of long-term sickness absence risk factors

    NARCIS (Netherlands)

    van Dijk, Paul C. M.; Hogervorst, Wouter; ter Riet, Gerben; van Dijk, Frank

    2008-01-01

    Background If general practitioners (GPs) were better informed about patients' risks of long-term sickness absence (LTSA), they could incorporate these risk assessments into their patient management plans and cooperate more with occupational physicians to prevent LTSA. Aim To evaluate the

  1. Feasibility of an intracranial EEG-fMRI protocol at 3T: risk assessment and image quality.

    Science.gov (United States)

    Boucousis, Shannon M; Beers, Craig A; Cunningham, Cameron J B; Gaxiola-Valdez, Ismael; Pittman, Daniel J; Goodyear, Bradley G; Federico, Paolo

    2012-11-15

    Integrating intracranial EEG (iEEG) with functional MRI (iEEG-fMRI) may help elucidate mechanisms underlying the generation of seizures. However, the introduction of iEEG electrodes in the MR environment has inherent risk and data quality implications that require consideration prior to clinical use. Previous studies of subdural and depth electrodes have confirmed low risk under specific circumstances at 1.5T and 3T. However, no studies have assessed risk and image quality related to the feasibility of a full iEEG-fMRI protocol. To this end, commercially available platinum subdural grid/strip electrodes (4×5 grid or 1×8 strip) and 4 or 6-contact depth electrodes were secured to the surface of a custom-made phantom mimicking the conductivity of the human brain. Electrode displacement, temperature increase of electrodes and surrounding phantom material, and voltage fluctuations in electrode contacts were measured in a GE Discovery MR750 3T MR scanner during a variety of imaging sequences, typical of an iEEG-fMRI protocol. An electrode grid was also used to quantify the spatial extent of susceptibility artifact. The spatial extent of susceptibility artifact in the presence of an electrode was also assessed for typical imaging parameters that maximize BOLD sensitivity at 3T (TR=1500 ms; TE=30 ms; slice thickness=4mm; matrix=64×64; field-of-view=24 cm). Under standard conditions, all electrodes exhibited no measurable displacement and no clinically significant temperature increase (2.0°C) that in some cases exceeded 10°C. Induced voltages in the frequency range that could elicit neuronal stimulation (<10 kHz) were well below the threshold of 100 mV. fMRI signal intensity was significantly reduced within 20mm of the electrodes for the imaging parameters used in this study. Thus, for the conditions tested, a full iEEG-fMRI protocol poses a low risk at 3T; however, fMRI sensitivity may be reduced immediately adjacent to the electrodes. In addition, high SAR sequences

  2. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  3. Using a risk assessment protocol to develop soil cleanup criteria for petroleum contaminated sites

    International Nuclear Information System (INIS)

    Asante-Duah, D.K.

    1991-01-01

    Petroleum contaminated site may prose significant risks to the public because of potential health and environmental effects, and to Potentially Responsible Parties (PRPs) because of financial liabilities that could result from such effects. The effective management of petroleum contaminated sites has therefore become an important environmental priority and will be a growing challenge for years to come. It has also become evident that the proper management of such sites poses great challenges. Risk assessment seems to be one of the fastest evolving tools for developing appropriate management decisions, including those relating to the levels of cleanup warranty under specific scenarios. This paper reports that the U.S. Environmental Protection Agency (U.S. EPA) recognizes the use of risk assessment to facilitate decisions on whether or not remedial actions are needed to abate site-related risks, and also in the enforcement of regulatory standards. Risk assessment techniques have been used in various regulatory programs employed by federal, state, and local agencies

  4. Establishing a protocol for element determination in human nail clippings by neutron activation analysis

    International Nuclear Information System (INIS)

    Sanches, Thalita Pinheiro; Saiki, Mitiko

    2011-01-01

    Human nail samples have been analyzed to evaluate occupational exposure, nutritional status and to diagnose certain diseases. However, sampling and washing protocols for nail analyses vary from study to study not allowing comparisons between studies. One of the difficulties in analyzing nail samples is to eliminate only surface contamination without removing elements of interest in this tissue. In the present study, a protocol was defined in order to obtain reliable results of element concentrations in human nail clippings. Nail clippings collected from all 10 fingers or toes were previously pre cleaned using an ethyl alcohol solution to eliminate microbes. Then, the clippings were cut in small pieces and submitted to different reagents for washing by shaking. Neutron activation analysis (NAA) was applied for nail samples analysis which consisted of irradiating aliquots of samples together with synthetic elemental standards in the IEA-R1 nuclear research reactor followed by gamma ray spectrometry. Comparisons made between the results obtained for nails submitted to different reagents for cleaning indicated that the procedure using acetone and Triton X100 solution is more effective than that of nitric acid solution. Analyses in triplicates of a nail sample indicated results with relative standard deviations lower than 15% for most of elements, showing the homogeneity of the prepared sample. Qualitative analyses of different nail polishes showed that the presence of elements determined in the present study is negligible in these products. Quality control of the analytical results indicated that the applied NAA procedure is adequate for human nail analysis. (author)

  5. Risk Assessment and Integration Team (RAIT) Portfolio Risk Analysis Strategy

    Science.gov (United States)

    Edwards, Michelle

    2010-01-01

    Impact at management level: Qualitative assessment of risk criticality in conjunction with risk consequence, likelihood, and severity enable development of an "investment policy" towards managing a portfolio of risks. Impact at research level: Quantitative risk assessments enable researchers to develop risk mitigation strategies with meaningful risk reduction results. Quantitative assessment approach provides useful risk mitigation information.

  6. Quantitative assessment of in-solution digestion efficiency identifies optimal protocols for unbiased protein analysis

    DEFF Research Database (Denmark)

    Leon, Ileana R; Schwämmle, Veit; Jensen, Ole N

    2013-01-01

    a combination of qualitative and quantitative LC-MS/MS methods and statistical data analysis. In contrast to previous studies we employed both standard qualitative as well as data-independent quantitative workflows to systematically assess trypsin digestion efficiency and bias using mitochondrial protein...... conditions (buffer, RapiGest, deoxycholate, urea), and two methods for removal of detergents prior to analysis of peptides (acid precipitation or phase separation with ethyl acetate). Our data-independent quantitative LC-MS/MS workflow quantified over 3700 distinct peptides with 96% completeness between all...... protocols and replicates, with an average 40% protein sequence coverage and an average of 11 peptides identified per protein. Systematic quantitative and statistical analysis of physicochemical parameters demonstrated that deoxycholate-assisted in-solution digestion combined with phase transfer allows...

  7. Levels of desertification risk in the Sicilian forests according to MEDALUS-ESPI protocol

    Science.gov (United States)

    Ragusa, M. A.; Rapicavoli, V.

    2017-07-01

    The authors estimated the desertification risk in a specific area of the Mediterranean, analyzing the main types of forests and reforestation. Through the Environmentally Sensitive Patch Index (ESPI), the authors have made an overall risk ranking in the woods, in the Sicily Region, simulated up to 2030. It is inferred that the risk of desertification in the forests of Sicily region is now reduced. In the last fifty years the forests were reduced by 17.4 percent, they remained unchanged for 21 percent, were up 61.6 percent at the end of the twentieth century.

  8. New algorithm for risk analysis in radiotherapy

    International Nuclear Information System (INIS)

    Torres, Antonio; Montes de Oca, Joe

    2015-01-01

    Risk analyses applied to radiotherapy treatments have become an undeniable necessity, considering the dangers generated by the combination of using powerful radiation fields on patients and the occurrence of human errors and equipment failures during these treatments. The technique par excellence to execute these analyses has been the risk matrix. This paper presents the development of a new algorithm to execute the task with wide graphic and analytic potentialities, thus transforming it into a very useful option for risk monitoring and the optimization of quality assurance. The system SECURE- MR, which is the basic software of this algorithm, has been successfully used in risk analysis regarding different kinds of radiotherapies. Compared to previous methods, It offers new possibilities of analysis considering risk controlling factors as the robustness of reducers of initiators frequency and its consequences. Their analytic capacities and graphs allow novel developments to classify risk contributing factors, to represent information processes as well as accidental sequences. The paper shows the application of the proposed system to a generic process of radiotherapy treatment using a lineal accelerator. (author)

  9. The watchdog role of risk analysis

    International Nuclear Information System (INIS)

    Reijen, G. van; Vinck, W.

    1983-01-01

    The reason why the risks of large-scale technology attract more attention lies in the fact that accidents would have more disastrous results and in the fact that it is probably more attractive to study the risks of some large projects than to do the same for a greater number of smaller projects. Within this presentation there will be some opening remarks on the Role of the Commission of the European Community with regard to accident prevention. The development of the concept of quantitative risks is dealt with. This development leads to a combinded of deterministic and probabilistic methods. The presentation concludes with some critical remarks on quantitative risk analysis and its use. (orig./HP) [de

  10. Implementing the Bayesian paradigm in risk analysis

    International Nuclear Information System (INIS)

    Aven, T.; Kvaloey, J.T.

    2002-01-01

    The Bayesian paradigm comprises a unified and consistent framework for analyzing and expressing risk. Yet, we see rather few examples of applications where the full Bayesian setting has been adopted with specifications of priors of unknown parameters. In this paper, we discuss some of the practical challenges of implementing Bayesian thinking and methods in risk analysis, emphasizing the introduction of probability models and parameters and associated uncertainty assessments. We conclude that there is a need for a pragmatic view in order to 'successfully' apply the Bayesian approach, such that we can do the assignments of some of the probabilities without adopting the somewhat sophisticated procedure of specifying prior distributions of parameters. A simple risk analysis example is presented to illustrate ideas

  11. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  12. Economic impact assessment in pest risk analysis

    NARCIS (Netherlands)

    Soliman, T.A.A.; Mourits, M.C.M.; Oude Lansink, A.G.J.M.; Werf, van der W.

    2010-01-01

    According to international treaties, phytosanitary measures against introduction and spread of invasive plant pests must be justified by a science-based pest risk analysis (PRA). Part of the PRA consists of an assessment of potential economic consequences. This paper evaluates the main available

  13. Meta Salud Diabetes study protocol: a cluster-randomised trial to reduce cardiovascular risk among a diabetic population of Mexico.

    Science.gov (United States)

    Sabo, Samantha; Denman Champion, Catalina; Bell, Melanie L; Cornejo Vucovich, Elsa; Ingram, Maia; Valenica, Celina; Castro Vasquez, Maria Del Carmen; Gonzalez-Fagoaga, Eduardo; Geurnsey de Zapien, Jill; Rosales, Cecilia B

    2018-03-12

    Northern Mexico has among the highest rates of cardiovascular disease (CVD) and diabetes in the world. This research addresses core gaps in implementation science to develop, test and scale-up CVD risk-reduction interventions in diabetics through a national primary care health system. The Meta Salud Diabetes (MSD) research project is a parallel two-arm cluster-randomised clinical behavioural trial based in 22 (n=22) health centres in Sonora, Mexico. MSD aims to evaluate the effectiveness of the MSD intervention for the secondary prevention of CVD risk factors among a diabetic population (n=320) compared with the study control of usual care. The MSD intervention consists of 2-hour class sessions delivered over a 13-week period providing educational information to encourage sustainable behavioural change to prevent disease complications including the adoption of physical activity. MSD is delivered within the context of Mexico's national primary care health centre system by health professionals, including nurses, physicians and community health workers via existing social support groups for individuals diagnosed with chronic disease. Mixed models are used to estimate the effect of MSD by comparing cardiovascular risk, as measured by the Framingham Risk Score, between the trial arms. Secondary outcomes include hypertension, behavioural risk factors and psychosocial factors. This work is supported by the National Institutes of Health, National Heart Lung and Blood Institute (1R01HL125996-01) and approved by the University of Arizona Research Institutional Review Board (Protocol 1508040144) and the Research Bioethics Committee at the University of Sonora. The first Internal Review Board approval date was 31 August 2015 with five subsequent approved amendments. This article refers to protocol V.0.2, dated 30 January 2017. Results will be disseminated via peer-reviewed publication and presentation at international conferences and will be shared through meetings with health

  14. Supplemental Hazard Analysis and Risk Assessment - Hydrotreater

    Energy Technology Data Exchange (ETDEWEB)

    Lowry, Peter P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Wagner, Katie A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-04-01

    A supplemental hazard analysis was conducted and quantitative risk assessment performed in response to an independent review comment received by the Pacific Northwest National Laboratory (PNNL) from the U.S. Department of Energy Pacific Northwest Field Office (PNSO) against the Hydrotreater/Distillation Column Hazard Analysis Report issued in April 2013. The supplemental analysis used the hazardous conditions documented by the previous April 2013 report as a basis. The conditions were screened and grouped for the purpose of identifying whether additional prudent, practical hazard controls could be identified, using a quantitative risk evaluation to assess the adequacy of the controls and establish a lower level of concern for the likelihood of potential serious accidents. Calculations were performed to support conclusions where necessary.

  15. Multivariate survival analysis and competing risks

    CERN Document Server

    Crowder, Martin J

    2012-01-01

    Multivariate Survival Analysis and Competing Risks introduces univariate survival analysis and extends it to the multivariate case. It covers competing risks and counting processes and provides many real-world examples, exercises, and R code. The text discusses survival data, survival distributions, frailty models, parametric methods, multivariate data and distributions, copulas, continuous failure, parametric likelihood inference, and non- and semi-parametric methods. There are many books covering survival analysis, but very few that cover the multivariate case in any depth. Written for a graduate-level audience in statistics/biostatistics, this book includes practical exercises and R code for the examples. The author is renowned for his clear writing style, and this book continues that trend. It is an excellent reference for graduate students and researchers looking for grounding in this burgeoning field of research.

  16. Treatment results of the Tokai-POSG 8610HR pilot protocol for children with high-risk acute lymphoblastic leukemia

    Energy Technology Data Exchange (ETDEWEB)

    Hongo, Teruaki; Inoue, Noriko [Hamamatsu Medical Univ., Shizuoka (Japan); Horibe, Keizo [and others

    1997-10-01

    We reported the treatment results of Tokai-POSG 8610HR pilot protocol for children with high-risk acute lymphoblastic leukemia (ALL). From Oct. 1986 to Jan. 1991, 43 eligible children were enrolled, who had one or more following high-risk factors: age{>=}10 years old, initial white blood cell count (WBC) of 50,000/{mu}l or more, and extramedullary leukemia. All patients received induction therapy consisting of vincristine, dexamethasone, cyclophosphamide and daunorubicin, followed by central nervous system prophylaxis by 24 Gy cranial irradiation, consolidation therapy and cyclic maintenance by multidrugs for 3 years after diagnosis. Complete remission was achieved in 39 patients. The 5-year event-free survival (EFS) rate was 72.6{+-}7.1%. The only factor of an adverse association with EFS was a initial WBC of 10,000/{mu}l or more (p=0.002) in the 24 patients who were 10 years old or over. The factors related to a negative survival were male gender (p=0.031) and an initial WBC of 10,000/{mu}l or more (p=0.0012) in 43 patients. The major toxicities of the therapy were pancreatitis and allergic reaction due to{sub L}-ASP administration, and growth hormone deficiency due to cranial irradiation. Tokai 8610HR pilot protocol was a promising regimen, but further intensive chemotherapy was needed for improvement or the prognosis of the older patients with high initial WBC greater than 10,000/{mu}l. (author)

  17. Treatment results of the Tokai-POSG 8610HR pilot protocol for children with high-risk acute lymphoblastic leukemia

    International Nuclear Information System (INIS)

    Hongo, Teruaki; Inoue, Noriko; Horibe, Keizo

    1997-01-01

    We reported the treatment results of Tokai-POSG 8610HR pilot protocol for children with high-risk acute lymphoblastic leukemia (ALL). From Oct. 1986 to Jan. 1991, 43 eligible children were enrolled, who had one or more following high-risk factors: age≥10 years old, initial white blood cell count (WBC) of 50,000/μl or more, and extramedullary leukemia. All patients received induction therapy consisting of vincristine, dexamethasone, cyclophosphamide and daunorubicin, followed by central nervous system prophylaxis by 24 Gy cranial irradiation, consolidation therapy and cyclic maintenance by multidrugs for 3 years after diagnosis. Complete remission was achieved in 39 patients. The 5-year event-free survival (EFS) rate was 72.6±7.1%. The only factor of an adverse association with EFS was a initial WBC of 10,000/μl or more (p=0.002) in the 24 patients who were 10 years old or over. The factors related to a negative survival were male gender (p=0.031) and an initial WBC of 10,000/μl or more (p=0.0012) in 43 patients. The major toxicities of the therapy were pancreatitis and allergic reaction due to L -ASP administration, and growth hormone deficiency due to cranial irradiation. Tokai 8610HR pilot protocol was a promising regimen, but further intensive chemotherapy was needed for improvement or the prognosis of the older patients with high initial WBC greater than 10,000/μl. (author)

  18. Risk and safety analysis of nuclear systems

    CERN Document Server

    Lee, John C

    2011-01-01

    The book has been developed in conjunction with NERS 462, a course offered every year to seniors and graduate students in the University of Michigan NERS program. The first half of the book covers the principles of risk analysis, the techniques used to develop and update a reliability data base, the reliability of multi-component systems, Markov methods used to analyze the unavailability of systems with repairs, fault trees and event trees used in probabilistic risk assessments (PRAs), and failure modes of systems. All of this material is general enough that it could be used in non-nuclear a

  19. Terminological Ontologies for Risk and Vulnerability Analysis

    DEFF Research Database (Denmark)

    Madsen, Bodil Nistrup; Erdman Thomsen, Hanne

    2014-01-01

    Risk and vulnerability analyses are an important preliminary stage in civil contingency planning. The Danish Emergency Management Agency has developed a generic model and a set of tools that may be used in the preparedness planning, i.e. for identifying and describing society’s critical functions......, for formulating threat scenarios and for assessing consequences. Terminological ontologies, which are systems of domain specific concepts comprising concept relations and characteristics, are useful, both when describing the central concepts of risk and vulnerability analysis (meta concepts), and for further...

  20. Dementia Population Risk Tool (DemPoRT): study protocol for a predictive algorithm assessing dementia risk in the community

    OpenAIRE

    Fisher, Stacey; Hsu, Amy; Mojaverian, Nassim; Taljaard, Monica; Huyer, Gregory; Manuel, Douglas G; Tanuseputro, Peter

    2017-01-01

    Introduction The burden of disease from dementia is a growing global concern as incidence increases dramatically with age, and average life expectancy has been increasing around the world. Planning for an ageing population requires reliable projections of dementia prevalence; however, existing population projections are simple and have poor predictive accuracy. The Dementia Population Risk Tool (DemPoRT) will predict incidence of dementia in the population setting using multivariable modellin...

  1. Association between vestibulo-ocular reflex suppression, balance, gait, and fall risk in ageing and neurodegenerative disease: protocol of a one-year prospective follow-up study.

    Science.gov (United States)

    Srulijes, Karin; Mack, David J; Klenk, Jochen; Schwickert, Lars; Ihlen, Espen A F; Schwenk, Michael; Lindemann, Ulrich; Meyer, Miriam; Srijana, K C; Hobert, Markus A; Brockmann, Kathrin; Wurster, Isabel; Pomper, Jörn K; Synofzik, Matthis; Schneider, Erich; Ilg, Uwe; Berg, Daniela; Maetzler, Walter; Becker, Clemens

    2015-10-09

    Falls frequency increases with age and particularly in neurogeriatric cohorts. The interplay between eye movements and locomotion may contribute substantially to the occurrence of falls, but is hardly investigated. This paper provides an overview of current approaches to simultaneously measure eye and body movements, particularly for analyzing the association of vestibulo-ocular reflex (VOR) suppression, postural deficits and falls in neurogeriatric risk cohorts. Moreover, VOR suppression is measured during head-fixed target presentation and during gaze shifting while postural control is challenged. Using these approaches, we aim at identifying quantitative parameters of eye-head-coordination during postural balance and gait, as indicators of fall risk. Patients with Progressive Supranuclear Palsy (PSP) or Parkinson's disease (PD), age- and sex-matched healthy older adults, and a cohort of young healthy adults will be recruited. Baseline assessment will include a detailed clinical assessment, covering medical history, neurological examination, disease specific clinical rating scales, falls-related self-efficacy, activities of daily living, neuro-psychological screening, assessment of mobility function and a questionnaire for retrospective falls. Moreover, participants will simultaneously perform eye and head movements (fixating a head-fixed target vs. shifting gaze to light emitting diodes in order to quantify vestibulo-ocular reflex suppression ability) under different conditions (sitting, standing, or walking). An eye/head tracker synchronized with a 3-D motion analysis system will be used to quantify parameters related to eye-head-coordination, postural balance, and gait. Established outcome parameters related to VOR suppression ability (e.g., gain, saccadic reaction time, frequency of saccades) and motor related fall risk (e.g., step-time variability, postural sway) will be calculated. Falls will be assessed prospectively over 12 months via protocols and

  2. Split bolus technique in polytrauma: a prospective study on scan protocols for trauma analysis

    NARCIS (Netherlands)

    Beenen, Ludo F. M.; Sierink, Joanne C.; Kolkman, Saskia; Nio, C. Yung; Saltzherr, Teun Peter; Dijkgraaf, Marcel G. W.; Goslings, J. Carel

    2015-01-01

    For the evaluation of severely injured trauma patients a variety of total body computed tomography (CT) scanning protocols exist. Frequently multiple pass protocols are used. A split bolus contrast protocol can reduce the number of passes through the body, and thereby radiation exposure, in this

  3. A standardised protocol for texture feature analysis of endoscopic images in gynaecological cancer

    Directory of Open Access Journals (Sweden)

    Pattichis Marios S

    2007-11-01

    Full Text Available Abstract Background In the development of tissue classification methods, classifiers rely on significant differences between texture features extracted from normal and abnormal regions. Yet, significant differences can arise due to variations in the image acquisition method. For endoscopic imaging of the endometrium, we propose a standardized image acquisition protocol to eliminate significant statistical differences due to variations in: (i the distance from the tissue (panoramic vs close up, (ii difference in viewing angles and (iii color correction. Methods We investigate texture feature variability for a variety of targets encountered in clinical endoscopy. All images were captured at clinically optimum illumination and focus using 720 × 576 pixels and 24 bits color for: (i a variety of testing targets from a color palette with a known color distribution, (ii different viewing angles, (iv two different distances from a calf endometrial and from a chicken cavity. Also, human images from the endometrium were captured and analysed. For texture feature analysis, three different sets were considered: (i Statistical Features (SF, (ii Spatial Gray Level Dependence Matrices (SGLDM, and (iii Gray Level Difference Statistics (GLDS. All images were gamma corrected and the extracted texture feature values were compared against the texture feature values extracted from the uncorrected images. Statistical tests were applied to compare images from different viewing conditions so as to determine any significant differences. Results For the proposed acquisition procedure, results indicate that there is no significant difference in texture features between the panoramic and close up views and between angles. For a calibrated target image, gamma correction provided an acquired image that was a significantly better approximation to the original target image. In turn, this implies that the texture features extracted from the corrected images provided for better

  4. Cumulative effective dose and cancer risk for pediatric population in repetitive full spine follow-up imaging: How micro dose is the EOS microdose protocol?

    Science.gov (United States)

    Law, Martin; Ma, Wang-Kei; Lau, Damian; Cheung, Kenneth; Ip, Janice; Yip, Lawrance; Lam, Wendy

    2018-04-01

    To evaluate and to obtain analytic formulation for the calculation of the effective dose and associated cancer risk using the EOS microdose protocol for scoliotic pediatric patients undergoing full spine imaging at different age of exposure; to demonstrate the microdose protocol capable of delivering lesser radiation dose and hence of further reducing cancer risk induction when compared with the EOS low dose protocol; to obtain cumulative effective dose and cancer risk for both genders scoliotic pediatrics of US and Hong Kong population using the microdose protocol. Organ absorbed doses of full spine exposed scoliotic pediatric patients have been simulated with the use of EOS microdose protocol imaging parameters input to the Monte Carlo software PCXMC. Gender and age specific effective dose has been calculated with the simulated organ absorbed dose using the ICRP-103 approach. The associated radiation induced cancer risk, expressed as lifetime attributable risk (LAR), has been estimated according to the method introduced in the Biological Effects of Ionizing Radiation VII report. Values of LAR have been estimated for scoliotic patients exposed repetitively during their follow up period at different age for US and Hong Kong population. The effective doses of full spine imaging with simultaneous posteroanterior and lateral projection for patients exposed at the age between 5 and 18 years using the EOS microdose protocol have been calculated within the range of 2.54-14.75 μSv. The corresponding LAR for US and Hong Kong population was ranged between 0.04 × 10 -6 and 0.84 × 10 -6 . Cumulative effective dose and cancer risk during follow-up period can be estimated using the results and are of information to patients and their parents. With the use of computer simulation and analytic formulation, we obtained the cumulative effective dose and cancer risk at any age of exposure for pediatric patients of US and Hong Kong population undergoing repetitive

  5. HISTOPATHOLOGICAL AND CYTOLOGICAL ANALYSIS OF TRANSMISSIBLE VENEREAL TUMOR IN DOGS AFTER TWO TREATMENT PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Fabiana Aguena Sales Lapa

    2012-06-01

    Full Text Available The transmissible venereal tumor (TVT is a contagious neoplasm of round cells that frequently affect dogs. The treatment consists of chemotherapy being more effective the vincristine alone, however the resistance emergence to this agent due multidrug resistance of the P-glycoprotein (P-gp, a transporter protein encoded by the MDR1 gene, has been taking the association with other drugs. Recent studies demonstrated the antitumoral effect of the avermectins when associated to the vincristine in the treatment of some neoplasms. Therefore, the objective of the present study was to compare the effectiveness of standard treatment of TVT with vincristine only when compared to combined treatment with vincristine and ivermectin, evaluated through number of applications of the two protocols, histopathological and cytological analysis from 50 dogs diagnosed with TVT during the period of 2007 to 2010. The combined protocol significant reduced the number of applications and cytological and histopathological findings collaborate with the hypothesis that the combination of vincristine and ivermectin promotes faster healing than the use of vincristine alone. Combination treatment with vincristine and ivermectin could be in the future an excellent therapeutic alternative for the treatment of TVT for probably reducing the resistance to vincristine, simultaneously reducing the cost of TVT treatment and promoting a faster recovery of the dog.

  6. Does modifying the timing of meal intake improve cardiovascular risk factors? Protocol of an Australian pilot intervention in night shift workers with abdominal obesity.

    Science.gov (United States)

    Bonham, Maxine P; Leung, Gloria K W; Davis, Rochelle; Sletten, Tracey L; Murgia, Chiara; Young, Morag J; Eikelis, Nina; Lambert, Elisabeth A; Huggins, Catherine E

    2018-03-14

    Shift work is an independent risk factor for cardiovascular disease (CVD). Shift workers who are awake overnight and sleep during the day are misaligned with their body's endogenous circadian rhythm. Eating at night contributes to this increased risk of CVD by forcing the body to actively break down and process nutrients at night. This pilot study aims to determine whether altering meal timing overnight, in a shift working population, will impact favourably on modifiable risk factors for CVD (postprandial bplasma lipids and glucose concentration). A randomised cross-over study with two 4-week test periods, separated by a minimum of a 2-week washout will be undertaken. The effectiveness of redistributing energy intake overnight versus ad libitum eating patterns on CVD risk factors will be examined in night shift workers (n=20), using a standard acute test meal challenge protocol. Primary outcomes (postprandial lipids and glucose) will be compared between the two conditions: post-intervention and post-control period using analysis of variance. Potential effect size estimates to inform sample size calculations for a main trial will also be generated. Ethics approval has been granted by the Monash University Human Research Ethics Committee (2017-8619-10329). Outcomes from this study will determine whether eliminating food intake for a defined period at night (1-6 am) impacts favourably on metabolic risk factors for CVD in night shift workers. Collective results from this novel trial will be disseminated through peer-reviewed journals, and national and international presentations. The results are essential to inform health promotion policies and guidelines for shift workers, especially those who aim to improve their metabolic health. ACTRN12617000791336; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  7. Implementation and Effects of Risk-Dependent Obstetric Care in the Netherlands (Expect Study II): Protocol for an Impact Study.

    Science.gov (United States)

    van Montfort, Pim; Willemse, Jessica Ppm; Dirksen, Carmen D; van Dooren, Ivo Ma; Meertens, Linda Je; Spaanderman, Marc Ea; Zelis, Maartje; Zwaan, Iris M; Scheepers, Hubertina Cj; Smits, Luc Jm

    2018-05-04

    Recently, validated risk models predicting adverse obstetric outcomes combined with risk-dependent care paths have been made available for early antenatal care in the southeastern part of the Netherlands. This study will evaluate implementation progress and impact of the new approach in obstetric care. The objective of this paper is to describe the design of a study evaluating the impact of implementing risk-dependent care. Validated first-trimester prediction models are embedded in daily clinical practice and combined with risk-dependent obstetric care paths. A multicenter prospective cohort study consisting of women who receive risk-dependent care is being performed from April 2017 to April 2018 (Expect Study II). Obstetric risk profiles will be calculated using a Web-based tool, the Expect prediction tool. The primary outcomes are the adherence of health care professionals and compliance of women. Secondary outcomes are patient satisfaction and cost-effectiveness. Outcome measures will be established using Web-based questionnaires. The secondary outcomes of the risk-dependent care cohort (Expect II) will be compared with the outcomes of a similar prospective cohort (Expect I). Women of this similar cohort received former care-as-usual and were prospectively included between July 1, 2013 and December 31, 2015 (Expect I). Currently, women are being recruited for the Expect Study II, and a total of 300 women are enrolled. This study will provide information about the implementation and impact of a new approach in obstetric care using prediction models and risk-dependent obstetric care paths. Netherlands Trial Register NTR4143; http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=4143 (Archived by WebCite at http://www.webcitation.org/6t8ijtpd9). ©Pim van Montfort, Jessica PPM Willemse, Carmen D Dirksen, Ivo MA van Dooren, Linda JE Meertens, Marc EA Spaanderman, Maartje Zelis, Iris M Zwaan, Hubertina CJ Scheepers, Luc JM Smits. Originally published in JMIR

  8. The interventional effect of new drugs combined with the Stupp protocol on glioblastoma: A network meta-analysis.

    Science.gov (United States)

    Li, Mei; Song, Xiangqi; Zhu, Jun; Fu, Aijun; Li, Jianmin; Chen, Tong

    2017-08-01

    New therapeutic agents in combination with the standard Stupp protocol (a protocol about the temozolomide combined with radiotherapy treatment with glioblastoma was research by Stupp R in 2005) were assessed to evaluate whether they were superior to the Stupp protocol alone, to determine the optimum treatment regimen for patients with newly diagnosed glioblastoma. We implemented a search strategy to identify studies in the following databases: PubMed, Cochrane Library, EMBASE, CNKI, CBM, Wanfang, and VIP, and assessed the quality of extracted data from the trials included. Statistical software was used to perform network meta-analysis. The use of novel therapeutic agents in combination with the Stupp protocol were all shown to be superior than the Stupp protocol alone for the treatment of newly diagnosed glioblastoma, ranked as follows: cilengitide 2000mg/5/week, bevacizumab in combination with irinotecan, nimotuzumab, bevacizumab, cilengitide 2000mg/2/week, cytokine-induced killer cell immunotherapy, and the Stupp protocol. In terms of serious adverse effects, the intervention group showed a 29% increase in the incidence of adverse events compared with the control group (patients treated only with Stupp protocol) with a statistically significant difference (RR=1.29; 95%CI 1.17-1.43; P<0.001). The most common adverse events were thrombocytopenia, lymphopenia, neutropenia, pneumonia, nausea, and vomiting, none of which were significantly different between the groups except for neutropenia, pneumonia, and embolism. All intervention drugs evaluated in our study were superior to the Stupp protocol alone when used in combination with it. However, we could not conclusively confirm whether cilengitide 2000mg/5/week was the optimum regime, as only one trial using this protocol was included in our study. Copyright © 2017. Published by Elsevier B.V.

  9. Aromatherapy for managing menopausal symptoms: A protocol for systematic review and meta-analysis.

    Science.gov (United States)

    Choi, Jiae; Lee, Hye Won; Lee, Ju Ah; Lim, Hyun-Ja; Lee, Myeong Soo

    2018-02-01

    Aromatherapy is often used as a complementary therapy for women's health. This systematic review aims to evaluate the therapeutic effects of aromatherapy as a management for menopausal symptoms. Eleven electronic databases will be searched from inception to February 2018. Randomized controlled trials that evaluated any type of aromatherapy against any type of control in individuals with menopausal symptoms will be eligible. The methodological quality will be assessed using the Cochrane risk of bias tool. Two authors will independently assess each study for eligibility and risk of bias and to extract data. This study will provide a high quality synthesis of current evidence of aromatherapy for menopausal symptoms measured with Menopause Rating Scale, the Kupperman Index, the Greene Climacteric Scale, or other validated questionnaires. The conclusion of our systematic review will provide evidence to judge whether aromatherapy is an effective intervention for patient with menopausal women. Ethical approval will not be required, given that this protocol is for a systematic review. The systematic review will be published in a peer-reviewed journal. The review will also be disseminated electronically and in print. PROSPERO CRD42017079191.

  10. Risk analysis for earth dam overtopping

    Directory of Open Access Journals (Sweden)

    Mo Chongxun

    2008-06-01

    Full Text Available In this paper, a model of overtopping risk under the joint effects of floods and wind waves, which is based on risk analysis theory and takes into account the uncertainties of floods, wind waves, reservoir capacity and discharge capacity of the spillway, is proposed and applied to the Chengbihe Reservoir in Baise City in Guangxi Zhuang Autonomous Region. The simulated results indicate that the flood control limiting level can be raised by 0.40 m under the condition that the reservoir overtopping risk is controlled within a mean variance of 5×10−6. As a result, the reservoir storage will increase to 16 million m3 and electrical energy generation and other functions of the reservoir will also increase greatly.

  11. Investment appraisal using quantitative risk analysis.

    Science.gov (United States)

    Johansson, Henrik

    2002-07-01

    Investment appraisal concerned with investments in fire safety systems is discussed. Particular attention is directed at evaluating, in terms of the Bayesian decision theory, the risk reduction that investment in a fire safety system involves. It is shown how the monetary value of the change from a building design without any specific fire protection system to one including such a system can be estimated by use of quantitative risk analysis, the results of which are expressed in terms of a Risk-adjusted net present value. This represents the intrinsic monetary value of investing in the fire safety system. The method suggested is exemplified by a case study performed in an Avesta Sheffield factory.

  12. Cardiovascular Risk and Its Associated Factors in Health Care Workers in Colombia: A Study Protocol

    OpenAIRE

    Gamboa Delgado, Edna M; Rojas S?nchez, Lyda Z; Bermon Angarita, Anderson; Rangel D?az, Yully Andrea; Jaraba Su?rez, Silvia J; Serrano D?az, Norma C; Vega Fern?ndez, Evaristo

    2015-01-01

    Background Cardiovascular diseases are the leading cause of mortality worldwide, for this reason, they are a public health problem. In Colombia, cardiovascular diseases are the main cause of mortality, having a death rate of 152 deaths per 100,000 population. There are 80% of these cardiovascular events that are considered avoidable. Objective The objective of the study is to determine the prevalence of the cardiovascular risk and its associated factors among the institution?s workers in orde...

  13. Quantitative Risk Analysis: Method And Process

    Directory of Open Access Journals (Sweden)

    Anass BAYAGA

    2010-03-01

    Full Text Available Recent and past studies (King III report, 2009: 73-75; Stoney 2007;Committee of Sponsoring Organisation-COSO, 2004, Bartell, 2003; Liebenberg and Hoyt, 2003; Reason, 2000; Markowitz 1957 lament that although, the introduction of quantifying risk to enhance degree of objectivity in finance for instance was quite parallel to its development in the manufacturing industry, it is not the same in Higher Education Institution (HEI. In this regard, the objective of the paper was to demonstrate the methods and process of Quantitative Risk Analysis (QRA through likelihood of occurrence of risk (phase I. This paper serves as first of a two-phased study, which sampled hundred (100 risk analysts in a University in the greater Eastern Cape Province of South Africa.The analysis of likelihood of occurrence of risk by logistic regression and percentages were conducted to investigate whether there were a significant difference or not between groups (analyst in respect of QRA.The Hosmer and Lemeshow test was non-significant with a chi-square(X2 =8.181; p = 0.300, which indicated that there was a good model fit, since the data did not significantly deviate from the model. The study concluded that to derive an overall likelihood rating that indicated the probability that a potential risk may be exercised within the construct of an associated threat environment, the following governing factors must be considered: (1 threat source motivation and capability (2 nature of the vulnerability (3 existence and effectiveness of current controls (methods and process.

  14. Risk analysis as a decision tool

    International Nuclear Information System (INIS)

    Yadigaroglu, G.; Chakraborty, S.

    1985-01-01

    From 1983 - 1985 a lecture series entitled ''Risk-benefit analysis'' was held at the Swiss Federal Institute of Technology (ETH), Zurich, in cooperation with the Central Department for the Safety of Nuclear Installations of the Swiss Federal Agency of Energy Economy. In that setting the value of risk-oriented evaluation models as a decision tool in safety questions was discussed on a broad basis. Experts of international reputation from the Federal Republic of Germany, France, Canada, the United States and Switzerland have contributed to report in this joint volume on the uses of such models. Following an introductory synopsis on risk analysis and risk assessment the book deals with practical examples in the fields of medicine, nuclear power, chemistry, transport and civil engineering. Particular attention is paid to the dialogue between analysts and decision makers taking into account the economic-technical aspects and social values. The recent chemical disaster in the Indian city of Bhopal again signals the necessity of such analyses. All the lectures were recorded individually. (orig./HP) [de

  15. Quantitative risk analysis preoperational of gas pipeline

    Energy Technology Data Exchange (ETDEWEB)

    Manfredi, Carlos; Bispo, Gustavo G.; Esteves, Alvaro [Gie S.A., Buenos Aires (Argentina)

    2009-07-01

    The purpose of this analysis is to predict how it can be affected the individual risk and the public's general security due to the operation of a gas pipeline. In case that the single or social risks are considered intolerable, compared with the international standards, to be recommended measures of mitigation of the risk associated to the operation until levels that can be considered compatible with the best practices in the industry. The quantitative risk analysis calculates the probability of occurrence of an event based on the frequency of occurrence of the same one and it requires a complex mathematical treatment. The present work has as objective to develop a calculation methodology based on the previously mentioned publication. This calculation methodology is centered in defining the frequencies of occurrence of events, according to representative database of each case in study. Besides, it settles down the consequences particularly according to the considerations of each area and the different possibilities of interferences with the gas pipeline in study. For each one of the interferences a typical curve of ignition probabilities is developed in function from the distance to the pipe. (author)

  16. Risk analysis in oil spill response planning

    International Nuclear Information System (INIS)

    Chernoplekov, A.N.; Alexandrov, A.A.

    2005-01-01

    Tiered response is a basic approach to emergency plans, including oil spill response (OSR). This paper delineates a huge set of accidental scenarios within a certain tier of response generated by a computer during risk assessment. Parameters such as the amount of oil spilled, duration of discharge and types of losses should be provided in OSR scenarios. Examples of applications include offshore installations, sub sea or onshore pipelines, and localized onshore facilities. The paper demonstrates how to use risk analysis results for delineating all likely spills into groups that need a specific tier response. The best world practices and Russian regulatory approaches were outlined and compared. Corresponding algorithms were developed and their application in pipelines was presented. The algorithm combines expert's skills and spill trajectory modeling with the net environmental benefit analysis principle into the incident specific emergency response planning. 9 refs., 13 tabs., 2 figs

  17. Integrated Reliability and Risk Analysis System (IRRAS)

    International Nuclear Information System (INIS)

    Russell, K.D.; McKay, M.K.; Sattison, M.B.; Skinner, N.L.; Wood, S.T.; Rasmuson, D.M.

    1992-01-01

    The Integrated Reliability and Risk Analysis System (IRRAS) is a state-of-the-art, microcomputer-based probabilistic risk assessment (PRA) model development and analysis tool to address key nuclear plant safety issues. IRRAS is an integrated software tool that gives the user the ability to create and analyze fault trees and accident sequences using a microcomputer. This program provides functions that range from graphical fault tree construction to cut set generation and quantification. Version 1.0 of the IRRAS program was released in February of 1987. Since that time, many user comments and enhancements have been incorporated into the program providing a much more powerful and user-friendly system. This version has been designated IRRAS 4.0 and is the subject of this Reference Manual. Version 4.0 of IRRAS provides the same capabilities as Version 1.0 and adds a relational data base facility for managing the data, improved functionality, and improved algorithm performance

  18. Zero risk fuel fabrication: a systems analysis

    International Nuclear Information System (INIS)

    1979-01-01

    Zero risk is a concept used to ensure that system requirements are developed through a systems approach such that the choice(s) among alternatives represents the balanced viewpoints of performance, achievability and risk. Requirements to ensure characteristics such as stringent accountability, low personnel exposure and etc. are needed to guide the development of component and subsystems for future LMFBR fuel supply systems. To establish a consistent and objective set of requirements, RF and M-TMC has initiated a systems requirements analysis activity. This activity pivots on judgement and experience provided by a Task Force representing industrial companies engaged in fuel fabrication in licensed facilities. The Task Force members are listed in Appendix A. Input developed by this group is presented as a starting point for the systems requirements analysis

  19. Risk Analysis of Accounting Information System Infrastructure

    OpenAIRE

    MIHALACHE, Arsenie-Samoil

    2011-01-01

    National economy and security are fully dependent on information technology and infrastructure. At the core of the information infrastructure society relies on, we have the Internet, a system designed initially as a scientists’ forum for unclassified research. The use of communication networks and systems may lead to hazardous situations that generate undesirable effects such as communication systems breakdown, loss of data or taking the wrong decisions. The paper studies the risk analysis of...

  20. Risk analysis of external radiation therapy

    International Nuclear Information System (INIS)

    Arvidsson, Marcus

    2011-09-01

    External radiation therapy is carried out via a complex treatment process in which many different groups of staff work together. Much of the work is dependent on and in collaboration with advanced technical equipment. The purpose of the research task has been to identify a process for external radiation therapy and to identify, test and analyze a suitable method for performing risk analysis of external radiation therapy

  1. Risk and value analysis of SETI

    Science.gov (United States)

    Billingham, J.

    1990-01-01

    This paper attempts to apply a traditional risk and value analysis to the Search for Extraterrestrial Intelligence--SETI. In view of the difficulties of assessing the probability of success, a comparison is made between SETI and a previous search for extraterrestrial life, the biological component of Project Viking. Our application of simple Utility Theory, given some reasonable assumptions, suggests that SETI is at least as worthwhile as the biological experiment on Viking.

  2. Applied decision analysis and risk evaluation

    International Nuclear Information System (INIS)

    Ferse, W.; Kruber, S.

    1995-01-01

    During 1994 the workgroup 'Applied Decision Analysis and Risk Evaluation; continued the work on the knowledge based decision support system XUMA-GEFA for the evaluation of the hazard potential of contaminated sites. Additionally a new research direction was started which aims at the support of a later stage of the treatment of contaminated sites: The clean-up decision. For the support of decisions arising at this stage, the methods of decision analysis will be used. Computational aids for evaluation and decision support were implemented and a case study at a waste disposal site in Saxony which turns out to be a danger for the surrounding groundwater ressource was initiated. (orig.)

  3. Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks

    DEFF Research Database (Denmark)

    Zenner, Erik

    In order to save bandwidth and thus battery power, sensor network measurements are sometimes aggregated en-route while being reported back to the querying server. Authentication of the measurements then becomes a challenge if message integrity is important for the application. At ESAS 2007, the End......-by-Hop protocol for securing in-network aggregation for sensor nodes was presented. The solution was claimed to be secure and efficient and to provide the possibility of trading off bandwidth against computation time on the server. In this paper, we disprove these claims. We describe several attacks against...... the proposed solution and point out shortcomings in the original complexity analysis. In particular, we show that the proposed solution is inferior to a naive solution without in-network aggregation both in security and in efficiency....

  4. LANDSAFE: LANDING SITE RISK ANALYSIS SOFTWARE FRAMEWORK

    Directory of Open Access Journals (Sweden)

    R. Schmidt

    2012-08-01

    Full Text Available The European Space Agency (ESA is planning a Lunar Lander mission in the 2018 timeframe that will demonstrate precise soft landing at the polar regions of the Moon. To ensure a safe and successful landing a careful risk analysis has to be carried out. This is comprised of identifying favorable target areas and evaluating the surface conditions in these areas. Features like craters, boulders, steep slopes, rough surfaces and shadow areas have to be identified in order to assess the risk associated to a landing site in terms of a successful touchdown and subsequent surface operation of the lander. In addition, global illumination conditions at the landing site have to be simulated and analyzed. The Landing Site Risk Analysis software framework (LandSAfe is a system for the analysis, selection and certification of safe landing sites on the lunar surface. LandSAfe generates several data products including high resolution digital terrain models (DTMs, hazard maps, illumination maps, temperature maps and surface reflectance maps which assist the user in evaluating potential landing site candidates. This paper presents the LandSAfe system and describes the methods and products of the different modules. For one candidate landing site on the rim of Shackleton crater at the south pole of the Moon a high resolution DTM is showcased.

  5. Venom Immunotherapy in High-Risk Patients: The Advantage of the Rush Build-Up Protocol.

    Science.gov (United States)

    Rosman, Yossi; Confino-Cohen, Ronit; Goldberg, Arnon

    2017-01-01

    Venom immunotherapy (VIT) is considered to be the gold standard treatment for patients with hymenoptera venom allergy. This treatment induces systemic reactions (SR) in a significant number of patients. To evaluate the outcome of VIT in patients with known risk factors for VIT-induced SR and to compare rush VIT (RVIT) and conventional VIT (CVIT). All of the patients who received VIT and had at least one of the following risk factors were included: current cardiovascular disease, uncontrolled asthma, high basal serum tryptase, current treatment with β-blockers or angiotensin-converting enzyme inhibitors, and age >70 or bee venom. Thirty-five (54.7%) patients underwent RVIT and 29 CVIT. The incidence of patients who developed SR during the build-up phase was similar for RVIT and CVIT (25.7 and 27.5%, respectively; p = 1). However, the incidence of SR per injection was significantly higher in CVIT than in RVIT (5.6 and 2.75%, respectively; p = 0.01). Most reactions (79.1%) were mild, limited to the skin. Most of the patients (92.1%) reached the full maintenance dose of 100 μg. This dose was reached by a significantly larger number of patients receiving RVIT compared to CVIT (100 and 82.7%, respectively; p = 0.01). None of the patients experienced exacerbation of their concurrent chronic disease during VIT. VIT can be performed safely and efficiently in patients with risk factors for immunotherapy. In these patients RVIT appears to be safer and more efficient than CVIT. © 2017 S. Karger AG, Basel.

  6. Dementia Population Risk Tool (DemPoRT): study protocol for a predictive algorithm assessing dementia risk in the community.

    Science.gov (United States)

    Fisher, Stacey; Hsu, Amy; Mojaverian, Nassim; Taljaard, Monica; Huyer, Gregory; Manuel, Douglas G; Tanuseputro, Peter

    2017-10-24

    The burden of disease from dementia is a growing global concern as incidence increases dramatically with age, and average life expectancy has been increasing around the world. Planning for an ageing population requires reliable projections of dementia prevalence; however, existing population projections are simple and have poor predictive accuracy. The Dementia Population Risk Tool (DemPoRT) will predict incidence of dementia in the population setting using multivariable modelling techniques and will be used to project dementia prevalence. The derivation cohort will consist of elderly Ontario respondents of the Canadian Community Health Survey (CCHS) (2001, 2003, 2005 and 2007; 18 764 males and 25 288 females). Prespecified predictors include sociodemographic, general health, behavioural, functional and health condition variables. Incident dementia will be identified through individual linkage of survey respondents to population-level administrative healthcare databases (1797 and 3281 events, and 117 795 and 166 573 person-years of follow-up, for males and females, respectively, until 31 March 2014). Using time of first dementia capture as the primary outcome and death as a competing risk, sex-specific proportional hazards regression models will be estimated. The 2008/2009 CCHS survey will be used for validation (approximately 4600 males and 6300 females). Overall calibration and discrimination will be assessed as well as calibration within predefined subgroups of importance to clinicians and policy makers. Research ethics approval has been granted by the Ottawa Health Science Network Research Ethics Board. DemPoRT results will be submitted for publication in peer-review journals and presented at scientific meetings. The algorithm will be assessable online for both population and individual uses. ClinicalTrials.gov NCT03155815, pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No

  7. Is there a social gradient of sarcopenia? A meta-analysis and systematic review protocol.

    Science.gov (United States)

    Green, Darci; Duque, Gustavo; Fredman, Nick; Rizvi, Aoun; Brennan-Olsen, Sharon Lee

    2018-01-13

    Sarcopenia (or loss of muscle mass and function) is a relatively new area within the field of musculoskeletal research and medicine. Investigating whether there is a social gradient, including occupation type and income level, of sarcopenia, as observed for other diseases, will contribute significantly to the limited evidence base for this disease. This new information may inform the prevention and management of sarcopenia and widen the evidence base to support existing and future health campaigns. We will conduct a systematic search of the databases PubMed, Ovid, CINAHL, Scopus and EMBASE to identify articles that investigate associations between social determinants of health and sarcopenia in adults aged 50 years and older. Eligibility of the selected studies will be determined by two independent reviewers. The methodological quality of eligible studies will be assessed according to predetermined criteria. Established statistical methods to identify and control for heterogeneity will be used, and where appropriate, we will conduct a meta-analysis. In the event that heterogeneity prevents numerical synthesis, a best evidence analysis will be employed. This systematic review protocol adheres to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols reporting guidelines and will be registered with the International Prospective Register of Systematic Reviews (PROSPERO). This systematic review will use published data, thus ethical permissions will not be required. In addition to peer-reviewed publication, our results will be presented at (inter)national conferences relevant to the field of sarcopenia, ageing and/or musculoskeletal health and disseminated both electronically and in print. CRD42017072253. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  8. Risk and protective factors associated with being a victim of aggression in the health sector. Research protocol

    Directory of Open Access Journals (Sweden)

    Giovanna Parmigiani

    2016-09-01

    Full Text Available Background: aggression against healthcare workers is an alarming issue worldwide. However, there is lack of data on psychological vulnerability factors (such as personality traits, attachment style which can constitute a risk or a protective factor for being a victim of an episode of violence in the health sector. Methods/design: the present protocol is a cross-sectional study on prevalence and characteristics of violent episodes experienced by nursing students in the clinical setting. Its aim is to identify risk and protective factors for becoming a victim of verbal and/or physical aggression among healthcare workers. Participants will undergo an intensive battery of psychometric tests, dealing with episodes of aggression in the previous year, attachment style, personality traits, perceived stress, health related quality of life and job strain. Conclusions: the findings derived from this study may be of value in identifying vulnerability factors in experiencing an episode of aggression in the health sector. In this respect, it is a step towards the development of valid training and support focused on health workers, aimed at teaching them how to modulate and manage their vulnerability factors in an efficient way.

  9. Effects of falls prevention interventions on falls outcomes for hospitalised adults: protocol for a systematic review with meta-analysis.

    Science.gov (United States)

    Slade, Susan C; Carey, David L; Hill, Anne-Marie; Morris, Meg E

    2017-11-12

    Falls are a major global public health problem and leading cause of accidental or unintentional injury and hospitalisation. Falls in hospital are associated with longer length of stay, readmissions and poor outcomes. Falls prevention is informed by knowledge of reversible falls risk factors and accurate risk identification. The extent to which hospital falls are prevented by evidence-based practice, patient self-management initiatives, environmental modifications and optimisation of falls prevention systems awaits confirmation. Published reviews have mainly evaluated community settings and residential care facilities. A better understanding of hospital falls and the most effective strategies to prevent them is vital to keeping people safe. To evaluate the effectiveness of falls prevention interventions on reducing falls in hospitalised adults (acute and subacute wards, rehabilitation, mental health, operating theatre and emergency departments). We also summarise components of effective falls prevention interventions. This protocol has been registered. The systematic review will be informed by Cochrane guidelines and reported according to the Preferred Reporting Items for Systematic review and Meta-Analysis statement. randomised controlled trials, quasi-randomised trials or controlled clinical trials that evaluate falls prevention interventions for use by hospitalised adults or employees. Electronic databases will be searched using key terms including falls, accidental falls, prevention, hospital, rehabilitation, emergency, mental health, acute and subacute. Pairs of independent reviewers will conduct all review steps. Included studies will be evaluated for risk of bias. Data for variables such as age, participant characteristics, settings and interventions will be extracted and analysed with descriptive statistics and meta-analysis where possible. The results will be presented textually, with flow charts, summary tables, statistical analysis (and meta-analysis

  10. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  11. Safety analysis and risk assessment handbook

    International Nuclear Information System (INIS)

    Peterson, V.L.; Colwell, R.G.; Dickey, R.L.

    1997-01-01

    This Safety Analysis and Risk Assessment Handbook (SARAH) provides guidance to the safety analyst at the Rocky Flats Environmental Technology Site (RFETS) in the preparation of safety analyses and risk assessments. Although the older guidance (the Rocky Flats Risk Assessment Guide) continues to be used for updating the Final Safety Analysis Reports developed in the mid-1980s, this new guidance is used with all new authorization basis documents. With the mission change at RFETS came the need to establish new authorization basis documents for its facilities, whose functions had changed. The methodology and databases for performing the evaluations that support the new authorization basis documents had to be standardized, to avoid the use of different approaches and/or databases for similar accidents in different facilities. This handbook presents this new standardized approach. The handbook begins with a discussion of the requirements of the different types of authorization basis documents and how to choose the one appropriate for the facility to be evaluated. It then walks the analyst through the process of identifying all the potential hazards in the facility, classifying them, and choosing the ones that need to be analyzed further. It then discusses the methods for evaluating accident initiation and progression and covers the basic steps in a safety analysis, including consequence and frequency binning and risk ranking. The handbook lays out standardized approaches for determining the source terms of the various accidents (including airborne release fractions, leakpath factors, etc.), the atmospheric dispersion factors appropriate for Rocky Flats, and the methods for radiological and chemical consequence assessments. The radiological assessments use a radiological open-quotes templateclose quotes, a spreadsheet that incorporates the standard values of parameters, whereas the chemical assessments use the standard codes ARCHIE and ALOHA

  12. Risk analysis of nuclear safeguards regulations

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Altman, W.D.; Judd, B.R.

    1982-06-01

    The Aggregated Systems Model (ASM), a probabilisitic risk analysis tool for nuclear safeguards, was applied to determine benefits and costs of proposed amendments to NRC regulations governing nuclear material control and accounting systems. The objective of the amendments was to improve the ability to detect insiders attempting to steal large quantities of special nuclear material (SNM). Insider threats range from likely events with minor consequences to unlikely events with catastrophic consequences. Moreover, establishing safeguards regulations is complicated by uncertainties in threats, safeguards performance, and consequences, and by the subjective judgments and difficult trade-offs between risks and safeguards costs. The ASM systematically incorporates these factors in a comprehensive, analytical framework. The ASM was used to evaluate the effectiveness of current safeguards and to quantify the risk of SNM theft. Various modifications designed to meet the objectives of the proposed amendments to reduce that risk were analyzed. Safeguards effectiveness was judged in terms of the probability of detecting and preventing theft, the expected time to detection, and the expected quantity of SNM diverted in a year. Data were gathered in tours and interviews at NRC-licensed facilities. The assessment at each facility was begun by carefully selecting scenarios representing the range of potential insider threats. A team of analysts and facility managers assigned probabilities for detection and prevention events in each scenario. Using the ASM we computed the measures of system effectiveness and identified cost-effective safeguards modifications that met the objectives of the proposed amendments

  13. AGROFOREST SYSTEM INVESTMENT ANALYSIS UNDER RISK

    Directory of Open Access Journals (Sweden)

    Luiz Moreira Coelho Junior

    2008-12-01

    Full Text Available Agroforestry System is the ecological and economical interaction of the use of the land, with the combination ofagriculture, livestock and forest production, in temporary sequence and in a simultaneous way. The studies of investments in projectsassume the existence of risks and uncertainties. An alternative to reduce the risk in the forest investment is the association with theagricultural. This work analyzed the situations of risk of a system agroflorestal. Monte Carlo s method comes from the theory ofsimulations and stands out as a powerful and useful tool to provide a distribution of probabilities for the analysis of decision. A totalof 10,000 interactions of the Net Present Value (VPL, of Internal Rate of Return (TIR and of the Equivalent Periodic Benefit (BPEwere made in order to establish the probability distribution. The results presented 78.65% of chance of VPL being US$ 1,410.00;77.56% of chance of TIR being 36.36%, and; 75.39% of chance of BPE being US$ 309.70; the agroforestry system presented lowinvestment risk; and the livestock is the main product of the agrossilvopastoril system, followed by charcoal.

  14. Approach to uncertainty in risk analysis

    Energy Technology Data Exchange (ETDEWEB)

    Rish, W.R.

    1988-08-01

    In the Fall of 1985 EPA's Office of Radiation Programs (ORP) initiated a project to develop a formal approach to dealing with uncertainties encountered when estimating and evaluating risks to human health and the environment. Based on a literature review of modeling uncertainty, interviews with ORP technical and management staff, and input from experts on uncertainty analysis, a comprehensive approach was developed. This approach recognizes by design the constraints on budget, time, manpower, expertise, and availability of information often encountered in ''real world'' modeling. It is based on the observation that in practice risk modeling is usually done to support a decision process. As such, the approach focuses on how to frame a given risk modeling problem, how to use that framing to select an appropriate mixture of uncertainty analyses techniques, and how to integrate the techniques into an uncertainty assessment that effectively communicates important information and insight to decision-makers. The approach is presented in this report. Practical guidance on characterizing and analyzing uncertainties about model form and quantities and on effectively communicating uncertainty analysis results is included. Examples from actual applications are presented.

  15. Approach to uncertainty in risk analysis

    International Nuclear Information System (INIS)

    Rish, W.R.

    1988-08-01

    In the Fall of 1985 EPA's Office of Radiation Programs (ORP) initiated a project to develop a formal approach to dealing with uncertainties encountered when estimating and evaluating risks to human health and the environment. Based on a literature review of modeling uncertainty, interviews with ORP technical and management staff, and input from experts on uncertainty analysis, a comprehensive approach was developed. This approach recognizes by design the constraints on budget, time, manpower, expertise, and availability of information often encountered in ''real world'' modeling. It is based on the observation that in practice risk modeling is usually done to support a decision process. As such, the approach focuses on how to frame a given risk modeling problem, how to use that framing to select an appropriate mixture of uncertainty analyses techniques, and how to integrate the techniques into an uncertainty assessment that effectively communicates important information and insight to decision-makers. The approach is presented in this report. Practical guidance on characterizing and analyzing uncertainties about model form and quantities and on effectively communicating uncertainty analysis results is included. Examples from actual applications are presented

  16. An analysis of moderate sedation protocols used in dental specialty programs: a retrospective observational study.

    Science.gov (United States)

    Setty, Madhavi; Montagnese, Thomas A; Baur, Dale; Aminoshariae, Anita; Mickel, Andre

    2014-09-01

    Pain and anxiety control is critical in dental practice. Moderate sedation is a useful adjunct in managing a variety of conditions that make it difficult or impossible for some people to undergo certain dental procedures. The purpose of this study was to analyze the sedation protocols used in 3 dental specialty programs at the Case Western Reserve University School of Dental Medicine, Cleveland, OH. A retrospective analysis was performed using dental school records of patients receiving moderate sedation in the graduate endodontic, periodontic, and oral surgery programs from January 1, 2010, to December 31, 2012. Information was gathered and the data compiled regarding the reasons for sedation, age, sex, pertinent medical conditions, American Society of Anesthesiologists physical status classifications, routes of administration, drugs, dosages, failures, complications, and other information that was recorded. The reasons for the use of moderate sedation were anxiety (54%), local anesthesia failures (15%), fear of needles (15%), severe gag reflex (8%), and claustrophobia with the rubber dam (8%). The most common medical conditions were hypertension (17%), asthma (15%), and bipolar disorder (8%). Most patients were classified as American Society of Anesthesiologists class II. More women (63.1%) were treated than men (36.9%). The mean age was 45 years. Monitoring and drugs varied among the programs. The most common tooth treated in the endodontic program was the mandibular molar. There are differences in the moderate sedation protocols used in the endodontic, periodontic, and oral surgery programs regarding monitoring, drugs used, and record keeping. Copyright © 2014 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  17. Hierarchical evaluation of electrical stimulation protocols for chronic wound healing: An effect size meta-analysis.

    Science.gov (United States)

    Khouri, Charles; Kotzki, Sylvain; Roustit, Matthieu; Blaise, Sophie; Gueyffier, Francois; Cracowski, Jean-Luc

    2017-09-01

    Electrical stimulation (ES) has been tested for decades to improve chronic wound healing. However, uncertainty remains on the magnitude of the efficacy and on the best applicable protocol. We conducted an effect size meta-analysis to assess the overall efficacy of ES on wound healing, to compare the efficacy of the different modalities of electrical stimulation, and to determine whether efficacy differs depending on the wound etiology, size, and age of the chronic wound. Twenty-nine randomized clinical trials with 1,510 patients and 1,753 ulcers were selected. Overall efficacy of ES on would healing was a 0.72 SMD (95% CI: 0.48, 1) corresponding to a moderate to large effect size. We found that unidirectional high voltage pulsed current (HVPC) with the active electrode over the wound was the best evidence-based protocol to improve wound healing with a 0.8 SMD (95% CI: 0.38, 1.21), while evaluation of the efficacy of direct current was limited by the small number of studies. ES was more effective on pressure ulcers compared to venous and diabetic ulcers, and efficacy trended to be inversely associated with the wound size and duration. This study confirms the overall efficacy of ES to enhance healing of chronic wounds and highlights the superiority of HVPC over other type of currents, which is more effective on pressure ulcers, and inversely associated with the wound size and duration. This will enable to standardize future ES practices. © 2017 by the Wound Healing Society.

  18. System Analysis and Risk Assessment (SARA) system

    International Nuclear Information System (INIS)

    Krantz, E.A.; Russell, K.D.; Stewart, H.D.; Van Siclen, V.S.

    1986-01-01

    Utilization of Probabilistic Risk Assessment (PRA) related information in the day-to-day operation of plant systems has, in the past, been impracticable due to the size of the computers needed to run PRA codes. This paper discusses a microcomputer-based database system which can greatly enhance the capability of operators or regulators to incorporate PRA methodologies into their routine decision making. This system is called the System Analysis and Risk Assessment (SARA) system. SARA was developed by EG and G Idaho, Inc. at the Idaho National Engineering Laboratory to facilitate the study of frequency and consequence analyses of accident sequences from a large number of light water reactors (LWRs) in this country. This information is being amassed by several studies sponsored by the United States Nuclear Regulatory Commission (USNRC). To meet the need of portability and accessibility, and to perform the variety of calculations necessary, it was felt that a microcomputer-based system would be most suitable

  19. Methodologies for risk analysis in slope instability

    International Nuclear Information System (INIS)

    Bernabeu Garcia, M.; Diaz Torres, J. A.

    2014-01-01

    This paper is an approach to the different methodologies used in conducting landslide risk maps so that the reader can get a basic knowledge about how to proceed in its development. The landslide hazard maps are increasingly demanded by governments. This is because due to climate change, deforestation and the pressure exerted by the growth of urban centers, damage caused by natural phenomena is increasing each year, making this area of work a field of study with increasing importance. To explain the process of mapping a journey through each of the phases of which it is composed is made: from the study of the types of slope movements and the necessary management of geographic information systems (GIS) inventories and landslide susceptibility analysis, threat, vulnerability and risk. (Author)

  20. Model risk analysis for risk management and option pricing

    NARCIS (Netherlands)

    Kerkhof, F.L.J.

    2003-01-01

    Due to the growing complexity of products in financial markets, market participants rely more and more on quantitative models for trading and risk management decisions. This introduces a fairly new type of risk, namely, model risk. In the first part of this thesis we investigate the quantitative

  1. Evaluation of Extraction Protocols for Simultaneous Polar and Non-Polar Yeast Metabolite Analysis Using Multivariate Projection Methods

    Directory of Open Access Journals (Sweden)

    Nicolas P. Tambellini

    2013-07-01

    Full Text Available Metabolomic and lipidomic approaches aim to measure metabolites or lipids in the cell. Metabolite extraction is a key step in obtaining useful and reliable data for successful metabolite studies. Significant efforts have been made to identify the optimal extraction protocol for various platforms and biological systems, for both polar and non-polar metabolites. Here we report an approach utilizing chemoinformatics for systematic comparison of protocols to extract both from a single sample of the model yeast organism Saccharomyces cerevisiae. Three chloroform/methanol/water partitioning based extraction protocols found in literature were evaluated for their effectiveness at reproducibly extracting both polar and non-polar metabolites. Fatty acid methyl esters and methoxyamine/trimethylsilyl derivatized aqueous compounds were analyzed by gas chromatography mass spectrometry to evaluate non-polar or polar metabolite analysis. The comparative breadth and amount of recovered metabolites was evaluated using multivariate projection methods. This approach identified an optimal protocol consisting of 64 identified polar metabolites from 105 ion hits and 12 fatty acids recovered, and will potentially attenuate the error and variation associated with combining metabolite profiles from different samples for untargeted analysis with both polar and non-polar analytes. It also confirmed the value of using multivariate projection methods to compare established extraction protocols.

  2. Nuclear risk analysis of the Ulysses mission

    International Nuclear Information System (INIS)

    Bartram, B.W.; Vaughan, F.R.; Englehart, D.R.W.

    1991-01-01

    The use of a radioisotope thermoelectric generator fueled with plutonium-238 dioxide on the Space Shuttle-launched Ulysses mission implies some level of risk due to potential accidents. This paper describes the method used to quantify risks in the Ulysses mission Final Safety Analysis Report prepared for the U.S. Department of Energy. The starting point for the analysis described herein is following input of source term probability distributions from the General Electric Company. A Monte Carlo technique is used to develop probability distributions of radiological consequences for a range of accident scenarios thoughout the mission. Factors affecting radiological consequences are identified, the probability distribution of the effect of each factor determined, and the functional relationship among all the factors established. The probability distributions of all the factor effects are then combined using a Monte Carlo technique. The results of the analysis are presented in terms of complementary cumulative distribution functions (CCDF) by mission sub-phase, phase, and the overall mission. The CCDFs show the total probability that consequences (calculated health effects) would be equal to or greater than a given value

  3. Protocol for assessing maternal, environmental and epigenetic risk factors for dental caries in children.

    Science.gov (United States)

    Fernando, Surani; Speicher, David J; Bakr, Mahmoud M; Benton, Miles C; Lea, Rodney A; Scuffham, Paul A; Mihala, Gabor; Johnson, Newell W

    2015-12-29

    Expenditure on dental and oral health services in Australia is $3.4 billion AUD annually. This is the sixth highest health cost and accounts for 7 % of total national health expenditure. Approximately 49 % of Australian children aged 6 years have caries experience in their deciduous teeth and this is rising. The aetiology of dental caries involves a complex interplay of individual, behavioural, social, economic, political and environmental conditions, and there is increasing interest in genetic predisposition and epigenetic modification. The Oral Health Sub-study; a cross sectional study of a birth cohort began in November 2012 by examining mothers and their children who were six years old by the time of initiation of the study, which is ongoing. Data from detailed questionnaires of families from birth onwards and data on mothers' knowledge, attitudes and practices towards oral health collected at the time of clinical examination are used. Subjects' height, weight and mid-waist circumference are taken and Body Mass Index (BMI) computed, using an electronic Bio-Impedance balance. Dental caries experience is scored using the International Caries Detection and Assessment System (ICDAS). Saliva is collected for physiological measures. Salivary Deoxyribose Nucleic Acid (DNA) is extracted for genetic studies including epigenetics using the SeqCap Epi Enrichment Kit. Targets of interest are being confirmed by pyrosequencing to identify potential epigenetic markers of caries risk. This study will examine a wide range of potential determinants for childhood dental caries and evaluate inter-relationships amongst them. The findings will provide an evidence base to plan and implement improved preventive strategies.

  4. Complementary feeding and the early origins of obesity risk: a study protocol.

    Science.gov (United States)

    Muniandy, Naleena Devi; Allotey, Pascale A; Soyiri, Ireneous N; Reidpath, Daniel D

    2016-11-15

    The rise in the prevalence of childhood obesity worldwide calls for an intervention earlier in the life cycle. Studies show that nutrition during early infancy may contribute to later obesity. Hence, this study is designed to determine if the variation in complementary feeding practices poses a risk for the development of obesity later in life. A mixed methods approach will be used in conducting this study. The target participants are infants born from January to June 2015 in the South East Asia Community Observatory (SEACO) platform. The SEACO is a Health and Demographic Surveillance System (HDSS) that is established in the District of Segamat in the state of Johor, Malaysia. For the quantitative strand, the sociodemographic data, feeding practices, anthropometry measurement and total nutrient intake will be assessed. The assessment will occur around the time complementary feeding is expected to start (7 Months) and again at 12 months. A 24-hour diet recall and a 2-day food diary will be used to assess the food intake. For the qualitative strand, selected mothers will be interviewed to explore their infant feeding practices and factors that influence their practices and food choices in detail. Ethical clearance for this study was sought through the Monash University Human Research and Ethics Committee (application number CF14/3850-2014002010). Subsequently, the findings of this study will be disseminated through peer-reviewed journals, national and international conferences. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  5. Risk management and analysis: risk assessment (qualitative and quantitative)

    OpenAIRE

    Valentin Mazareanu

    2007-01-01

    We use to define risk as the possibility of suffering a loss. Starting this, risk management is defined as a business process whose purpose is to ensure that the organization is protected against risks and their effects. In order to prioritize, to develop a response plan and after that to monitor the identified risks we need to asses them. But at this point a question is born: should I choose a qualitative approach or a quantitative one? This paper will make a short overview over the risk eva...

  6. A critical analysis of a locally agreed protocol for clinical practice

    International Nuclear Information System (INIS)

    Owen, A.; Hogg, P.; Nightingale, J.

    2004-01-01

    Within the traditional scope of radiographic practice (including advanced practice) there is a need to demonstrate effective patient care and management. Such practice should be set within a context of appropriate evidence and should also reflect peer practice. In order to achieve such practice the use of protocols is encouraged. Effective protocols can maximise care and management by minimising inter- and intra-professional variation; they can also allow for detailed procedural records to be kept in case of legal claims. However, whilst literature exists to encourage the use of protocols there is little published material available to indicate how to create, manage and archive them. This article uses an analytical approach to propose a suitable method for protocol creation and archival, it also offers suggestions on the scope and content of a protocol. To achieve this an existing clinical protocol for radiographer reporting barium enemas is analysed to draw out the general issues. Proposals for protocol creation, management, and archival were identified. The clinical practice described or inferred in the protocol should be drawn from evidence, such evidence could include peer-reviewed material, national standards and peer practice. The protocol should include an explanation of how to proceed when the radiographers reach the limit of their ability. It should refer to the initial training required to undertake the clinical duties as well as the on-going continual professional updating required to maintain competence. Audit of practice should be indicated, including the preferred audit methodology, and associated with this should be a clear statement about standards and what to do if standards are not adequately met. Protocols should be archived, in a paper-based form, for lengthy periods in case of legal claims. On the archived protocol the date it was in clinical use should be included

  7. RISK ANALYSIS APPLIED IN OIL EXPLORATION AND PRODUCTION

    African Journals Online (AJOL)

    ES Obe

    aDepartment of Civil Engineering, University of Nigeria, Nsukka, Enugu State, Nigeria. ... The analysis in this work is ... risk analysis, oil field, risk management, projects, investment opportunity. 1. .... own merit but since the company has limited.

  8. Specimen preparation, imaging, and analysis protocols for knife-edge scanning microscopy.

    Science.gov (United States)

    Choe, Yoonsuck; Mayerich, David; Kwon, Jaerock; Miller, Daniel E; Sung, Chul; Chung, Ji Ryang; Huffman, Todd; Keyser, John; Abbott, Louise C

    2011-12-09

    Major advances in high-throughput, high-resolution, 3D microscopy techniques have enabled the acquisition of large volumes of neuroanatomical data at submicrometer resolution. One of the first such instruments producing whole-brain-scale data is the Knife-Edge Scanning Microscope (KESM), developed and hosted in the authors' lab. KESM has been used to section and image whole mouse brains at submicrometer resolution, revealing the intricate details of the neuronal networks (Golgi), vascular networks (India ink), and cell body distribution (Nissl). The use of KESM is not restricted to the mouse nor the brain. We have successfully imaged the octopus brain, mouse lung, and rat brain. We are currently working on whole zebra fish embryos. Data like these can greatly contribute to connectomics research; to microcirculation and hemodynamic research; and to stereology research by providing an exact ground-truth. In this article, we will describe the pipeline, including specimen preparation (fixing, staining, and embedding), KESM configuration and setup, sectioning and imaging with the KESM, image processing, data preparation, and data visualization and analysis. The emphasis will be on specimen preparation and visualization/analysis of obtained KESM data. We expect the detailed protocol presented in this article to help broaden the access to KESM and increase its utilization.

  9. Depression and risk of fracture and bone loss: an updated meta-analysis of prospective studies.

    Science.gov (United States)

    Wu, Q; Liu, B; Tonmoy, S

    2018-03-12

    This meta-analysis pooled results from 23 qualifying individual cohort studies and found that depression was significantly associated with an increased risk of fractures and bone loss. The association between depression and risk of fracture remains controversial. We conducted a comprehensive meta-analysis to examine the effect of depression on the risk of osteoporotic fractures and bone loss. We searched databases and reviewed citations in relevant articles for eligible cohort studies. Two investigators independently conducted study selection, appraisal, and data abstraction through the use of a standardized protocol. Random effect models were used for meta-analysis. Cochrane Q and I 2 statistics were used to assess heterogeneity. Funnel plots and rank correlation tests were used to evaluate publication bias. Twenty-three studies were included for meta-analysis. In studies that reported hazard ratio (HR) as the outcome (nine studies [n = 309,862]), depression was associated with 26% increase in fracture risk (HR = 1.26, 95% CI, 1.10-1.43, p meta-analysis having modified inclusion criteria and in different subgroup analyses as well. Significant heterogeneity was observed in the meta-analysis; however, no significant publication bias was detected. Depression is associated with a significant increased risk in fracture and bone loss. Effective prevention may decrease such risk.

  10. Modelling, Verification, and Comparative Performance Analysis of the B.A.T.M.A.N. Protocol

    NARCIS (Netherlands)

    Chaudhary, Kaylash; Fehnker, Ansgar; Mehta, Vinay; Hermanns, Holger; Höfner, Peter

    2017-01-01

    This paper considers on a network routing protocol known as Better Approach to Mobile Ad hoc Networks (B.A.T.M.A.N.). The protocol serves two aims: first, to discover all bidirectional links, and second, to identify the best-next-hop for every other node in the network. A key element is that each

  11. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    Science.gov (United States)

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  12. Teaching Integrity in Empirical Research: A Protocol for Documenting Data Management and Analysis

    Science.gov (United States)

    Ball, Richard; Medeiros, Norm

    2012-01-01

    This article describes a protocol the authors developed for teaching undergraduates to document their statistical analyses for empirical research projects so that their results are completely reproducible and verifiable. The protocol is guided by the principle that the documentation prepared to accompany an empirical research project should be…

  13. Modified Scoring, Traditional Item Analysis, and Sato's Caution Index Used To Investigate the Reading Recall Protocol.

    Science.gov (United States)

    Deville, Craig W.; Chalhoub-Deville, Micheline

    A study demonstrated the utility of item analyses to investigate which items function well or poorly in a second language reading recall protocol instrument. Data were drawn from a larger study of 56 learners of German as a second language at various proficiency levels. Pausal units of scored recall protocols were analyzed using both classical…

  14. Analysis and risk management after Fukushima

    International Nuclear Information System (INIS)

    Nelson, P. F.

    2011-11-01

    This article describes the impact in the nuclear industry after the only accidents with affectation to the public: the Three Mile Island and Chernobyl. and discusses what comes after Fukushima with regard to the Safety Probabilistic Analysis (Spa) and their use in the decisions taking. A reference to the standard ASME/ANS of Spa is made and the possible changes due to the learned lessons after the Fukushima accident. The main changes are described in the art state and the priorities of the Spa studies. These include the change in the mission time of the emergency systems, the necessity to model the alternating systems, the risk consideration of a site with multi-units, the importance of making a Spa level 3 and the Spa of external events. The Spa is the key tool of the discipline of risk management, but given the learned lessons, is more necessary in all the aspects of the operation and surveillance of a nuclear power plant. A strategy is presented to improve the response to a severe accident, that includes consider the risks of the specific nuclear power plant. (Author)

  15. Risk Analysis Approach to Rainwater Harvesting Systems

    Directory of Open Access Journals (Sweden)

    Nadia Ursino

    2016-08-01

    Full Text Available Urban rainwater reuse preserves water resources and promotes sustainable development in rapidly growing urban areas. The efficiency of a large number of urban water reuse systems, operating under different climate and demand conditions, is evaluated here on the base of a new risk analysis approach. Results obtained by probability analysis (PA indicate that maximum efficiency in low demanding scenarios is above 0.5 and a threshold, distinguishing low from high demanding scenarios, indicates that in low demanding scenarios no significant improvement in performance may be attained by increasing the storage capacity of rainwater harvesting tanks. Threshold behaviour is displayed when tank storage capacity is designed to match both the average collected volume and the average reuse volume. The low demand limit cannot be achieved under climate and operating conditions characterized by a disproportion between harvesting and demand volume.

  16. Non-Invasive Brain Stimulation in Children With Unilateral Cerebral Palsy: A Protocol and Risk Mitigation Guide

    Directory of Open Access Journals (Sweden)

    Bernadette T. Gillick

    2018-03-01

    Full Text Available Non-invasive brain stimulation has been increasingly investigated, mainly in adults, with the aims of influencing motor recovery after stroke. However, a consensus on safety and optimal study design has not been established in pediatrics. The low incidence of reported major adverse events in adults with and without clinical conditions has expedited the exploration of NIBS in children with paralleled purposes to influence motor skill development after neurological injury. Considering developmental variability in children, with or without a neurologic diagnosis, adult dosing and protocols may not be appropriate. The purpose of this paper is to present recommendations and tools for the prevention and mitigation of adverse events (AEs during NIBS in children with unilateral cerebral palsy (UCP. Our recommendations provide a framework for pediatric NIBS study design. The key components of this report on NIBS AEs are (a a summary of related literature to provide the background evidence and (b tools for anticipating and managing AEs from four international pediatric laboratories. These recommendations provide a preliminary guide for the assessment of safety and risk mitigation of NIBS in children with UCP. Consistent reporting of safety, feasibility, and tolerability will refine NIBS practice guidelines contributing to future clinical translations of NIBS.

  17. Patient Transfers and Risk of Back Injury: Protocol for a Prospective Cohort Study With Technical Measurements of Exposure.

    Science.gov (United States)

    Vinstrup, Jonas; Madeleine, Pascal; Jakobsen, Markus Due; Jay, Kenneth; Andersen, Lars Louis

    2017-11-08

    order to identify risk factors for back injuries related to patient transfers and intensity of LBP. Data collection is scheduled to commence during the winter of 2017. The design of this study is novel in its combination of technical measurements applied on a prospective cohort, and the results will provide important information about which assistive devices are associated with intensity of LBP and risk of back injury related to patient transfers. Furthermore, this study will shed light on the dose-response relationship between intensity, duration, and frequency of patient transfers and the intensity of LPB in Danish nurses, and will thereby help to guide and improve electronic health practices among this population. ©Jonas Vinstrup, Pascal Madeleine, Markus Due Jakobsen, Kenneth Jay, Lars Louis Andersen. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 08.11.2017.

  18. Effectiveness of a web-based health risk assessment with individually-tailored feedback on lifestyle behaviour: study protocol

    Directory of Open Access Journals (Sweden)

    Laan Eva K

    2012-03-01

    Full Text Available Abstract Background Physical inactivity, unhealthy dietary habits, smoking and high alcohol consumption are recognized risk factors for cardiovascular disease and cancer. Web-based health risk assessments with tailored feedback seem promising in promoting a healthy lifestyle. This study evaluates the effectiveness of a web-based health risk assessment with individually-tailored feedback on lifestyle behaviour, conducted in a worksite setting. Methods/Design The web-based health risk assessment starts with a questionnaire covering socio-demographic variables, family and personal medical history, lifestyle behaviour and psychological variables. Prognostic models are used to estimate individual cardiovascular risks. In case of high risk further biometric and laboratory evaluation is advised. All participants receive individually-tailored feedback on their responses to the health risk assessment questionnaire. The study uses a quasi-experimental design with a waiting list control group. Data are collected at baseline (T0 and after six months (T1. Within each company, clusters of employees are allocated to either the intervention or the control group. Primary outcome is lifestyle behaviour, expressed as the sum of five indicators namely physical activity, nutrition, smoking behaviour, alcohol consumption, and symptoms of burnout. Multilevel regression analysis will be used to answer the main research question and to correct for clustering effects. Baseline differences between the intervention and control group in the distribution of characteristics with a potential effect on lifestyle change will be taken into account in further analyses using propensity scores. Discussion This study will increase insight into the effectiveness of health risk assessments with tailored feedback and into conditions that may modify the effectiveness. This information can be used to design effective interventions for lifestyle behaviour change among employees. Trial

  19. Population-centered Risk- and Evidence-based Dental Interprofessional Care Team (PREDICT): study protocol for a randomized controlled trial.

    Science.gov (United States)

    Cunha-Cruz, Joana; Milgrom, Peter; Shirtcliff, R Michael; Bailit, Howard L; Huebner, Colleen E; Conrad, Douglas; Ludwig, Sharity; Mitchell, Melissa; Dysert, Jeanne; Allen, Gary; Scott, JoAnna; Mancl, Lloyd

    2015-06-20

    To improve the oral health of low-income children, innovations in dental delivery systems are needed, including community-based care, the use of expanded duty auxiliary dental personnel, capitation payments, and global budgets. This paper describes the protocol for PREDICT (Population-centered Risk- and Evidence-based Dental Interprofessional Care Team), an evaluation project to test the effectiveness of new delivery and payment systems for improving dental care and oral health. This is a parallel-group cluster randomized controlled trial. Fourteen rural Oregon counties with a publicly insured (Medicaid) population of 82,000 children (0 to 21 years old) and pregnant women served by a managed dental care organization are randomized into test and control counties. In the test intervention (PREDICT), allied dental personnel provide screening and preventive services in community settings and case managers serve as patient navigators to arrange referrals of children who need dentist services. The delivery system intervention is paired with a compensation system for high performance (pay-for-performance) with efficient performance monitoring. PREDICT focuses on the following: 1) identifying eligible children and gaining caregiver consent for services in community settings (for example, schools); 2) providing risk-based preventive and caries stabilization services efficiently at these settings; 3) providing curative care in dental clinics; and 4) incentivizing local delivery teams to meet performance benchmarks. In the control intervention, care is delivered in dental offices without performance incentives. The primary outcome is the prevalence of untreated dental caries. Other outcomes are related to process, structure and cost. Data are collected through patient and staff surveys, clinical examinations, and the review of health and administrative records. If effective, PREDICT is expected to substantially reduce disparities in dental care and oral health. PREDICT can be

  20. Group based prenatal care in a low-and high risk population in the Netherlands: a study protocol for a stepped wedge cluster randomized controlled trial.

    Science.gov (United States)

    van Zwicht, Birgit S; Crone, Matty R; van Lith, Jan M M; Rijnders, Marlies E B

    2016-11-15

    CenteringPregnancy (CP) is a multifaceted group based care-model integrated in routine prenatal care, combining health assessment, education, and support. CP has shown some positive results on perinatal outcomes. However, the effects are less obvious when limited to the results of randomized controlled trials: as there are few trials and there is a variation in reported outcomes. Furthermore, former research was mostly conducted in the United States of America and in specific (often high risk) populations. Our study aims to evaluate the effects of CP in the Netherlands in a general population of pregnant women (low and high risk). Furthermore we aim to explore the mechanisms leading to the eventual effects by measuring potential mediating factors. We will perform a stepped wedge cluster randomized controlled trial, in a Western region in the Netherlands. Inclusion criteria are care, women in the intervention period (starting at the randomized time-point) will be offered the choice between individual care or CP. Primary outcomes are maternal and neonatal morbidity, retrieved from a national routine database. Secondary outcomes are health behavior, psychosocial outcomes, satisfaction, health care utilization and process outcomes, collected through self-administered questionnaires, group-evaluations and individual interviews. We will conduct intention-to-treat analyses. Also a per protocol analysis will be performed comparing the three subgroups: control group, CP-participants and non-CP-participants, using multilevel techniques to account for clustering effects. This study contributes to the evidence regarding the effect of CP and gives a first indication of the effect and implementation of CP in both low and high-risk pregnancies in a high-income Western society other than the USA. Also, measuring factors that are hypothesized to mediate the effect of CP will enable to explain the mechanisms that lead to effects on maternal and neonatal outcomes. Dutch Trial

  1. Factors that are associated with the risk of acquiring Plasmodium knowlesi malaria in Sabah, Malaysia: a case-control study protocol.

    Science.gov (United States)

    Grigg, M J; William, T; Drakeley, C J; Jelip, J; von Seidlein, L; Barber, B E; Fornace, K M; Anstey, N M; Yeo, T W; Cox, J

    2014-08-22

    Plasmodium knowlesi has long been present in Malaysia, and is now an emerging cause of zoonotic human malaria. Cases have been confirmed throughout South-East Asia where the ranges of its natural macaque hosts and Anopheles leucosphyrus group vectors overlap. The majority of cases are from Eastern Malaysia, with increasing total public health notifications despite a concurrent reduction in Plasmodium falciparum and P. vivax malaria. The public health implications are concerning given P. knowlesi has the highest risk of severe and fatal disease of all Plasmodium spp in Malaysia. Current patterns of risk and disease vary based on vector type and competence, with individual exposure risks related to forest and forest-edge activities still poorly defined. Clustering of cases has not yet been systematically evaluated despite reports of peri-domestic transmission and known vector competence for human-to-human transmission. A population-based case-control study will be conducted over a 2-year period at two adjacent districts in north-west Sabah, Malaysia. Confirmed malaria cases presenting to the district hospital sites meeting relevant inclusion criteria will be requested to enrol. Three community controls matched to the same village as the case will be selected randomly. Study procedures will include blood sampling and administration of household and individual questionnaires to evaluate potential exposure risks associated with acquisition of P. knowlesi malaria. Secondary outcomes will include differences in exposure variables between P. knowlesi and other Plasmodium spp, risk of severe P. knowlesi malaria, and evaluation of P. knowlesi case clustering. Primary analysis will be per protocol, with adjusted ORs for exposure risks between cases and controls calculated using conditional multiple logistic regression models. This study has been approved by the human research ethics committees of Malaysia, the Menzies School of Health Research, Australia, and the London

  2. Dose-response relationship between cigarette smoking and site-specific cancer risk: protocol for a systematic review with an original design combining umbrella and traditional reviews.

    Science.gov (United States)

    Lugo, Alessandra; Bosetti, Cristina; Peveri, Giulia; Rota, Matteo; Bagnardi, Vincenzo; Gallus, Silvano

    2017-11-01

    Only a limited number of meta-analyses providing risk curve functions of dose-response relationships between various smoking-related variables and cancer-specific risk are available. To identify all relevant original publications on the issue, we will conduct a series of comprehensive systematic reviews based on three subsequent literature searches: (1) an umbrella review, to identify meta-analyses, pooled analyses and systematic reviews published before 28 April 2017 on the association between cigarette smoking and the risk of 28 (namely all) malignant neoplasms; (2) for each cancer site, an updated review of original publications on the association between cigarette smoking and cancer risk, starting from the last available comprehensive review identified through the umbrella review; and (3) a review of all original articles on the association between cigarette smoking and site-specific cancer risk included in the publications identified through the umbrella review and the updated reviews. The primary outcomes of interest will be (1) the excess incidence/mortality of various cancers for smokers compared with never smokers; and (2) the dose-response curves describing the association between smoking intensity, duration and time since stopping and incidence/mortality for various cancers. For each cancer site, we will perform a meta-analysis by pooling study-specific estimates for smoking status. We will also estimate the dose-response curves for other smoking-related variables through random-effects meta-regression models based on a non-linear dose-response relationship framework. Ethics approval is not required for this study. Main results will be published in peer-reviewed journals and will also be included in a publicly available website. We will provide therefore the most complete and updated estimates on the association between various measures of cigarette smoking and site-specific cancer risk. This will allow us to obtain precise estimates on the cancer burden

  3. Successful implementation of a perioperative glycemic control protocol in cardiac surgery: barrier analysis and intervention using lean six sigma.

    Science.gov (United States)

    Martinez, Elizabeth A; Chavez-Valdez, Raul; Holt, Natalie F; Grogan, Kelly L; Khalifeh, Katherine W; Slater, Tammy; Winner, Laura E; Moyer, Jennifer; Lehmann, Christoph U

    2011-01-01

    Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU) in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period.

  4. Successful Implementation of a Perioperative Glycemic Control Protocol in Cardiac Surgery: Barrier Analysis and Intervention Using Lean Six Sigma

    Science.gov (United States)

    Martinez, Elizabeth A.; Chavez-Valdez, Raul; Holt, Natalie F.; Grogan, Kelly L.; Khalifeh, Katherine W.; Slater, Tammy; Winner, Laura E.; Moyer, Jennifer; Lehmann, Christoph U.

    2011-01-01

    Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU) in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period. PMID:22091218

  5. Successful Implementation of a Perioperative Glycemic Control Protocol in Cardiac Surgery: Barrier Analysis and Intervention Using Lean Six Sigma

    Directory of Open Access Journals (Sweden)

    Elizabeth A. Martinez

    2011-01-01

    Full Text Available Although the evidence strongly supports perioperative glycemic control among cardiac surgical patients, there is scant literature to describe the practical application of such a protocol in the complex ICU environment. This paper describes the use of the Lean Six Sigma methodology to implement a perioperative insulin protocol in a cardiac surgical intensive care unit (CSICU in a large academic hospital. A preintervention chart audit revealed that fewer than 10% of patients were admitted to the CSICU with glucose <200 mg/dL, prompting the initiation of the quality improvement project. Following protocol implementation, more than 90% of patients were admitted with a glucose <200 mg/dL. Key elements to success include barrier analysis and intervention, provider education, and broadening the project scope to address the intraoperative period.

  6. Probabilistic methods in fire-risk analysis

    International Nuclear Information System (INIS)

    Brandyberry, M.D.

    1989-01-01

    The first part of this work outlines a method for assessing the frequency of ignition of a consumer product in a building and shows how the method would be used in an example scenario utilizing upholstered furniture as the product and radiant auxiliary heating devices (electric heaters, wood stoves) as the ignition source. Deterministic thermal models of the heat-transport processes are coupled with parameter uncertainty analysis of the models and with a probabilistic analysis of the events involved in a typical scenario. This leads to a distribution for the frequency of ignition for the product. In second part, fire-risk analysis as currently used in nuclear plants is outlines along with a discussion of the relevant uncertainties. The use of the computer code COMPBRN is discussed for use in the fire-growth analysis along with the use of response-surface methodology to quantify uncertainties in the code's use. Generalized response surfaces are developed for temperature versus time for a cable tray, as well as a surface for the hot gas layer temperature and depth for a room of arbitrary geometry within a typical nuclear power plant compartment. These surfaces are then used to simulate the cable tray damage time in a compartment fire experiment

  7. A Protocol for the Comprehensive Flow Cytometric Analysis of Immune Cells in Normal and Inflamed Murine Non-Lymphoid Tissues

    Science.gov (United States)

    Yu, Yen-Rei A.; O’Koren, Emily G.; Hotten, Danielle F.; Kan, Matthew J.; Kopin, David; Nelson, Erik R.; Que, Loretta; Gunn, Michael D.

    2016-01-01

    Flow cytometry is used extensively to examine immune cells in non-lymphoid tissues. However, a method of flow cytometric analysis that is both comprehensive and widely applicable has not been described. We developed a protocol for the flow cytometric analysis of non-lymphoid tissues, including methods of tissue preparation, a 10-fluorochrome panel for cell staining, and a standardized gating strategy, that allows the simultaneous identification and quantification of all major immune cell types in a variety of normal and inflamed non-lymphoid tissues. We demonstrate that our basic protocol minimizes cell loss, reliably distinguishes macrophages from dendritic cells (DC), and identifies all major granulocytic and mononuclear phagocytic cell types. This protocol is able to accurately quantify 11 distinct immune cell types, including T cells, B cells, NK cells, neutrophils, eosinophils, inflammatory monocytes, resident monocytes, alveolar macrophages, resident/interstitial macrophages, CD11b- DC, and CD11b+ DC, in normal lung, heart, liver, kidney, intestine, skin, eyes, and mammary gland. We also characterized the expression patterns of several commonly used myeloid and macrophage markers. This basic protocol can be expanded to identify additional cell types such as mast cells, basophils, and plasmacytoid DC, or perform detailed phenotyping of specific cell types. In examining models of primary and metastatic mammary tumors, this protocol allowed the identification of several distinct tumor associated macrophage phenotypes, the appearance of which was highly specific to individual tumor cell lines. This protocol provides a valuable tool to examine immune cell repertoires and follow immune responses in a wide variety of tissues and experimental conditions. PMID:26938654

  8. Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P 2015 statement

    Directory of Open Access Journals (Sweden)

    Mireia Estarli

    2016-02-01

    Full Text Available Systematic reviews should build on a protocol that describes the rationale, hypothesis, and planned methods of the review; few reviews report whether a protocol exists. Detailed, well-described protocols can facilitate the understanding and appraisal of the review methods, as well as the detection of modifications to methods and selective reporting in completed reviews. We describe the development of a reporting guideline, the Preferred Reporting Items for Systematic reviews and Meta-Analyses for Protocols 2015 (PRISMA-P 2015. PRISMA-P consists of a 17-item checklist intended to facilitate the preparation and reporting of a robust protocol for the systematic review. Funders and those commissioning reviews might consider mandating the use of the checklist to facilitate the submission of relevant protocol information in funding applications. Similarly, peer reviewers and editors can use the guidance to gauge the completeness and transparency of a systematic review protocol submitted for publication in a journal or other medium. Translation with permission of the authors. The original authors have not revised and verified the Spanish translation, and they do not necessarily endorse it.

  9. Performance Analysis of Secure and Private Billing Protocols for Smart Metering

    Directory of Open Access Journals (Sweden)

    Tom Eccles

    2017-11-01

    Full Text Available Traditional utility metering is to be replaced by smart metering. Smart metering enables fine-grained utility consumption measurements. These fine-grained measurements raise privacy concerns due to the lifestyle information which can be inferred from the precise time at which utilities were consumed. This paper outlines and compares two privacy-respecting time of use billing protocols for smart metering and investigates their performance on a variety of hardware. These protocols protect the privacy of customers by never transmitting the fine-grained utility readings outside of the customer’s home network. One protocol favors complexity on the trusted smart meter hardware while the other uses homomorphic commitments to offload computation to a third device. Both protocols are designed to operate on top of existing cryptographic secure channel protocols in place on smart meters. Proof of concept software implementations of these protocols have been written and their suitability for real world application to low-performance smart meter hardware is discussed. These protocols may also have application to other privacy conscious aggregation systems, such as electronic voting.

  10. Risk as analysis and risk as feelings: some thoughts about affect, reason, risk, and rationality.

    Science.gov (United States)

    Slovic, Paul; Finucane, Melissa L; Peters, Ellen; MacGregor, Donald G

    2004-04-01

    Modern theories in cognitive psychology and neuroscience indicate that there are two fundamental ways in which human beings comprehend risk. The "analytic system" uses algorithms and normative rules, such as probability calculus, formal logic, and risk assessment. It is relatively slow, effortful, and requires conscious control. The "experiential system" is intuitive, fast, mostly automatic, and not very accessible to conscious awareness. The experiential system enabled human beings to survive during their long period of evolution and remains today the most natural and most common way to respond to risk. It relies on images and associations, linked by experience to emotion and affect (a feeling that something is good or bad). This system represents risk as a feeling that tells us whether it is safe to walk down this dark street or drink this strange-smelling water. Proponents of formal risk analysis tend to view affective responses to risk as irrational. Current wisdom disputes this view. The rational and the experiential systems operate in parallel and each seems to depend on the other for guidance. Studies have demonstrated that analytic reasoning cannot be effective unless it is guided by emotion and affect. Rational decision making requires proper integration of both modes of thought. Both systems have their advantages, biases, and limitations. Now that we are beginning to understand the complex interplay between emotion and reason that is essential to rational behavior, the challenge before us is to think creatively about what this means for managing risk. On the one hand, how do we apply reason to temper the strong emotions engendered by some risk events? On the other hand, how do we infuse needed "doses of feeling" into circumstances where lack of experience may otherwise leave us too "coldly rational"? This article addresses these important questions.

  11. Constructing Benchmark Databases and Protocols for Medical Image Analysis: Diabetic Retinopathy

    Directory of Open Access Journals (Sweden)

    Tomi Kauppi

    2013-01-01

    Full Text Available We address the performance evaluation practices for developing medical image analysis methods, in particular, how to establish and share databases of medical images with verified ground truth and solid evaluation protocols. Such databases support the development of better algorithms, execution of profound method comparisons, and, consequently, technology transfer from research laboratories to clinical practice. For this purpose, we propose a framework consisting of reusable methods and tools for the laborious task of constructing a benchmark database. We provide a software tool for medical image annotation helping to collect class label, spatial span, and expert's confidence on lesions and a method to appropriately combine the manual segmentations from multiple experts. The tool and all necessary functionality for method evaluation are provided as public software packages. As a case study, we utilized the framework and tools to establish the DiaRetDB1 V2.1 database for benchmarking diabetic retinopathy detection algorithms. The database contains a set of retinal images, ground truth based on information from multiple experts, and a baseline algorithm for the detection of retinopathy lesions.

  12. A critical comparison of systematic calibration protocols for activated sludge models: a SWOT analysis.

    Science.gov (United States)

    Sin, Gürkan; Van Hulle, Stijn W H; De Pauw, Dirk J W; van Griensven, Ann; Vanrolleghem, Peter A

    2005-07-01

    Modelling activated sludge systems has gained an increasing momentum after the introduction of activated sludge models (ASMs) in 1987. Application of dynamic models for full-scale systems requires essentially a calibration of the chosen ASM to the case under study. Numerous full-scale model applications have been performed so far which were mostly based on ad hoc approaches and expert knowledge. Further, each modelling study has followed a different calibration approach: e.g. different influent wastewater characterization methods, different kinetic parameter estimation methods, different selection of parameters to be calibrated, different priorities within the calibration steps, etc. In short, there was no standard approach in performing the calibration study, which makes it difficult, if not impossible, to (1) compare different calibrations of ASMs with each other and (2) perform internal quality checks for each calibration study. To address these concerns, systematic calibration protocols have recently been proposed to bring guidance to the modeling of activated sludge systems and in particular to the calibration of full-scale models. In this contribution four existing calibration approaches (BIOMATH, HSG, STOWA and WERF) will be critically discussed using a SWOT (Strengths, Weaknesses, Opportunities, Threats) analysis. It will also be assessed in what way these approaches can be further developed in view of further improving the quality of ASM calibration. In this respect, the potential of automating some steps of the calibration procedure by use of mathematical algorithms is highlighted.

  13. Electroacupuncture for women with stress urinary incontinence: Protocol for a systematic review and meta-analysis.

    Science.gov (United States)

    Huang, Weixin; Li, Xiaohui; Wang, Yuanping; Yan, Xia; Wu, Siping

    2017-12-01

    Stress urinary incontinence (SUI) is a widespread complaint in the adult women. Electroacupuncture has been widely applied in the treatment of SUI. But its efficacy has not been evaluated scientifically and systematically. Therefore, we provide a protocol of systematic evaluation to assess the effectiveness and safety of electroacupuncture treatment on women with SUI. The retrieved databases include 3 English literature databases, namely PubMed, Embase, and Cochrane Library, and 3 Chinese literature databases, namely Chinese Biomedical Literature Database (CBM), China National Knowledge Infrastructure (CNKI), and Wanfang Database. The randomized controlled trials (RCTs) of the electroacupuncture treatment on women with SUI will be searched in the above-mentioned databases from the time when the respective databases were established to December 2017. The change from baseline in the amount of urine leakage measured by the 1-hour pad test will be accepted as the primary outcomes. We will use RevMan V.5.3 software as well to compute the data synthesis carefully when a meta-analysis is allowed. This study will provide a high-quality synthesis to assess the effectiveness and safety of electroacupuncture treatment on women with SUI. The conclusion of our systematic review will provide evidence to judge whether electroacupuncture is an effective intervention for women with SUI. PROSPERO CRD42017070947.

  14. Testing feedback message framing and comparators to address prescribing of high-risk medications in nursing homes: protocol for a pragmatic, factorial, cluster-randomized trial.

    Science.gov (United States)

    Ivers, Noah M; Desveaux, Laura; Presseau, Justin; Reis, Catherine; Witteman, Holly O; Taljaard, Monica K; McCleary, Nicola; Thavorn, Kednapa; Grimshaw, Jeremy M

    2017-07-14

    Audit and feedback (AF) interventions that leverage routine administrative data offer a scalable and relatively low-cost method to improve processes of care. AF interventions are usually designed to highlight discrepancies between desired and actual performance and to encourage recipients to act to address such discrepancies. Comparing to a regional average is a common approach, but more recipients would have a discrepancy if compared to a higher-than-average level of performance. In addition, how recipients perceive and respond to discrepancies may depend on how the feedback itself is framed. We aim to evaluate the effectiveness of different comparators and framing in feedback on high-risk prescribing in nursing homes. This is a pragmatic, 2 × 2 factorial, cluster-randomized controlled trial testing variations in the comparator and framing on the effectiveness of quarterly AF in changing high-risk prescribing in nursing homes in Ontario, Canada. We grouped homes that share physicians into clusters and randomized these clusters into the four experimental conditions. Outcomes will be assessed after 6 months; all primary analyses will be by intention-to-treat. The primary outcome (monthly number of high-risk medications received by each patient) will be analysed using a general linear mixed effects regression model. We will present both four-arm and factorial analyses. With 160 clusters and an average of 350 beds per cluster, assuming no interaction and similar effects for each intervention, we anticipate 90% power to detect an absolute mean difference of 0.3 high-risk medications prescribed. A mixed-methods process evaluation will explore potential mechanisms underlying the observed effects, exploring targeted constructs including intention, self-efficacy, outcome expectations, descriptive norms, and goal prioritization. An economic analysis will examine cost-effectiveness analysis from the perspective of the publicly funded health care system. This protocol

  15. Overcoming barriers to integrating economic analysis into risk assessment.

    Science.gov (United States)

    Hoffmann, Sandra

    2011-09-01

    Regulatory risk analysis is designed to provide decisionmakers with a clearer understanding of how policies are likely to affect risk. The systems that produce risk are biological, physical, and social and economic. As a result, risk analysis is an inherently interdisciplinary task. Yet in practice, risk analysis has been interdisciplinary in only limited ways. Risk analysis could provide more accurate assessments of risk if there were better integration of economics and other social sciences into risk assessment itself. This essay examines how discussions about risk analysis policy have influenced the roles of various disciplines in risk analysis. It explores ways in which integrated bio/physical-economic modeling could contribute to more accurate assessments of risk. It reviews examples of the kind of integrated economics-bio/physical modeling that could be used to enhance risk assessment. The essay ends with a discussion of institutional barriers to greater integration of economic modeling into risk assessment and provides suggestions on how these might be overcome. © 2011 Society for Risk Analysis.

  16. Can paramedics use FRAX (the WHO Fracture Risk Assessment Tool) to help GPs improve future fracture risk in patients who fall? Protocol for a randomised controlled feasibility study.

    Science.gov (United States)

    Clarke, Shane; Bradley, Rachel; Simmonds, Bethany; Salisbury, Chris; Benger, Jonathan; Marques, Elsa; Greenwood, Rosemary; Shepstone, Lee; Robinson, Maria; Appleby-Fleming, John; Gooberman-Hill, Rachael

    2014-09-03

    Currently identification, and therefore, management of patients at risk of osteoporotic fracture in the UK is suboptimal. As the majority of patients who fracture have fallen, it follows that people who fall can usefully be targeted in any programme that aims to reduce osteoporotic fracture. Targeting vulnerable patients who are likely to benefit from intervention may help shift the management of fracture prevention into primary care, away from emergency departments. Paramedics who attend to patients who have fallen may be well placed to assess future fracture risk, using the Fracture Risk Assessment Tool (FRAX) and communicate that information directly to general practitioners (GPs). This feasibility study takes the form of a pragmatic, randomised controlled trial aimed at exploring and refining issues of study design, recruitment, retention, sample size and acceptability preceding a large-scale study with fracture as the end point. Patients (aged >50) who fall, call an ambulance, are attended by a study paramedic and give verbal consent will be asked FRAX and fall questions. Patients who subsequently formally consent to participation will be randomised to control (usual care) or intervention groups. Intervention will constitute transmission of calculated future fracture risk to the patients' GP with suitable, evidence-based recommendations for investigation or treatment. 3 months after the index fall, data (proportion of patients in each group undergoing investigation or starting new treatment, quality of life and health economic) will be collected and analysed using descriptive statistics. A nested qualitative study will explore issues of acceptability and study design with patients, paramedics and GPs. This protocol was approved by NRES Committee South Central Oxford C in October 2012. Research Ethics Committee ref.12/SC/0604. The study findings will be disseminated through peer-reviewed journals, conference presentations and local public events. A publication

  17. Group differences in physician responses to handheld presentation of clinical evidence: a verbal protocol analysis

    Directory of Open Access Journals (Sweden)

    Pavlovic Nada J

    2007-07-01

    Full Text Available Abstract Background To identify individual differences in physicians' needs for the presentation of evidence resources and preferences for mobile devices. Methods Within-groups analysis of responses to semi-structured interviews. Interviews consisted of using prototypes in response to task-based scenarios. The prototypes were implemented on two different form factors: a tablet style PC and a pocketPC. Participants were from three user groups: general internists, family physicians and medicine residents, and from two different settings: urban and semi-urban. Verbal protocol analysis, which consists of coding utterances, was conducted on the transcripts of the testing sessions. Statistical relationships were investigated between staff physicians' and residents' background variables, self-reported experiences with the interfaces, and verbal code frequencies. Results 47 physicians were recruited from general internal medicine, family practice clinics and a residency training program. The mean age of participants was 42.6 years. Physician specialty had a greater effect on device and information-presentation preferences than gender, age, setting or previous technical experience. Family physicians preferred the screen size of the tablet computer and were less concerned about its portability. Residents liked the screen size of the tablet, but preferred the portability of the pocketPC. Internists liked the portability of the pocketPC, but saw less advantage to the large screen of the tablet computer (F[2,44] = 4.94, p = .012. Conclusion Different types of physicians have different needs and preferences for evidence-based resources and handheld devices. This study shows how user testing can be incorporated into the process of design to inform group-based customization.

  18. An optimized protocol for generation and analysis of Ion Proton sequencing reads for RNA-Seq.

    Science.gov (United States)

    Yuan, Yongxian; Xu, Huaiqian; Leung, Ross Ka-Kit

    2016-05-26

    Previous studies compared running cost, time and other performance measures of popular sequencing platforms. However, comprehensive assessment of library construction and analysis protocols for Proton sequencing platform remains unexplored. Unlike Illumina sequencing platforms, Proton reads are heterogeneous in length and quality. When sequencing data from different platforms are combined, this can result in reads with various read length. Whether the performance of the commonly used software for handling such kind of data is satisfactory is unknown. By using universal human reference RNA as the initial material, RNaseIII and chemical fragmentation methods in library construction showed similar result in gene and junction discovery number and expression level estimated accuracy. In contrast, sequencing quality, read length and the choice of software affected mapping rate to a much larger extent. Unspliced aligner TMAP attained the highest mapping rate (97.27 % to genome, 86.46 % to transcriptome), though 47.83 % of mapped reads were clipped. Long reads could paradoxically reduce mapping in junctions. With reference annotation guide, the mapping rate of TopHat2 significantly increased from 75.79 to 92.09 %, especially for long (>150 bp) reads. Sailfish, a k-mer based gene expression quantifier attained highly consistent results with that of TaqMan array and highest sensitivity. We provided for the first time, the reference statistics of library preparation methods, gene detection and quantification and junction discovery for RNA-Seq by the Ion Proton platform. Chemical fragmentation performed equally well with the enzyme-based one. The optimal Ion Proton sequencing options and analysis software have been evaluated.

  19. Analysis of the radius and diameter protocols in terms of pricing telecommunication services

    Directory of Open Access Journals (Sweden)

    Vesna M. Radonjić

    2013-06-01

    Full Text Available Accounting of telecommunication services is closely related to the functions of authentication and authorization. These functions are usually considered together and implemented within the same server using a common protocol. The most renowned protocols for authentication, authorization and accounting are the RADIUS and Diameter protocols.   AAA functions and related protocols   In this chapter, the accounting management architecture developed by IETF is presented. It includes the interaction between network elements, accounting servers and billing and charging servers. Accounting data can be used for management, planning and charging users as well as other (specific purposes. Authentication is the process of confirming a user's digital identity, usually through some type of identifiers and related data. Authorization determines whether a particular entity is authorized to perform an activity.   Basic Functions of the RADIUS Protocol   The RADIUS architecture is based on a client-server model. It uses UDP on the transport layer. Transactions between the client and the server are authenticated, which is achieved by using a common secret key that is never sent through the network. Given the limited resources available to network devices, RADIUS facilitates and centralizes charging end users, provides some protection against active attacks by unauthorized users and it has great support from different network equipment vendors. Although RADIUS is a widely accepted protocol for the mechanisms of authentication, authorization and accounting, it has certain shortcomings that may be caused by the protocol itself or by its poor implementation.   Architecture and Operation of the Diameter Protocol   Diameter is a scalable protocol designed by the IETF working group in order to eliminate shortcomings and functional limitations of the RADIUS protocol and eventually to replace it in the near future. Most of the basic Diameter mechanisms and its

  20. Economic analysis and management of climatic risks

    Energy Technology Data Exchange (ETDEWEB)

    Hourcade, J.C. (Centre International de Recherche sur l' Environnement et le Developpement, 92 - Montrouge (France))

    1994-01-01

    This paper aims at framing the collective decision problem in the face of climate change. It shows why it would be irrelevant to handle it in the form of a classical decision under uncertainty framework where a cost-benefit analysis is carried out including probability distribution on damages and risk aversion coefficients. A sequential approach to policy making is then proposed as an alternative in order to account for the inertia of socio-economic dynamics and the value of information. A simple model illustrates the gap between these two approaches; it shows the importance of combining the investments on climatic research, innovation policies and so-called 'no regret' short term decisions. It shows the fact that, even if they can be considered as quantitatively moderate, these potentials have a critical impact on long term viability of development; they embed a very high information value, lengthening the learning time vis-a-vis potentially major but controversial risks. (author). 21 refs., 3 figs.

  1. Risk oriented analysis of the SNR-300

    International Nuclear Information System (INIS)

    Koeberlein, K.

    1982-01-01

    The Fact Finding Committee on 'Future Nuclear Power Policy' established by the 8th German Federal Parliament in its report of June 1980 among other items published the recommendation to commission a 'risk oriented analysis' of the SNR-300 in order to enable a pragmatic comparison to be made of the safety of the German prototype fast breeder reactor and a modern light water reactor (a Biblis B PWR). The Federal Minister for Research and Technology in August 1981 officially commissioned the Gesellschaft fuer Reaktorsicherheit (GRS) to conduct the study. Following a recommendation by the Fact Finding Committee, additional studies were performed also by a group of opponents of the breeder reactor. On the instigation of the group of opponents the delivery date of the study was altered several times and finally set at April 30, 1982. GRS submitted its report by this deadline. However, a joint report by the two groups could not be compiled, as had been requested by the client, because the contributions of the opponents were not made available until mid-May 1982 and then only as an 'interim report'. In summary, the GRS study indicates that the frequency and severity of major accidents is lower for the SNR-300 at the Kalkar site than for a PWR as covered in the German Nuclear Power Plant Risk Study. (orig.) [de

  2. Development of probabilistic risk analysis library

    International Nuclear Information System (INIS)

    Soga, Shota; Kirimoto, Yukihiro; Kanda, Kenichi

    2015-01-01

    We developed a library that is designed to perform level 1 Probabilistic Risk Analysis using Binary Decision Diagram (BDD). In particular, our goal is to develop a library that will allow Japanese electric utilities to take the advantages of BDD that can solve Event Tree (ET) and Fault Tree (FT) models analytically. Using BDD, the library supports negation in FT which allows more flexible modeling of ET/FT. The library is written by C++ within an object-oriented framework using open source software. The library itself is a header-only library so that Japanese electric utilities can take advantages of its transparency to speed up development and to build their own software for their specific needs. In this report, the basic capabilities of the library is briefly described. In addition, several applications of the library are demonstrated including validation of MCS evaluation of PRA model and evaluation of corrective and preventive maintenance considering common cause failure. (author)

  3. [Analysis of palliative sedation in hospitalised elderly patients: Effectiveness of a protocol].

    Science.gov (United States)

    Mateos-Nozal, Jesús; García-Cabrera, Lorena; Montero Errasquín, Beatriz; Cruz-Jentoft, Alfonso José; Rexach Cano, Lourdes

    2016-01-01

    To measure changes in the practice of palliative sedation during agony in hospitalised elderly patients before and after the implementation of a palliative sedation protocol. A retrospective before-after study was performed in hospitalised patients over 65 years old who received midazolam during hospital admission and died in the hospital in two 3-month periods, before and after the implementation of the protocol. Non-sedative uses of midazolam and patients in intensive care were excluded. Patient and admission characteristics, the consent process, withdrawal of life-sustaining treatments, and the sedation process (refractory symptom treated, drug doses, assessment and use of other drugs) were recorded. Association was analysed using the Chi(2) and Student t tests. A total of 143 patients were included, with no significant differences between groups in demographic characteristics or symptoms. Do not resuscitate (DNR) orders were recorded in approximately 70% of the subjects of each group, and informed consent for sedation was recorded in 91% before vs. 84% after the protocol. Induction and maintenance doses of midazolam followed protocol recommendations in 1.3% before vs 10.4% after the protocol was implemented (P=.02) and adequate rescue doses were used in 1.3% vs 11.9% respectively (P=.01). Midazolam doses were significantly lower (9.86mg vs 18.67mg, Psedation score was used in 8% vs. 12% and the Palliative Care Team was involved in 35.5% and 16.4% of the cases (P=.008) before and after the protocol, respectively. Use of midazolam slightly improved after the implementation of a hospital protocol on palliative sedation. The percentage of adequate sedations and the general process of sedation were mostly unchanged by the protocol. More education and further assessment is needed to gauge the effect of these measures in the future. Copyright © 2015 SEGG. Published by Elsevier Espana. All rights reserved.

  4. Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool

    OpenAIRE

    Hazem A Elbaz

    2015-01-01

    The mostly cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that sound well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we...

  5. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  6. Analysis of uncertainty in modeling perceived risks

    International Nuclear Information System (INIS)

    Melnyk, R.; Sandquist, G.M.

    2005-01-01

    Expanding on a mathematical model developed for quantifying and assessing perceived risks, the distribution functions, variances, and uncertainties associated with estimating the model parameters are quantified. The analytical model permits the identification and assignment of any number of quantifiable risk perception factors that can be incorporated within standard risk methodology. Those risk perception factors associated with major technical issues are modeled using lognormal probability density functions to span the potentially large uncertainty variations associated with these risk perceptions. The model quantifies the logic of public risk perception and provides an effective means for measuring and responding to perceived risks. (authors)

  7. Risk Analysis for Performance Improvement in a Romanian Pharmaceutical Company

    Directory of Open Access Journals (Sweden)

    Dana Corina Deselnicu

    2018-05-01

    Full Text Available The paper presents risk management analysis carried out to investigate the operations of a Romanian company dealing with the distribution of pharmaceutical products. The main risks challenging the company were identified, described and classified, providing a scientific base for further analysis. Then, the identified inherent risks were evaluated using tools as the risk index method and the risk matrix in order to emphasize their tolerance level. According to the results of the evaluation, risk mitigation strategies and measures were advanced for the management of the analysed risks. Relevant conclusions were drawn from the experience.

  8. [Clinical outcomes and economic analysis of two ovulation induction protocols in patients undergoing repeated IVF/ICSI cycles].

    Science.gov (United States)

    Chen, Xiao; Geng, Ling; Li, Hong

    2014-04-01

    To compare the clinical outcomes and cost-effectiveness of luteal phase down-regulation with gonadotrophin-releasing hormone (GnRH) agonist protocol and GnRH antagonist protocol in patients undergoing repeated in vitro fertilization and intracytoplasmic sperm injection (IVF-ICSI) cycles. A retrospective analysis of clinical outcomes and costs was conducted among 198 patients undergoing repeated IVF-ICSI cycles, including 109 receiving luteal phase down-regulation with GnRH agonist protocol (group A) and 89 receiving GnRH antagonist protocol (group B). The numbers of oocytes retrieved and good embryos, clinical pregnancy rate, abortion rate, the live birth rate, mean total cost, and the cost-effective ratio were compared between the two groups. In patients undergoing repeated IVF-ICSI cycles, the two protocols produced no significant differences in the number of good embryos, clinical pregnancy rate, abortion rate, or twin pregnancy rate. Compared with group B, group A had better clinical outcomes though this difference was not statistically significant. The number of retrieved oocytes was significantly greater and live birth rate significantly higher in group A than in group B (9.13=4.98 vs 7.11=4.74, and 20.2% vs 9.0%, respectively). Compared with group B, group A had higher mean total cost per cycle but lower costs for each oocyte retrieved (2729.11 vs 3038.60 RMB yuan), each good embryo (8867.19 vs 9644.85 RMB yuan), each clinical pregnancy (77598.06 vs 96139.85 RMB yuan). For patients undergoing repeated IVF/ICSI cycle, luteal phase down-regulation with GnRH agonist protocol produces good clinical outcomes with also good cost-effectiveness in spite an unsatisfactory ovarian reserve.

  9. ANALYSIS AND MANAGEMENT RISK IN INTERNATIONAL AFFAIRS

    OpenAIRE

    Lăpăduşi Mihaela Loredana,; Căruntu Constantin

    2009-01-01

    The risk is one of the most controversial issues for all persons involved both in domestic and international world economic affairs. The need to analyze, understand and effectively manage risk is growing, the ultimate aim being to obtain a higher degree of successThe risk means exposure to an uncertain future, the opportunity to face danger or suffering a loss ( "Risk - possibility of loss or injury", Webster's, 1995) or the chance that things go wrong ( "Risk is the change that something wil...

  10. Insurability of Cyber Risk: An Empirical Analysis

    OpenAIRE

    Biener, Christian; Eling, Martin; Wirfs, Jan Hendrik

    2015-01-01

    This paper discusses the adequacy of insurance for managing cyber risk. To this end, we extract 994 cases of cyber losses from an operational risk database and analyse their statistical properties. Based on the empirical results and recent literature, we investigate the insurability of cyber risk by systematically reviewing the set of criteria introduced by Berliner (1982). Our findings emphasise the distinct characteristics of cyber risks compared with other operational risks and bring to li...

  11. HANFORD SAFETY ANALYSIS & RISK ASSESSMENT HANDBOOK (SARAH)

    Energy Technology Data Exchange (ETDEWEB)

    EVANS, C B

    2004-12-21

    The purpose of the Hanford Safety Analysis and Risk Assessment Handbook (SARAH) is to support the development of safety basis documentation for Hazard Category 2 and 3 (HC-2 and 3) U.S. Department of Energy (DOE) nuclear facilities to meet the requirements of 10 CFR 830, ''Nuclear Safety Management''. Subpart B, ''Safety Basis Requirements.'' Consistent with DOE-STD-3009-94, Change Notice 2, ''Preparation Guide for U.S. Department of Energy Nonreactor Nuclear Facility Documented Safety Analyses'' (STD-3009), and DOE-STD-3011-2002, ''Guidance for Preparation of Basis for Interim Operation (BIO) Documents'' (STD-3011), the Hanford SARAH describes methodology for performing a safety analysis leading to development of a Documented Safety Analysis (DSA) and derivation of Technical Safety Requirements (TSR), and provides the information necessary to ensure a consistently rigorous approach that meets DOE expectations. The DSA and TSR documents, together with the DOE-issued Safety Evaluation Report (SER), are the basic components of facility safety basis documentation. For HC-2 or 3 nuclear facilities in long-term surveillance and maintenance (S&M), for decommissioning activities, where source term has been eliminated to the point that only low-level, residual fixed contamination is present, or for environmental remediation activities outside of a facility structure, DOE-STD-1120-98, ''Integration of Environment, Safety, and Health into Facility Disposition Activities'' (STD-1120), may serve as the basis for the DSA. HC-2 and 3 environmental remediation sites also are subject to the hazard analysis methodologies of this standard.

  12. A group randomized trial of a complexity-based organizational intervention to improve risk factors for diabetes complications in primary care settings: study protocol

    Directory of Open Access Journals (Sweden)

    Noel Polly H

    2008-03-01

    months. Primary hypotheses will be tested with 12-month outcome data. Sustainability of the intervention will be tested using 24 month data. Insights gained will be included in a delayed intervention conducted in control practices and evaluated in a pre-post design. Primary and secondary outcomes To test hypotheses, the unit of randomization will be the clinic. The unit of analysis will be the repeated measure of each risk factor for each patient, nested within the clinic. The repeated measure of glycosylated hemoglobin A1c will be the primary outcome, with BP and Low Density Lipoprotein (LDL cholesterol as secondary outcomes. To study change in risk factor level, a hierarchical or random effect model will be used to account for the nesting of repeated measurement of risk factor within patients and patients within clinics. This protocol follows the CONSORT guidelines and is registered per ICMJE guidelines: Clinical Trial Registration Number NCT00482768

  13. 49 CFR 260.17 - Credit risk premium analysis.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Credit risk premium analysis. 260.17 Section 260... Financial Assistance § 260.17 Credit risk premium analysis. (a) When Federal appropriations are not available to cover the total subsidy cost, the Administrator will determine the Credit Risk Premium...

  14. Integration of risk analysis, land use planning, and cost analysis

    International Nuclear Information System (INIS)

    Rajen, G.; Sanchez, G.

    1994-01-01

    The Department of Energy (DOE) and the Pueblo of San Ildefonso (Pueblo), which is a sovereign Indian tribe, have often been involved in adversarial situations regarding the Los Alamos National Laboratory (LANL). The Pueblo shares a common boundary with the LANL. This paper describes an on-going project that could alter the DOE and the Pueblo's relationship to one of cooperation; and unite the DOE and the Pueblo in a Pollution Prevention/Waste Minimization, and Integrated Risk Analysis and Land Use Planning effort

  15. Electronic and postal reminders for improving immunisation coverage in children: protocol for a systematic review and meta-analysis.

    Science.gov (United States)

    Chachou, Martel J; Mukinda, Fidele K; Motaze, Villyen; Wiysonge, Charles S

    2015-10-15

    Worldwide, suboptimal immunisation coverage causes the deaths of more than one million children under five from vaccine-preventable diseases every year. Reasons for suboptimal coverage are multifactorial, and a combination of interventions is needed to improve compliance with immunisation schedules. One intervention relies on reminders, where the health system prompts caregivers to attend immunisation appointments on time or re-engages caregivers who have defaulted on scheduled appointments. We undertake this systematic review to investigate the potential of reminders using emails, phone calls, social media, letters or postcards to improve immunisation coverage in children under five. We will search for published and unpublished randomised controlled trials and non-randomised controlled trials in PubMed, Scopus, CINAHL, CENTRAL, Science Citation Index, WHOLIS, Clinicaltrials.gov and the WHO International Clinical Trials Platform. We will conduct screening of search results, study selection, data extraction and risk-of-bias assessment in duplicate, resolving disagreements by consensus. In addition, we will pool data from clinically homogeneous studies using random-effects meta-analysis; assess heterogeneity of effects using the χ(2) test of homogeneity; and quantify any observed heterogeneity using the I(2) statistic. This protocol does not need approval by an ethics committee because we will use publicly available data, without directly involving human participants. The results will provide updated evidence on the effects of electronic and postal reminders on immunisation coverage, and we will discuss the applicability of the findings to low and middle-income countries. We plan to disseminate review findings through publication in a peer-reviewed journal and presentation at relevant conferences. In addition, we will prepare a policymaker-friendly summary using a validated format (eg, SUPPORT Summary) and disseminate this through social media and email discussion

  16. Risk uncertainty analysis methods for NUREG-1150

    International Nuclear Information System (INIS)

    Benjamin, A.S.; Boyd, G.J.

    1987-01-01

    Evaluation and display of risk uncertainties for NUREG-1150 constitute a principal focus of the Severe Accident Risk Rebaselining/Risk Reduction Program (SARRP). Some of the principal objectives of the uncertainty evaluation are: (1) to provide a quantitative estimate that reflects, for those areas considered, a credible and realistic range of uncertainty in risk; (2) to rank the various sources of uncertainty with respect to their importance for various measures of risk; and (3) to characterize the state of understanding of each aspect of the risk assessment for which major uncertainties exist. This paper describes the methods developed to fulfill these objectives

  17. Conceptual risk assessment framework for global change risk analysis SRP

    CSIR Research Space (South Africa)

    Elphinstone, CD

    2007-12-01

    Full Text Available on two of the most important underlying factors supporting the ecosystem: productivity and hypoxia afiecting harmful algae blooms (HABs) and the rock lobsters. The risk regimes are a function of two time scales | a ‘high’ wind stress in early summer... is a condition which can lead to various negative impacts depending on the particular marine life, for instance rock lobsters stranding. The exact deflnitions of the two seasonal occurrences resulting in the risk event, ‘high’ wind stress in ‘early...

  18. Measuring situation awareness of operation teams in NPPs using a verbal protocol analysis

    International Nuclear Information System (INIS)

    Lee, Seung Woo; Park, Jinkyun; Kim, Ar ryum; Seong, Poong Hyun

    2012-01-01

    Highlights: ► A method for measuring team situation awareness is developed. ► Verbal protocol analysis is adopted in this method. ► This method resolves uncertainties from conventional methods. ► This method can be used in evaluating the human–system interfaces. - Abstract: Situation awareness (SA) continues to receive a considerable amount of attention from the ergonomics community given that need for operators to maintain SA is frequently cited as a key to effective and efficient performance. Although complex and dynamic environments such as that of a main control room (MCR) in a nuclear power plant (NPP) are operated by operation teams, and while team situation awareness (TSA) is also cited as an important factor, research is limited to individual SA. However, understanding TSA can provide a window onto the characteristics of team acquisition as well as the performance of a complex skill. Therefore, such knowledge can be valuable in diagnosing team performance successes and failures. Moreover, training and design interventions can target the cognitive underpinnings of team performance, with implications for the design of technological aids to improve team performance. Despite these advantages and the importance of understanding TSA, measures and methods targeting TSA are sparse and fail to address it properly. In this study, an objective TSA measurement method is developed in an effort to understand TSA. First, key considerations for developing a method are derived. Based on these considerations, the proposed method is developed while mainly focusing on the creation of logical connections between team communications and TSA. A speech act coding scheme is also implemented to analyze team communications. The TSA measurement method developed in this study provides a measure for each level of TSA. It was revealed from a preliminary study that this TSA measurement method is feasible for measuring TSA to a fair extent. Useful insight into TSA is also derived.

  19. Analysis of the Sheltered Instruction Observation Protocol Model on Academic Performance of English Language Learners

    Science.gov (United States)

    Ingram, Sandra W.

    This quantitative comparative descriptive study involved analyzing archival data from end-of-course (EOC) test scores in biology of English language learners (ELLs) taught or not taught using the sheltered instruction observation protocol (SIOP) model. The study includes descriptions and explanations of the benefits of the SIOP model to ELLs, especially in content area subjects such as biology. Researchers have shown that ELLs in high school lag behind their peers in academic achievement in content area subjects. Much of the research on the SIOP model took place in elementary and middle school, and more research was necessary at the high school level. This study involved analyzing student records from archival data to describe and explain if the SIOP model had an effect on the EOC test scores of ELLs taught or not taught using it. The sample consisted of 527 Hispanic students (283 females and 244 males) from Grades 9-12. An independent sample t-test determined if a significant difference existed in the mean EOC test scores of ELLs taught using the SIOP model as opposed to ELLs not taught using the SIOP model. The results indicated that a significant difference existed between EOC test scores of ELLs taught using the SIOP model and ELLs not taught using the SIOP model (p = .02). A regression analysis indicated a significant difference existed in the academic performance of ELLs taught using the SIOP model in high school science, controlling for free and reduced-price lunch (p = .001) in predicting passing scores on the EOC test in biology at the school level. The data analyzed for free and reduced-price lunch together with SIOP data indicated that both together were not significant (p = .175) for predicting passing scores on the EOC test in high school biology. Future researchers should repeat the study with student-level data as opposed to school-level data, and data should span at least three years.

  20. Extraction and Analysis of Information Related to Research & Development Declared Under an Additional Protocol

    International Nuclear Information System (INIS)

    Idinger, J.; Labella, R.; Rialhe, A.; Teller, N.

    2015-01-01

    The additional protocol (AP) provides important tools to strengthen and improve the effectiveness and efficiency of the safeguards system. Safeguards are designed to verify that States comply with their international commitments not to use nuclear material or to engage in nuclear-related activities for the purpose of developing nuclear weapons or other nuclear explosive devices. Under an AP based on INFCIRC/540, a State must provide to the IAEA additional information about, and inspector access to, all parts of its nuclear fuel cycle. In addition, the State has to supply information about its nuclear fuel cycle-related research and development (R&D) activities. The majority of States declare their R&D activities under the AP Articles 2.a.(i), 2.a.(x), and 2.b.(i) as part of initial declarations and their annual updates under the AP. In order to verify consistency and completeness of information provided under the AP by States, the Agency has started to analyze declared R&D information by identifying interrelationships between States in different R&D areas relevant to safeguards. The paper outlines the quality of R&D information provided by States to the Agency, describes how the extraction and analysis of relevant declarations are currently carried out at the Agency and specifies what kinds of difficulties arise during evaluation in respect to cross-linking international projects and finding gaps in reporting. In addition, the paper tries to elaborate how the reporting quality of AP information with reference to R&D activities and the assessment process of R&D information could be improved. (author)

  1. Multiple Sclerosis Increases Fracture Risk: A Meta-Analysis

    Directory of Open Access Journals (Sweden)

    Guixian Dong

    2015-01-01

    Full Text Available Purpose. The association between multiple sclerosis (MS and fracture risk has been reported, but results of previous studies remain controversial and ambiguous. To assess the association between MS and fracture risk, a meta-analysis was performed. Method. Based on comprehensive searches of the PubMed, Embase, and Web of Science, we identified outcome data from all articles estimating the association between MS and fracture risk. The pooled risk ratios (RRs with 95% confidence intervals (CIs were calculated. Results. A significant association between MS and fracture risk was found. This result remained statistically significant when the adjusted RRs were combined. Subgroup analysis stratified by the site of fracture suggested significant associations between MS and tibia fracture risk, femur fracture risk, hip fracture risk, pelvis fracture risk, vertebrae fracture risk, and humerus fracture risk. In the subgroup analysis by gender, female MS patients had increased fracture risk. When stratified by history of drug use, use of antidepressants, hypnotics/anxiolytics, anticonvulsants, and glucocorticoids increased the risk of fracture risk in MS patients. Conclusions. This meta-analysis demonstrated that MS was significantly associated with fracture risk.

  2. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

    Science.gov (United States)

    Watzlaf, Valerie J.M.; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR. PMID:25945172

  3. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

    Directory of Open Access Journals (Sweden)

    Valerie J.M. Watzlaf

    2010-10-01

    Full Text Available Voice over the Internet Protocol (VoIP systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR therapy that can provide voice and video teleconferencing between patients and therapists.  Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care, and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.   

  4. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance.

    Science.gov (United States)

    Watzlaf, Valerie J M; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.

  5. Technical Overview of Ecological Risk Assessment - Analysis Phase: Exposure Characterization

    Science.gov (United States)

    Exposure Characterization is the second major component of the analysis phase of a risk assessment. For a pesticide risk assessment, the exposure characterization describes the potential or actual contact of a pesticide with a plant, animal, or media.

  6. Analiza protokola kvaliteta usluga telekomunikacionih mreža / Analysis of quality of service protocols in telecommunication networks

    Directory of Open Access Journals (Sweden)

    Milojko Jevtović

    2003-05-01

    Full Text Available Protokoli kvaliteta usluga (Quality of Service - QoS sadašnjih i budućih telekomunikacionih mreža razvijeni su, pored ostalog, sa ciljem da podrže različite klase usluga (Class of Service - CoS komunikaciju u realnom vremenu, kao i prenos multimedijalnih poruka preko paketskih IP (Internet Protocol mreža. U raduje dat pregled karakteristika tih protokola i ocena njihovih konkretnih mogućnosti u obezbeđenju kvaliteta usluga unutar sistema ('s vrha do dna', tj. vertikalno u OSI arhitekturi kao i 'horizontalno' odnosno s kraja na kraj veze, tj. između izvora i odredišta. / Today's and future telecommunication networks must enable transmission throughout heterogeneous environment, using different Quality of Service protocols, Quality of Service protocols use a variety of complementary mechanisms to enable deterministic end-to-end different data delivery. The analysis of these protocols and their efficiency in providing QoS and CoS has been given in this paper.

  7. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  8. Structural reliability analysis applied to pipeline risk analysis

    Energy Technology Data Exchange (ETDEWEB)

    Gardiner, M. [GL Industrial Services, Loughborough (United Kingdom); Mendes, Renato F.; Donato, Guilherme V.P. [PETROBRAS S.A., Rio de Janeiro, RJ (Brazil)

    2009-07-01

    Quantitative Risk Assessment (QRA) of pipelines requires two main components to be provided. These are models of the consequences that follow from some loss of containment incident, and models for the likelihood of such incidents occurring. This paper describes how PETROBRAS have used Structural Reliability Analysis for the second of these, to provide pipeline- and location-specific predictions of failure frequency for a number of pipeline assets. This paper presents an approach to estimating failure rates for liquid and gas pipelines, using Structural Reliability Analysis (SRA) to analyze the credible basic mechanisms of failure such as corrosion and mechanical damage. SRA is a probabilistic limit state method: for a given failure mechanism it quantifies the uncertainty in parameters to mathematical models of the load-resistance state of a structure and then evaluates the probability of load exceeding resistance. SRA can be used to benefit the pipeline risk management process by optimizing in-line inspection schedules, and as part of the design process for new construction in pipeline rights of way that already contain multiple lines. A case study is presented to show how the SRA approach has recently been used on PETROBRAS pipelines and the benefits obtained from it. (author)

  9. A Roadmap of Risk Diagnostic Methods: Developing an Integrated View of Risk Identification and Analysis Techniques

    National Research Council Canada - National Science Library

    Williams, Ray; Ambrose, Kate; Bentrem, Laura

    2004-01-01

    ...), which is envisioned to be a comprehensive reference tool for risk identification and analysis (RI AND A) techniques. Program Managers (PMs) responsible for developing or acquiring software-intensive systems typically identify risks in different ways...

  10. Chemical risk evaluation, importance of the risk analysis framework uses: Latin America development restrictions

    International Nuclear Information System (INIS)

    Carrillo, M.

    2013-01-01

    The power point presentation is about reach and results of the risk analysis in Venezuela, chemical dangers in food, human damage, injuries , technologies news in fodd development, toxicity, microbiological risk, technical recommendations

  11. Putting problem formulation at the forefront of GMO risk analysis.

    Science.gov (United States)

    Tepfer, Mark; Racovita, Monica; Craig, Wendy

    2013-01-01

    When applying risk assessment and the broader process of risk analysis to decisions regarding the dissemination of genetically modified organisms (GMOs), the process has a tendency to become remarkably complex. Further, as greater numbers of countries consider authorising the large-scale dissemination of GMOs, and as GMOs with more complex traits reach late stages of development, there has been increasing concern about the burden posed by the complexity of risk analysis. We present here an improved approach for GMO risk analysis that gives a central role to problem formulation. Further, the risk analysis strategy has been clarified and simplified in order to make rigorously scientific risk assessment and risk analysis more broadly accessible to diverse stakeholder groups.

  12. [Professor Xu Fu-song's traditional Chinese medicine protocols for male diseases: A descriptive analysis].

    Science.gov (United States)

    Liu, Cheng-yong; Xu, Fu-song

    2015-04-01

    To analyze the efficacy and medication principles of Professor Xu Fu-songs traditional Chinese medicine (TCM) protocols for male diseases. We reviewed and descriptively analyzed the unpublished complete medical records of 100 male cases treated by Professor Xu Fu-song with his TCM protocols from 1978 to 1992. The 100 cases involved 32 male diseases, most of which were difficult and complicated cases. The drug compliance was 95%. Each prescription was made up of 14 traditional Chinese drugs on average. The cure rate was 32% , and the effective rate was 85%. Professor Xu Fu-song advanced and proved some new theories and therapeutic methods. Professor Xu Fu-song's TCM protocols can be applied to a wide range of male diseases, mostly complicated, and are characterized by accurate differentiation of symptoms and signs, high drug compliance, and excellent therapeutic efficacy.

  13. Statistical models for competing risk analysis

    International Nuclear Information System (INIS)

    Sather, H.N.

    1976-08-01

    Research results on three new models for potential applications in competing risks problems. One section covers the basic statistical relationships underlying the subsequent competing risks model development. Another discusses the problem of comparing cause-specific risk structure by competing risks theory in two homogeneous populations, P1 and P2. Weibull models which allow more generality than the Berkson and Elveback models are studied for the effect of time on the hazard function. The use of concomitant information for modeling single-risk survival is extended to the multiple failure mode domain of competing risks. The model used to illustrate the use of this methodology is a life table model which has constant hazards within pre-designated intervals of the time scale. Two parametric models for bivariate dependent competing risks, which provide interesting alternatives, are proposed and examined

  14. Modelling and Analysis of a Collision Avoidance Protocol using SPIN and UPPAAL

    DEFF Research Database (Denmark)

    Skou, Arne; Larsen, Kim Guldstrand; Jensen, Henrik Ejersbo

    1997-01-01

    , the modelling of the media becomes ackward due to the lack of broadcast communication in the PROMELA language. On the other hand we find it easy to model the timed aspects using the UPPAAL tool. Especially, the notion of committed locations supports the modelling of broadcast communication. However......This paper compares the tools SPIN and UPPAAL by modelling and verifying a Collision Avoidance Protocol for an Ethernet-like medium. We find that SPIN is well suited for modelling the untimed aspects of the protocol processes and for expressing the relevant (untimed) properties. However...

  15. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication......’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture...

  16. Analysis of quality control protocol implementation of equipment in radiotherapy services

    International Nuclear Information System (INIS)

    Calcina, Carmen S. Guzman; Lima, Luciana P. de; Rubo, Rodrigo A.; Ferraz, Eduardo; Almeida, Adelaide de

    2000-01-01

    Considering the importance of the Quality Assurance in the radiotherapy services, there was an interest to make tests' evaluation for a Quality Control for the cobalt equipment, linear accelerator and simulator as a classification and comparison. The work proposed is a suggestion that can serve as tool for medical physicists that are starting to work in the radiotherapy area and for the most experts. The discussions were made by the gathering of local tests and official protocols, resulting in a minimum protocol as a suggestion for a routine work, emphasizing the periodicity and level of tolerance of each one of the tests. (author)

  17. Computational Aspects of Dam Risk Analysis: Findings and Challenges

    Directory of Open Access Journals (Sweden)

    Ignacio Escuder-Bueno

    2016-09-01

    Full Text Available In recent years, risk analysis techniques have proved to be a useful tool to inform dam safety management. This paper summarizes the outcomes of three themes related to dam risk analysis discussed in the Benchmark Workshops organized by the International Commission on Large Dams Technical Committee on “Computational Aspects of Analysis and Design of Dams.” In the 2011 Benchmark Workshop, estimation of the probability of failure of a gravity dam for the sliding failure mode was discussed. Next, in 2013, the discussion focused on the computational challenges of the estimation of consequences in dam risk analysis. Finally, in 2015, the probability of sliding and overtopping in an embankment was analyzed. These Benchmark Workshops have allowed a complete review of numerical aspects for dam risk analysis, showing that risk analysis methods are a very useful tool to analyze the risk of dam systems, including downstream consequence assessments and the uncertainty of structural models.

  18. Seismic risk analysis in the German risk study phase B

    International Nuclear Information System (INIS)

    Hasser, D.; Liemersdorf, J.

    1989-01-01

    The paper discusses some aspects of the seismic risk part of the German risk study for nuclear power plants, phase B. First simplified analyses in phase A of the study allowed a rough classification of structures and systems of the PWR reference plant according to their seismic risk contribution. These studies were extended in phase B using improved models for the dynamic analyses of buildings, structures and components as well as for the probabilistic analyses of seismic loading, failure probabilities and event trees. The methodology of deriving probabilistic seismic load descriptions is explained and compared with the methods in phase A of the study and in other studies. Some details of the linear and nonlinear dynamic analyses of structures are reported, in order to demonstrate the influence of different assumptions for material behavior and failure criteria. The probabilistic structural and event tree analyses are discussed with respect to the distribution assumptions, acceptable simplifications, special results for the PWR reference plant and, finally, the influence of model uncertainties

  19. Automating risk analysis of software design models.

    Science.gov (United States)

    Frydman, Maxime; Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P

    2014-01-01

    The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.

  20. Evaluating the risks of clinical research: direct comparative analysis.

    Science.gov (United States)

    Rid, Annette; Abdoler, Emily; Roberson-Nay, Roxann; Pine, Daniel S; Wendler, David

    2014-09-01

    Many guidelines and regulations allow children and adolescents to be enrolled in research without the prospect of clinical benefit when it poses minimal risk. However, few systematic methods exist to determine when research risks are minimal. This situation has led to significant variation in minimal risk judgments, raising concern that some children are not being adequately protected. To address this concern, we describe a new method for implementing the widely endorsed "risks of daily life" standard for minimal risk. This standard defines research risks as minimal when they do not exceed the risks posed by daily life activities or routine examinations. This study employed a conceptual and normative analysis, and use of an illustrative example. Different risks are composed of the same basic elements: Type, likelihood, and magnitude of harm. Hence, one can compare the risks of research and the risks of daily life by comparing the respective basic elements with each other. We use this insight to develop a systematic method, direct comparative analysis, for implementing the "risks of daily life" standard for minimal risk. The method offers a way of evaluating research procedures that pose the same types of risk as daily life activities, such as the risk of experiencing anxiety, stress, or other psychological harm. We thus illustrate how direct comparative analysis can be applied in practice by using it to evaluate whether the anxiety induced by a respiratory CO2 challenge poses minimal or greater than minimal risks in children and adolescents. Direct comparative analysis is a systematic method for applying the "risks of daily life" standard for minimal risk to research procedures that pose the same types of risk as daily life activities. It thereby offers a method to protect children and adolescents in research, while ensuring that important studies are not blocked because of unwarranted concerns about research risks.

  1. Risk perception of sexually transmitted infections and HIV in Nigerian commercial sex workers living in Barcelona: a study protocol

    Science.gov (United States)

    Coma Auli, Núria; Mejía-Lancheros, Cília; Berenguera, Anna; Mayans, Martí Vall; Lasagabaster, Maider Arando; Pujol-Ribera, Enriqueta

    2013-01-01

    Introduction Sexually transmitted infections (STIs) and HIV are a serious global public health issue. These diseases are largely preventable, as they are directly and indirectly associated with potentially modifiable factors, including socioeconomic conditions. Sexual transmission is responsible for over 75% of new HIV infections worldwide. Moreover, commercial sex workers and their clients are two of the groups at the highest risk of acquiring and transmitting these infectious diseases, due to an extensive number of sexual encounters and the various factors related to commercial sex situations. This qualitative study aims to deepen the understanding of the risk perception of STIs and HIV and their associated factors in Nigerian commercial sex workers in the city of Barcelona. Methods and analysis This is a qualitative, descriptive, interpretive study based on a social constructivist and phenomenological perspective conducted on a saturated sample of Nigerian commercial sex workers in the city of Barcelona. Data will be collected through semistructured individual and triangular group interviews. Information will be examined using a sociological discourse analysis, allowing us to understand the social and individual factors related to the risk perception of STIs and HIV in commercial sex workers. Discussion Qualitative studies are an important element in identifying individual, social and contextual factors directly or indirectly related to the health/disease process. This qualitative study will provide essential knowledge to improve health promotion, prevention strategies and effective management of STIs both for commercial sex workers and their clients. Ethics This study has been approved by the clinical research ethics committee (CEIC) of IDIAP Jordi Gol in Barcelona, 2012. PMID:23901029

  2. An oral health education video game for high caries risk children: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Aljafari, Ahmad; Rice, Colm; Gallagher, Jennifer Elizabeth; Hosey, Marie Therese

    2015-05-28

    of an oral health education video game for high caries risk children and their families. Few protocols such as this are available in this much-needed research area. ISRCTN94617251.

  3. RISK ANALYSIS IN INFORMATION TECHNOLOGY AND COMMUNICATION OUTSOURCING

    Directory of Open Access Journals (Sweden)

    Edmir Parada Vasques Prado

    2011-12-01

    Full Text Available This research aims at evaluating the risk analysis process in Information Technology and Communication (ICT outsourcing conducted by organizations of the private sector. The research is characterized by being a descriptive, quantitative and transversal type study, which was used the survey method. Data were collected through questionnaire, the sample is not random and we used a convenience sampling process. The research made contributions to understanding the risk analysis process in ICT services outsourcing, and identified statistically significant relationships between risk analysis, organization's size and its industry, and between risk analysis and diversity of outsourced services

  4. Risk-based decision analysis for groundwater operable units

    International Nuclear Information System (INIS)

    Chiaramonte, G.R.

    1995-01-01

    This document proposes a streamlined approach and methodology for performing risk assessment in support of interim remedial measure (IRM) decisions involving the remediation of contaminated groundwater on the Hanford Site. This methodology, referred to as ''risk-based decision analysis,'' also supports the specification of target cleanup volumes and provides a basis for design and operation of the groundwater remedies. The risk-based decision analysis can be completed within a short time frame and concisely documented. The risk-based decision analysis is more versatile than the qualitative risk assessment (QRA), because it not only supports the need for IRMs, but also provides criteria for defining the success of the IRMs and provides the risk-basis for decisions on final remedies. For these reasons, it is proposed that, for groundwater operable units, the risk-based decision analysis should replace the more elaborate, costly, and time-consuming QRA

  5. A comparative analysis of risk and quality

    DEFF Research Database (Denmark)

    Lynette, Jennifer Elyse

    2017-01-01

    Within the field of emergency management and fire response, risk and quality are conceptualized to some degree in every response effort. Quality is viewed as a relatively new concept within the field of emergency management and fire response. Whereas, within this same field the concept of risk is....... This understanding can serve to facilitate more informed and effective decision making that incorporates both risk and quality before, during, and after emergency events....... independently, decision making and judgement processes have the potential to be positively impacted by furthering research and developing a deeper understanding of these constructs. By understanding risk management principles and combining that with a quality systems approach, decision making can be improved......Within the field of emergency management and fire response, risk and quality are conceptualized to some degree in every response effort. Quality is viewed as a relatively new concept within the field of emergency management and fire response. Whereas, within this same field the concept of risk...

  6. Taxonomy and Analysis of IP Micro-Mobility Protocols in Single and Simultaneous Movements Scenarios

    Directory of Open Access Journals (Sweden)

    G. De Marco

    2007-01-01

    Full Text Available The micro-mobility is an important aspect in mobile communications, where the applications are anywhere and used anytime. One of the problems of micro-mobility is the hand-off latency. In this paper, we analyse two solutions for IP micro-mobility by means of a general taxonomy. The first one is based on the Stream Control Transmission Protocol (SCTP, which allows the dynamic address configuration of an association. The second one is based on the Session Initiation Protocol (SIP, which is the most popular protocol for multimedia communications over IP networks. We show that for the SCTP solution, there is room for further optimisations of the hand-off latency by adding slight changes to the protocol. However, as full end-to-end solution, SCTP is not able to handle simultaneous movement of hosts, whose probability in general cannot be neglected. On the other hand, the SIP can handle both single and simultaneous movements cases, although the hand-off latency can increase with respect to the SCTP solution. We show that for a correct and fast hand-off, the SIP server should be statefull.

  7. Timing Analysis of Rate Constrained Traffic for the TTEthernet Communication Protocol

    DEFF Research Database (Denmark)

    Tamas-Selicean, Domitian; Pop, Paul; Steiner, Wilfried

    2015-01-01

    Ethernet is a low-cost communication solution offering high transmission speeds. Although its applications extend beyond computer networking, Ethernet is not suitable for real-time and safety-critical systems. To alleviate this, several real-time Ethernet-based communication protocols have been...

  8. Feature-Driven Domain Analysis of Session Layer Protocols of Internet of Things

    NARCIS (Netherlands)

    Köksal, Omer; Tekinerdogan, B.

    2017-01-01

    The Internet of Things (IoT) architecture is defined as a layered structure in which each layer represents a coherent set of services. For supporting the communication among the different IoT entities many different communication protocols are now available in practice. For practitioners, it is

  9. Risk of severe ovarian hyperstimulation syndrome in GnRH antagonist versus GnRH agonist protocol

    DEFF Research Database (Denmark)

    Toftager, M.; Bogstad, J; Bryndorf, T

    2016-01-01

    interval (CI): 0.33-0.57) compared with the traditional GnRH agonist protocol. Previous trials comparing the two protocols mainly included selected patient populations, a limited number of patients and the applied OHSS criteria differed, making direct comparisons difficult. In two recent large meta...... IV, dual-centre, open-label, RCT including 1050 women allocated to either short GnRH antagonist or long GnRH agonist protocol in a 1:1 ratio and enrolled over a 5-year period using a web-based concealed randomization code. This is a superiority study designed to detect a difference in severe OHSS...... between the two arms. None of the women had undergone previous ART treatment. PARTICIPANTS/MATERIALS, SETTING, METHODS: All infertile women referred for their first IVF/ICSI at two public fertility clinics, less than 40 years of age and with no uterine malformations were asked to participate. A total...

  10. Advancing Risk Analysis for Nanoscale Materials: Report from an International Workshop on the Role of Alternative Testing Strategies for Advancement: Advancing Risk Analysis for Nanoscale Materials

    Energy Technology Data Exchange (ETDEWEB)

    Shatkin, J. A. [Vireo Advisors, Boston MA USA; Ong, Kimberly J. [Vireo Advisors, Boston MA USA; Beaudrie, Christian [Compass RM, Vancouver CA USA; Clippinger, Amy J. [PETA International Science Consortium Ltd, London UK; Hendren, Christine Ogilvie [Center for the Environmental Implications of NanoTechnology, Duke University, Durham NC USA; Haber, Lynne T. [TERA, Cincinnati OH USA; Hill, Myriam [Health Canada, Ottawa Canada; Holden, Patricia [UC Santa Barbara, Bren School of Environmental Science & Management, ERI, and UC CEIN, University of California, Santa Barbara CA USA; Kennedy, Alan J. [U.S. Army Engineer Research and Development Center, Environmental Laboratory, Vicksburg MS USA; Kim, Baram [Independent, Somerville MA USA; MacDonell, Margaret [Argonne National Laboratory, Environmental Science Division, Argonne IL USA; Powers, Christina M. [U.S. Environmental Protection Agency, Office of Air and Radiation, Office of Transportation and Air Quality, Ann Arbor MI USA; Sharma, Monita [PETA International Science Consortium Ltd, London UK; Sheremeta, Lorraine [Alberta Ingenuity Labs, Edmonton Alberta Canada; Stone, Vicki [John Muir Building Gait 1 Heriot-Watt University, Edinburgh Scotland UK; Sultan, Yasir [Environment Canada, Gatineau QC Canada; Turley, Audrey [ICF International, Durham NC USA; White, Ronald H. [RH White Consultants, Silver Spring MD USA

    2016-08-01

    The Society for Risk Analysis (SRA) has a history of bringing thought leadership to topics of emerging risk. In September 2014, the SRA Emerging Nanoscale Materials Specialty Group convened an international workshop to examine the use of alternative testing strategies (ATS) for manufactured nanomaterials (NM) from a risk analysis perspective. Experts in NM environmental health and safety, human health, ecotoxicology, regulatory compliance, risk analysis, and ATS evaluated and discussed the state of the science for in vitro and other alternatives to traditional toxicology testing for NM. Based on this review, experts recommended immediate and near-term actions that would advance ATS use in NM risk assessment. Three focal areas-human health, ecological health, and exposure considerations-shaped deliberations about information needs, priorities, and the next steps required to increase confidence in and use of ATS in NM risk assessment. The deliberations revealed that ATS are now being used for screening, and that, in the near term, ATS could be developed for use in read-across or categorization decision making within certain regulatory frameworks. Participants recognized that leadership is required from within the scientific community to address basic challenges, including standardizing materials, protocols, techniques and reporting, and designing experiments relevant to real-world conditions, as well as coordination and sharing of large-scale collaborations and data. Experts agreed that it will be critical to include experimental parameters that can support the development of adverse outcome pathways. Numerous other insightful ideas for investment in ATS emerged throughout the discussions and are further highlighted in this article.

  11. Analysis of Pre-participation Screening Protocols for Football Players in Europe, USA, and Libya: Possible Implications for Preventing Sudden Cardiac Death

    Directory of Open Access Journals (Sweden)

    Salaheddin Sharif

    2017-06-01

    Full Text Available Sudden cardiac death is the leading cause of death in sport participants and may result from undiagnosed cardiac diseases. It has been universally agreed upon that pre-participation screening can identify those athletes at risk of sudden cardiac death, and yet, there is no commonly accepted protocol to screen athletes. Although the European Society of Cardiology (ESC and the American Heart Association (AHA recommend the routine screening of athletes to prevent sudden death, there is significant disagreement regarding the guidelines of the protocols. The American Heart Association protocol includes a detailed medical history and a physical examination, whereas the European Society of Cardiology protocol includes 12-lead electrocardiography with a detailed medical history and a physical examination. The cost benefit of using electrocardiography is debatable, particularly if the screening is used to prevent sudden death associated with uncommon diseases. The Libyan Football Federation established a new seasonal pre-competition medical assessment protocol for Libyan football athletes during the 2013-2014 season, which includes a medical history, physical examination, 12 lead electrocardiography, echocardiography, and blood test. Regardless of cost and differences in protocol, there is a significant value in pre-participation screening for athletes in order to decrease the incidence of sudden cardiac death, and this report examines some of these different protocols as well as their potential for identifying athletes at risk for sudden cardiac death.

  12. Performance Analysis of the Enhanced DSR Routing Protocol for the Short Time Disconnected MANET to the OPNET Modeler

    Directory of Open Access Journals (Sweden)

    PAPAJ Ján

    2013-05-01

    Full Text Available Disconnected mobile ad-hoc networks (MANET are very important areas of the research. In this article, the performance analysis of the enhanced dynamic source routing protocol (OPP_DSR is introduced. This modification enables the routing process in the case when there are no connections to other mobile nodes. It also will enable the routing mechanisms when the routes, selected by routing mechanisms, are disconnected for some time. Disconnection can be for a short time and standard routing protocol DSR cannot reflect on this situation.The main idea is based on opportunistic forwarding where the nodes not only forward data but it's stored in the cache during long time. The network parameters throughput, routing load and are analysed.

  13. What the drivers do and do not tell you: using verbal protocol analysis to investigate driver behaviour in emergency situations.

    Science.gov (United States)

    Banks, Victoria A; Stanton, Neville A; Harvey, Catherine

    2014-01-01

    Although task analysis of pedestrian detection can provide us with useful insights into how a driver may behave in emergency situations, the cognitive elements of driver decision-making are less well understood. To assist in the design of future Advanced Driver Assistance Systems, such as Autonomous Emergency Brake systems, it is essential that the cognitive elements of the driving task are better understood. This paper uses verbal protocol analysis in an exploratory fashion to uncover the thought processes underlying behavioural outcomes represented by hard data collected using the Southampton University Driving Simulator.

  14. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  15. Risk analysis in transport and logistics

    Directory of Open Access Journals (Sweden)

    Ene Andreea Bianca

    2017-12-01

    Full Text Available Globalization and production concentration have led to more efficient supply chain networks, which has led to the emergence of different types of risks. Although most companies have implemented special risk management programs, there may be events that can not be controlled by businesses, and unwanted consequences are not delayed.

  16. Applications of probabilistic risk analysis in nuclear criticality safety design

    International Nuclear Information System (INIS)

    Chang, J.K.

    1992-01-01

    Many documents have been prepared that try to define the scope of the criticality analysis and that suggest adding probabilistic risk analysis (PRA) to the deterministic safety analysis. The report of the US Department of Energy (DOE) AL 5481.1B suggested that an accident is credible if the occurrence probability is >1 x 10 -6 /yr. The draft DOE 5480 safety analysis report suggested that safety analyses should include the application of methods such as deterministic safety analysis, risk assessment, reliability engineering, common-cause failure analysis, human reliability analysis, and human factor safety analysis techniques. The US Nuclear Regulatory Commission (NRC) report NRC SG830.110 suggested that major safety analysis methods should include but not be limited to risk assessment, reliability engineering, and human factor safety analysis. All of these suggestions have recommended including PRA in the traditional criticality analysis

  17. Risk analysis of heat recovery steam generator with semi quantitative risk based inspection API 581

    Science.gov (United States)

    Prayogo, Galang Sandy; Haryadi, Gunawan Dwi; Ismail, Rifky; Kim, Seon Jin

    2016-04-01

    Corrosion is a major problem that most often occurs in the power plant. Heat recovery steam generator (HRSG) is an equipment that has a high risk to the power plant. The impact of corrosion damage causing HRSG power plant stops operating. Furthermore, it could be threaten the safety of employees. The Risk Based Inspection (RBI) guidelines by the American Petroleum Institute (API) 58 has been used to risk analysis in the HRSG 1. By using this methodology, the risk that caused by unexpected failure as a function of the probability and consequence of failure can be estimated. This paper presented a case study relating to the risk analysis in the HRSG, starting with a summary of the basic principles and procedures of risk assessment and applying corrosion RBI for process industries. The risk level of each HRSG equipment were analyzed: HP superheater has a medium high risk (4C), HP evaporator has a medium-high risk (4C), and the HP economizer has a medium risk (3C). The results of the risk assessment using semi-quantitative method of standard API 581 based on the existing equipment at medium risk. In the fact, there is no critical problem in the equipment components. Damage mechanisms were prominent throughout the equipment is thinning mechanism. The evaluation of the risk approach was done with the aim of reducing risk by optimizing the risk assessment activities.

  18. Risk analysis of heat recovery steam generator with semi quantitative risk based inspection API 581

    International Nuclear Information System (INIS)

    Prayogo, Galang Sandy; Haryadi, Gunawan Dwi; Ismail, Rifky; Kim, Seon Jin

    2016-01-01

    Corrosion is a major problem that most often occurs in the power plant. Heat recovery steam generator (HRSG) is an equipment that has a high risk to the power plant. The impact of corrosion damage causing HRSG power plant stops operating. Furthermore, it could be threaten the safety of employees. The Risk Based Inspection (RBI) guidelines by the American Petroleum Institute (API) 58 has been used to risk analysis in the HRSG 1. By using this methodology, the risk that caused by unexpected failure as a function of the probability and consequence of failure can be estimated. This paper presented a case study relating to the risk analysis in the HRSG, starting with a summary of the basic principles and procedures of risk assessment and applying corrosion RBI for process industries. The risk level of each HRSG equipment were analyzed: HP superheater has a medium high risk (4C), HP evaporator has a medium-high risk (4C), and the HP economizer has a medium risk (3C). The results of the risk assessment using semi-quantitative method of standard API 581 based on the existing equipment at medium risk. In the fact, there is no critical problem in the equipment components. Damage mechanisms were prominent throughout the equipment is thinning mechanism. The evaluation of the risk approach was done with the aim of reducing risk by optimizing the risk assessment activities.

  19. Risk analysis of heat recovery steam generator with semi quantitative risk based inspection API 581

    Energy Technology Data Exchange (ETDEWEB)

    Prayogo, Galang Sandy, E-mail: gasandylang@live.com; Haryadi, Gunawan Dwi; Ismail, Rifky [Department of Mechanical Engineering, Diponegoro University, Semarang (Indonesia); Kim, Seon Jin [Department of Mechanical & Automotive Engineering of Pukyong National University (Korea, Republic of)

    2016-04-19

    Corrosion is a major problem that most often occurs in the power plant. Heat recovery steam generator (HRSG) is an equipment that has a high risk to the power plant. The impact of corrosion damage causing HRSG power plant stops operating. Furthermore, it could be threaten the safety of employees. The Risk Based Inspection (RBI) guidelines by the American Petroleum Institute (API) 58 has been used to risk analysis in the HRSG 1. By using this methodology, the risk that caused by unexpected failure as a function of the probability and consequence of failure can be estimated. This paper presented a case study relating to the risk analysis in the HRSG, starting with a summary of the basic principles and procedures of risk assessment and applying corrosion RBI for process industries. The risk level of each HRSG equipment were analyzed: HP superheater has a medium high risk (4C), HP evaporator has a medium-high risk (4C), and the HP economizer has a medium risk (3C). The results of the risk assessment using semi-quantitative method of standard API 581 based on the existing equipment at medium risk. In the fact, there is no critical problem in the equipment components. Damage mechanisms were prominent throughout the equipment is thinning mechanism. The evaluation of the risk approach was done with the aim of reducing risk by optimizing the risk assessment activities.

  20. Thermal/optical methods for elemental carbon quantification in soils and urban dusts: equivalence of different analysis protocols.

    Directory of Open Access Journals (Sweden)

    Yongming Han

    Full Text Available Quantifying elemental carbon (EC content in geological samples is challenging due to interferences of crustal, salt, and organic material. Thermal/optical analysis, combined with acid pretreatment, represents a feasible approach. However, the consistency of various thermal/optical analysis protocols for this type of samples has never been examined. In this study, urban street dust and soil samples from Baoji, China were pretreated with acids and analyzed with four thermal/optical protocols to investigate how analytical conditions and optical correction affect EC measurement. The EC values measured with reflectance correction (ECR were found always higher and less sensitive to temperature program than the EC values measured with transmittance correction (ECT. A high-temperature method with extended heating times (STN120 showed the highest ECT/ECR ratio (0.86 while a low-temperature protocol (IMPROVE-550, with heating time adjusted for sample loading, showed the lowest (0.53. STN ECT was higher than IMPROVE ECT, in contrast to results from aerosol samples. A higher peak inert-mode temperature and extended heating times can elevate ECT/ECR ratios for pretreated geological samples by promoting pyrolyzed organic carbon (PyOC removal over EC under trace levels of oxygen. Considering that PyOC within filter increases ECR while decreases ECT from the actual EC levels, simultaneous ECR and ECT measurements would constrain the range of EC loading and provide information on method performance. Further testing with standard reference materials of common environmental matrices supports the findings. Char and soot fractions of EC can be further separated using the IMPROVE protocol. The char/soot ratio was lower in street dusts (2.2 on average than in soils (5.2 on average, most likely reflecting motor vehicle emissions. The soot concentrations agreed with EC from CTO-375, a pure thermal method.

  1. Thermal/optical methods for elemental carbon quantification in soils and urban dusts: equivalence of different analysis protocols.

    Science.gov (United States)

    Han, Yongming; Chen, Antony; Cao, Junji; Fung, Kochy; Ho, Fai; Yan, Beizhan; Zhan, Changlin; Liu, Suixin; Wei, Chong; An, Zhisheng

    2013-01-01

    Quantifying elemental carbon (EC) content in geological samples is challenging due to interferences of crustal, salt, and organic material. Thermal/optical analysis, combined with acid pretreatment, represents a feasible approach. However, the consistency of various thermal/optical analysis protocols for this type of samples has never been examined. In this study, urban street dust and soil samples from Baoji, China were pretreated with acids and analyzed with four thermal/optical protocols to investigate how analytical conditions and optical correction affect EC measurement. The EC values measured with reflectance correction (ECR) were found always higher and less sensitive to temperature program than the EC values measured with transmittance correction (ECT). A high-temperature method with extended heating times (STN120) showed the highest ECT/ECR ratio (0.86) while a low-temperature protocol (IMPROVE-550), with heating time adjusted for sample loading, showed the lowest (0.53). STN ECT was higher than IMPROVE ECT, in contrast to results from aerosol samples. A higher peak inert-mode temperature and extended heating times can elevate ECT/ECR ratios for pretreated geological samples by promoting pyrolyzed organic carbon (PyOC) removal over EC under trace levels of oxygen. Considering that PyOC within filter increases ECR while decreases ECT from the actual EC levels, simultaneous ECR and ECT measurements would constrain the range of EC loading and provide information on method performance. Further testing with standard reference materials of common environmental matrices supports the findings. Char and soot fractions of EC can be further separated using the IMPROVE protocol. The char/soot ratio was lower in street dusts (2.2 on average) than in soils (5.2 on average), most likely reflecting motor vehicle emissions. The soot concentrations agreed with EC from CTO-375, a pure thermal method.

  2. Essays on Systemic Risk : An analysis from multiple perspectives

    NARCIS (Netherlands)

    S. Muns (Sander)

    2016-01-01

    markdownabstractThis thesis is about systemic risk in the financial sector. It considers several aspects of systemic risk. It is a building block for an analysis of the impact of systemic risk on the real economy. It appears that stocks in the financial industry show a strong interdependence

  3. Analysis and management of risks experienced in tunnel construction

    Directory of Open Access Journals (Sweden)

    Cagatay Pamukcu

    2015-12-01

    Full Text Available In this study, first of all, the definitions of "risk", "risk analysis", "risk assessment" and "risk management" were made to avoid any confusions about these terms and significance of risk analysis and management in engineering projects was emphasized. Then, both qualitative and quantitative risk analysis techniques were mentioned and within the scope of the study, Event Tree Analysis method was selected in order to analyze the risks regarding TBM (Tunnel Boring Machine operations in tunnel construction. After all hazards that would be encountered during tunnel construction by TBM method had been investigated, those hazards were undergoing a Preliminary Hazard Analysis to sort out and prioritize the risks with high scores. When the risk scores were taken into consideration, it was seen that the hazards with high risk scores could be classified into 4 groups which are excavation + support induced accidents, accidents stemming from geologic conditions, auxiliary works, and project contract. According to these four classified groups of initiating events, Event Tree Analysis was conducted by taking into care 4 countermeasures apart from each other. Finally, the quantitative and qualitative consequences of Event Tree Analyses, which were undertaken for all initiating events, were investigated and interpreted together by making comparisons and referring to previous studies.

  4. Implant loading protocols for edentulous patients with fixed prostheses: a systematic review and meta-analysis.

    Science.gov (United States)

    Papaspyridakos, Panos; Chen, Chun-Jung; Chuang, Sung-Kiang; Weber, Hans-Peter

    2014-01-01

    To report on the effect of immediate implant loading with fixed prostheses compared to early and conventional loading on implant and prosthesis survival, failure, and complications. An electronic and manual search was conducted to identify randomized controlled clinical trials (RCTs) as well as prospective and retrospective studies involving rough surface implants and implant fixed complete dental prostheses for edentulous patients. The 62 studies that fulfilled the inclusion criteria featured 4 RCTs, 2 prospective case-control studies, 34 prospective cohort studies, and 22 retrospective cohort studies. These studies yielded data from 2,695 patients (2,757 edentulous arches) with 13,653 implants. Studies were grouped according to the loading protocol applied; 45 studies reported on immediate loading, 8 on early loading, and 11 on conventional loading. For the immediate loading protocol with flap surgery, the implant and prosthesis survival rates ranged from 90.1% to 100% and 93.75% to 100%, respectively (range of follow-up, 1 to 10 years). When immediate loading was combined with guided flapless implant placement, the implant survival rates ranged from 90% to 99.4%. For the early loading protocol, the implant and prosthesis survival rates ranged from 94.74% to 100% and 93.75% to 100%, respectively (range of follow-up, 1 to 10 years). For the conventional loading protocol, the implant and prosthesis survival rates ranged from 94.95% to 100% and 87.5% to 100%, respectively (range of follow-up, 2 to 15 years). No difference was identified between maxilla and mandible. When selecting cases carefully and using dental implants with a rough surface, immediate loading with fixed prostheses in edentulous patients results in similar implant and prosthesis survival and failure rates as early and conventional loading. For immediate loading, most of the studies recommended a minimal insertion torque of 30 Ncm. The estimated 1-year implant survival was above 99% with all three

  5. Perception and acceptance of technological risk sources. Volume 2. Empirical analysis of risk perception and acceptance

    Energy Technology Data Exchange (ETDEWEB)

    Renn, O

    1981-01-01

    Volume 2 presents a comparative investigation of risk perception and acceptance. It contains the evaluations of the two experiments in social psychology and the analysis of two intensive inquiries concerning risk perception with a view to 12 different risk sources. The data of the two inquiries were acquired from a total of 200 interview partners in two cities in North-Rhine Westphalia.

  6. Psychosocial risk and protective factors of secondary school dropout in Luxembourg: the protocol of an exploratory case-control study.

    Science.gov (United States)

    Esch, Pascale; Bocquet, Valéry; Pull, Charles; Couffignal, Sophie; Graas, Marc; Lair, Marie-Lise; Lehnert, Torsten; Fond-Harmant, Laurence; Ansseau, Marc

    2011-07-13

    In Luxembourg, the extensive phenomenon of school dropout is a prime policy concern in the light of individual, social and economic consequences. Although the authorities report an overall decrease of the national dropout rate, the proportion of early school leavers who remain without any specific occupation is still alarming. Therefore, this study intends a shift of focus from system-inherent to individual factors, including mental health and family correlates, to provide a more comprehensive analysis of the dropout phenomenon. The objectives of this study are to investigate the type and prevalence of psychiatric disorders among school dropouts and to compare the findings with those by a matched control group of regularly enrolled students. Furthermore, family variables and socioeconomic status will be analysed, as they are factors likely to interfere with both educational attainment and mental health. A trained psychologist will use structured interviews and self-report forms to investigate for mental health issues, information on schooling, socioeconomic situation and family life. Controls will be matched for gender, age, school type and educational grade. As school dropouts face a serious risk of long term professional and social marginalization, there is an evident need for action. Identifying psychosocial risk and protective factors of school dropout will deliver solid insight on how to conceive public health strategies for young people who may need a more customized support to carry out their academic potential. ClinicalTrials.gov Identifier: NCT01354236.

  7. Assessment and uncertainty analysis of groundwater risk.

    Science.gov (United States)

    Li, Fawen; Zhu, Jingzhao; Deng, Xiyuan; Zhao, Yong; Li, Shaofei

    2018-01-01

    Groundwater with relatively stable quantity and quality is commonly used by human being. However, as the over-mining of groundwater, problems such as groundwater funnel, land subsidence and salt water intrusion have emerged. In order to avoid further deterioration of hydrogeological problems in over-mining regions, it is necessary to conduct the assessment of groundwater risk. In this paper, risks of shallow and deep groundwater in the water intake area of the South-to-North Water Transfer Project in Tianjin, China, were evaluated. Firstly, two sets of four-level evaluation index system were constructed based on the different characteristics of shallow and deep groundwater. Secondly, based on the normalized factor values and the synthetic weights, the risk values of shallow and deep groundwater were calculated. Lastly, the uncertainty of groundwater risk assessment was analyzed by indicator kriging method. The results meet the decision maker's demand for risk information, and overcome previous risk assessment results expressed in the form of deterministic point estimations, which ignore the uncertainty of risk assessment. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. Method for environmental risk analysis (MIRA) revision 2007

    International Nuclear Information System (INIS)

    2007-04-01

    OLF's instruction manual for carrying out environmental risk analyses provides a united approach and a common framework for environmental risk assessments. This is based on the best information available. The manual implies standardizations of a series of parameters, input data and partial analyses that are included in the environmental risk analysis. Environmental risk analyses carried out according to the MIRA method will thus be comparable between fields and between companies. In this revision an update of the text in accordance with today's practice for environmental risk analyses and prevailing regulations is emphasized. Moreover, method adjustments for especially protected beach habitats have been introduced, as well as a general method for estimating environmental risk concerning fish. Emphasis has also been put on improving environmental risk analysis' possibilities to contribute to a better management of environmental risk in the companies (ml)

  9. Integrated risk analysis of global climate change

    International Nuclear Information System (INIS)

    Shlyakhter, Alexander; Wilson, Richard; Valverde A, L.J. Jr.

    1995-01-01

    This paper discusses several factors that should be considered in integrated risk analyses of global climate change. We begin by describing how the problem of global climate change can be subdivided into largely independent parts that can be linked together in an analytically tractable fashion. Uncertainty plays a central role in integrated risk analyses of global climate change. Accordingly, we consider various aspects of uncertainty as they relate to the climate change problem. We also consider the impacts of these uncertainties on various risk management issues, such as sequential decision strategies, value of information, and problems of interregional and intergenerational equity. (author)

  10. Risk analysis with regard to nuclear engineering

    International Nuclear Information System (INIS)

    Birkhofer, A.

    1980-01-01

    The author discusses the following questions: why are risk analyses elaborated. How are they carried out and which problems may arise. Completeness problem, data, human factors, common-mode-failures, accident simulation. To give an idea of the applicability of the results of risk analyses the author deals with systems comparison and system optimization, maintenance and testing strategies, incidents and the course of accidents that have to be considered in designing technical safety measures for nuclear power plants. Finally, the author tries to enter into questions that might arise due to the effects risk analyses may create in the general public. (HSCH) [de

  11. Methodology for risk analysis of nuclear installations

    International Nuclear Information System (INIS)

    Vasconcelos, Vanderley de; Senne Junior, Murillo; Jordao, Elizabete

    2002-01-01

    Both the licensing standards for general uses in nuclear facilities and the specific ones require a risk assessment during their licensing processes. The risk assessment is carried out through the estimation of both probability of the occurrence of the accident, and their magnitudes. This is a complex task because the great deal of potential hazardous events that can occur in nuclear facilities difficult the statement of the accident scenarios. There are also many available techniques to identify the potential accidents, estimate their probabilities, and evaluate their magnitudes. In this paper is presented a new methodology that systematizes the risk assessment process, and orders the accomplishment of their several steps. (author)

  12. EC Transmission Line Risk Identification and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Bigelow, Tim S [ORNL

    2012-04-01

    The purpose of this document is to assist in evaluating and planning for the cost, schedule, and technical project risks associated with the delivery and operation of the EC (Electron cyclotron) transmission line system. In general, the major risks that are anticipated to be encountered during the project delivery phase associated with the implementation of the Procurement Arrangement for the EC transmission line system are associated with: (1) Undefined or changing requirements (e.g., functional or regulatory requirements) (2) Underperformance of prototype, first unit, or production components during testing (3) Unavailability of qualified vendors for critical components Technical risks associated with the design and operation of the system are also identified.

  13. Risk Analysis for Unintentional Slide Deployment During Airline Operations.

    Science.gov (United States)

    Ayra, Eduardo S; Insua, David Ríos; Castellanos, María Eugenia; Larbi, Lydia

    2015-09-01

    We present a risk analysis undertaken to mitigate problems in relation to the unintended deployment of slides under normal operations within a commercial airline. This type of incident entails relevant costs for the airline industry. After assessing the likelihood and severity of its consequences, we conclude that such risks need to be managed. We then evaluate the effectiveness of various countermeasures, describing and justifying the chosen ones. We also discuss several issues faced when implementing and communicating the proposed measures, thus fully illustrating the risk analysis process. © 2015 Society for Risk Analysis.

  14. Impact of the Kyoto Protocol on the Iberian Electricity Market: A scenario analysis

    International Nuclear Information System (INIS)

    Reneses, Javier; Centeno, Efraim

    2008-01-01

    This paper presents an assessment of the impact of the Kyoto Protocol on the Iberian Electricity Market during two periods: the first phase (2005-2007) and the second phase (2008-2012). A market-equilibrium model is used in order to analyze different conditions faced by generation companies. Scenarios involving CO 2 -emission prices, hydro conditions, demand, fuel prices and renewable generation are considered. This valuation will show the significance of CO 2 -emission prices as regards Spanish and Portuguese electricity prices, generation mix, utilities profits and the total CO 2 emissions. Furthermore, the results will illustrate how energy policies implemented by regulators are critical for Spain and Portugal in order to mitigate the negative impact of the Kyoto Protocol. In conclusion, the Iberian electricity system will not be able to reach the Kyoto targets, except in very favorable conditions (CO 2 -emission prices over Euro 15/ton and the implementation of very efficient energy policies)

  15. An Analysis of Error Reconciliation Protocols for use in Quantum Key Distribution

    Science.gov (United States)

    2012-02-01

    INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN // CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR...of the messages passed, and that the time to prepare or separate the message information is negligible . Finally, for this experiment all errors...of interactions becomes negligible . In fact, of the three protocols, experiments performed here have shown that Winnow produces the highest average

  16. Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Wang, Jiong; Zhang, Hua

    2017-09-01

    In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social production and life. In this context, in order to further to enhance the stability of wireless network data transmission and security enhancements, the staff need to focus on routing security and carry out related work. Based on this, this paper analyzes the design of wireless sensor based on secure routing protocol.

  17. Design and Analysis of a secure multi-party communication protocol

    OpenAIRE

    Herberth, Klaus

    2016-01-01

    In the past years digital communication became an important aspect in every day life. Everything is shared and discussed in groups of friends, family or business part- ners without a proper way to protect that information. This master thesis introduces the first secure robust multi-party communication protocol which mimics a physical conversation with the help of a Diffie-Hellman key tree and social behaviours. Robust- ness against offline group members is reached by taking advantage of trans...

  18. Performance Analysis of Routing Protocols in Ad-hoc and Sensor Networking Environments

    Directory of Open Access Journals (Sweden)

    L. Gavrilovska

    2009-06-01

    Full Text Available Ad-hoc and sensor networks are becoming an increasingly popular wireless networking concepts lately. This paper analyzes and compares prominent routing schemes in these networking environments. The knowledge obtained can serve users to better understand short range wireless network solutions thus leading to options for implementation in various scenarios. In addition, it should aid researchers develop protocol improvements reliable for the technologies of interest.

  19. Assessment report on NRP sub-theme 'Risk Analysis'

    International Nuclear Information System (INIS)

    Biesiot, W.; Hendrickx, L.; Olsthoorn, A.A.

    1995-01-01

    An overview and assessment are presented of the three research projects carried out under NRP funding that concern risk-related topics: (1) The risks of nonlinear climate changes, (2) Socio-economic and policy aspects of changes in incidence and intensity of extreme (weather) events, and (3) Characterizing the risks: a comparative analysis of the risks of global warming and of relevant policy strategies. 1 tab., 6 refs

  20. Approach for seismic risk analysis for CANDU plants in Korea

    Energy Technology Data Exchange (ETDEWEB)

    Lee, B-S; Kim, T; Kang, S-K [Korea Power Engineering Co., Seoul (Korea, Republic of); Hong, S-Y; Roh, S-R [Korea Electric Power Corp., Taejon (Korea, Republic of). Research Centre

    1996-12-31

    A seismic risk analysis for CANDU type plants has never been performed. The study presented here suggested that the approach generally applied to LWR type plants could lead to unacceptable result, if directly applied to CANDU plants. This paper presents a modified approach for the seismic risk analysis of CANDU plants. (author). 5 refs., 2 tabs., 2 figs.

  1. Analysis of energy efficient routing protocols for implementation of a ubiquitous health system

    Science.gov (United States)

    Kwon, Jongwon; Park, Yongman; Koo, Sangjun; Ayurzana, Odgeral; Kim, Hiesik

    2007-12-01

    The innovative Ubiquitous-Health was born through convergence of medical service, with development of up to date information technologies and ubiquitous IT. The U-Health can be applied to a variety of special situations for managing functions of each medical center efficiently. This paper focuses on estimation of various routing protocols for implementation of U-health monitoring system. In order to facilitate wireless communication over the network, a routing protocol on the network layer is used to establish precise and efficient route between sensor nodes so that information acquired from sensors may be delivered in a timely manner. A route establishment should be considered to minimize overhead, data loss and power consumption because wireless networks for U-health are organized by a large number of sensor nodes which are small in size and have limited processing power, memory and battery life. In this paper a overview of wireless sensor network technologies commonly known is described as well as evaluation of three multi hop routing protocols which are flooding, gossiping and modified low energy adaptive clustering hierarchy(LEACH) for use with these networks using TOSSIM simulator. As a result of evaluation the integrated wireless sensor board was developed in particular. The board is embedded device based on AVR128 porting TinyOS. Also it employs bio sensor measures blood pressure, pulse frequency and ZigBee module for wireless communication. This paper accelerates the digital convergence age through continual research and development of technologies related the U-Health.

  2. Development of a protocol for sampling and analysis of ballast water in Jamaica

    Directory of Open Access Journals (Sweden)

    Achsah A Mitchell

    2014-09-01

    Full Text Available The transfer of ballast by the international shipping industry has negatively impacted the environment. To design such a protocol for the area, the ballast water tanks of seven bulk cargo vessels entering a Jamaican port were sampled between January 28, 2010 and August 17, 2010. Vessels originated from five ports and used three main routes, some of which conducted ballast water exchange. Twenty-six preserved and 22 live replicate zooplankton samples were obtained. Abundance and richness were higher than at temperate ports. Exchange did not alter the biotic composition but reduced the abundance. Two of the live sample replicates, containing 31.67 and 16.75 viable individuals m-3, were non-compliant with the International Convention for the Control and Management of Ships’ Ballast Water and Sediments. Approximately 12% of the species identified in the ballast water were present in the waters nearest the port in 1995 and 11% were present in the entire bay in 2005. The protocol designed from this study can be used to aid the establishment of a ballast water management system in the Caribbean or used as a foundation for the development of further protocols.

  3. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    Science.gov (United States)

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  4. Analysis of the new code stroke protocol in Asturias after one year. Experience at one hospital.

    Science.gov (United States)

    García-Cabo, C; Benavente, L; Martínez-Ramos, J; Pérez-Álvarez, Á; Trigo, A; Calleja, S

    2018-03-01

    Prehospital code stroke (CS) systems have been proved effective for improving access to specialised medical care in acute stroke cases. They also improve the prognosis of this disease, which is one of the leading causes of death and disability in our setting. The aim of this study is to analyse results one year after implementation of the new code stroke protocol at one hospital in Asturias. We prospectively included patients who were admitted to our tertiary care centre as per the code stroke protocol for the period of one year. We analysed 363 patients. Mean age was 69 years and 54% of the cases were men. During the same period in the previous year, there were 236 non-hospital CS activations. One hundred forty-seven recanalisation treatments were performed (66 fibrinolysis and 81 mechanical thrombectomies or combined treatments), representing a 25% increase with regard to the previous year. Recent advances in the management of acute stroke call for coordinated code stroke protocols that are adapted to the needs of each specific region. This may result in an increased number of patients receiving early care, as well as revascularisation treatments. Copyright © 2016 Sociedad Española de Neurología. Publicado por Elsevier España, S.L.U. All rights reserved.

  5. Operational Risk Management A Practical Approach to Intelligent Data Analysis

    CERN Document Server

    Kenett, Ron

    2010-01-01

    The book will introduce modern Operational Risk (OpR) Management and illustrates the various sources of OpR assessment and OpR mitigation. This book discusses how various data sources can be integrated and analyzed and how OpR is synergetic to other risk management activities such as Financial Risk Management and Internationalization. The topics will include state of the art technology such as semantic analysis, ontology engineering, data mining and statistical analysis.

  6. Living PRAs [probabilistic risk analysis] made easier with IRRAS [Integrated Reliability and Risk Analysis System

    International Nuclear Information System (INIS)

    Russell, K.D.; Sattison, M.B.; Rasmuson, D.M.

    1989-01-01

    The Integrated Reliability and Risk Analysis System (IRRAS) is an integrated PRA software tool that gives the user the ability to create and analyze fault trees and accident sequences using an IBM-compatible microcomputer. This program provides functions that range from graphical fault tree and event tree construction to cut set generation and quantification. IRRAS contains all the capabilities and functions required to create, modify, reduce, and analyze event tree and fault tree models used in the analysis of complex systems and processes. IRRAS uses advanced graphic and analytical techniques to achieve the greatest possible realization of the potential of the microcomputer. When the needs of the user exceed this potential, IRRAS can call upon the power of the mainframe computer. The role of the Idaho National Engineering Laboratory if the IRRAS program is that of software developer and interface to the user community. Version 1.0 of the IRRAS program was released in February 1987 to prove the concept of performing this kind of analysis on microcomputers. This version contained many of the basic features needed for fault tree analysis and was received very well by the PRA community. Since the release of Version 1.0, many user comments and enhancements have been incorporated into the program providing a much more powerful and user-friendly system. This version is designated ''IRRAS 2.0''. Version 3.0 will contain all of the features required for efficient event tree and fault tree construction and analysis. 5 refs., 26 figs

  7. Big Data Risk Analysis for Rail Safety?

    OpenAIRE

    Van Gulijk, Coen; Hughes, Peter; Figueres-Esteban, Miguel; Dacre, Marcus; Harrison, Chris; HUD; RSSB

    2015-01-01

    Computer scientists believe that the enormous amounts of data in the internet will unchain a management revolution of uncanny proportions. Yet, to date, the potential benefit of this revolution is scantily investigated for safety and risk management. This paper gives a brief overview of a research programme that investigates how the new internet-driven data-revolution could benefit safety and risk management for railway safety in the UK. The paper gives a brief overview the current activities...

  8. Comparative analysis of five DNA isolation protocols and three drying methods for leaves samples of Nectandra megapotamica (Spreng. Mez

    Directory of Open Access Journals (Sweden)

    Leonardo Severo da Costa

    2016-06-01

    Full Text Available The aim of the study was to establish a DNA isolation protocol Nectandra megapotamica (Spreng. Mez., able to obtain samples of high yield and quality for use in genomic analysis. A commercial kit and four classical methods of DNA extraction were tested, including three cetyltrimethylammonium bromide (CTAB-based and one sodium dodecyl sulfate (SDS-based methods. Three drying methods for leaves samples were also evaluated including drying at room temperature (RT, in an oven at 40ºC (S40, and in a microwave oven (FMO. The DNA solutions obtained from different types of leaves samples using the five protocols were assessed in terms of cost, execution time, and quality and yield of extracted DNA. The commercial kit did not extract DNA with sufficient quantity or quality for successful PCR reactions. Among the classic methods, only the protocols of Dellaporta and of Khanuja yielded DNA extractions for all three types of foliar samples that resulted in successful PCR reactions and subsequent enzyme restriction assays. Based on the evaluated variables, the most appropriate DNA extraction method for Nectandra megapotamica (Spreng. Mez. was that of Dellaporta, regardless of the method used to dry the samples. The selected method has a relatively low cost and total execution time. Moreover, the quality and quantity of DNA extracted using this method was sufficient for DNA sequence amplification using PCR reactions and to get restriction fragments.

  9. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  10. Integrating Household Risk Mitigation Behavior in Flood Risk Analysis: An Agent-Based Model Approach.

    Science.gov (United States)

    Haer, Toon; Botzen, W J Wouter; de Moel, Hans; Aerts, Jeroen C J H

    2017-10-01

    Recent studies showed that climate change and socioeconomic trends are expected to increase flood risks in many regions. However, in these studies, human behavior is commonly assumed to be constant, which neglects interaction and feedback loops between human and environmental systems. This neglect of human adaptation leads to a misrepresentation of flood risk. This article presents an agent-based model that incorporates human decision making in flood risk analysis. In particular, household investments in loss-reducing measures are examined under three economic decision models: (1) expected utility theory, which is the traditional economic model of rational agents; (2) prospect theory, which takes account of bounded rationality; and (3) a prospect theory model, which accounts for changing risk perceptions and social interactions through a process of Bayesian updating. We show that neglecting human behavior in flood risk assessment studies can result in a considerable misestimation of future flood risk, which is in our case study an overestimation of a factor two. Furthermore, we show how behavior models can support flood risk analysis under different behavioral assumptions, illustrating the need to include the dynamic adaptive human behavior of, for instance, households, insurers, and governments. The method presented here provides a solid basis for exploring human behavior and the resulting flood risk with respect to low-probability/high-impact risks. © 2016 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.

  11. Project Portfolio Risk Identification and Analysis, Considering Project Risk Interactions and Using Bayesian Networks

    Directory of Open Access Journals (Sweden)

    Foroogh Ghasemi

    2018-05-01

    Full Text Available An organization’s strategic objectives are accomplished through portfolios. However, the materialization of portfolio risks may affect a portfolio’s sustainable success and the achievement of those objectives. Moreover, project interdependencies and cause–effect relationships between risks create complexity for portfolio risk analysis. This paper presents a model using Bayesian network (BN methodology for modeling and analyzing portfolio risks. To develop this model, first, portfolio-level risks and risks caused by project interdependencies are identified. Then, based on their cause–effect relationships all portfolio risks are organized in a BN. Conditional probability distributions for this network are specified and the Bayesian networks method is used to estimate the probability of portfolio risk. This model was applied to a portfolio of a construction company located in Iran and proved effective in analyzing portfolio risk probability. Furthermore, the model provided valuable information for selecting a portfolio’s projects and making strategic decisions.

  12. Single-shell tank interim stabilization risk analysis

    International Nuclear Information System (INIS)

    Basche, A.D.

    1998-01-01

    The purpose of the Single-Shell Tank (SST) Interim Stabilization Risk Analysis is to provide a cost and schedule risk analysis of HNF-2358, Rev. 1, Single-Shell Tank Interim Stabilization Project Plan (Project Plan) (Ross et al. 1998). The analysis compares the required cost profile by fiscal year (Section 4.2) and revised schedule completion date (Section 4.5) to the Project Plan. The analysis also evaluates the executability of the Project Plan and recommends a path forward for risk mitigation

  13. Therapies for bruxism: a systematic review and network meta-analysis (protocol).

    Science.gov (United States)

    Mesko, Mauro Elias; Hutton, Brian; Skupien, Jovito Adiel; Sarkis-Onofre, Rafael; Moher, David; Pereira-Cenci, Tatiana

    2017-01-13

    Bruxism is a sleep disorder characterized by grinding and clenching of the teeth that may be related to irreversible tooth injuries. It is a prevalent condition occurring in up to 31% of adults. However, there is no definitive answer as to which of the many currently available treatments (including drug therapy, intramuscular injections, physiotherapy, biofeedback, kinesiotherapy, use of intraoral devices, or psychological therapy) is the best for the clinical management of the different manifestations of bruxism. The aim of this systematic review and network meta-analysis is to answer the following question: what is the best treatment for adult bruxists? Comprehensive searches of the Cochrane Library, MEDLINE (via PubMed), Scopus, and LILACS will be completed using the following keywords: bruxism and therapies and related entry terms. Studies will be included, according to the eligibility criteria (Controlled Clinical Trials and Randomized Clinical Trials, considering specific outcome measures for bruxism). The reference lists of included studies will be hand searched. Relevant data will be extracted from included studies using a specially designed data extraction sheet. Risk of bias of the included studies will be assessed, and the overall strength of the evidence will be summarized (i.e., GRADE). A random effects model will be used for all pairwise meta-analyses (with a 95% confidence interval). A Bayesian network meta-analysis will explore the relative benefits between the various treatments. The review will be reported using the Preferred Reporting Items for Systematic Reviews incorporating Network Meta-Analyses (PRISMA-NMA) statement. This systematic review aims at identifying and evaluating therapies to treat bruxism. This systematic review may lead to several recommendations, for both patients and researchers, as which is the best therapy for a specific patient case and how future studies need to be designed, considering what is available now and what is

  14. Risk analysis of Finnish peacekeeping in Kosovo.

    Science.gov (United States)

    Lehtomäki, Kyösti; Pääkkönen, Rauno J; Rantanen, Jorma

    2005-04-01

    The research team interviewed over 90 Finnish battalion members in Kosovo, visited 22 units or posts, registered its observations, and made any necessary measurements. Key persons were asked to list the most important risks for occupational safety and health in their area of responsibility. Altogether, 106 accidents and 40 cases of disease resulted in compensation claims in 2000. The risks to the peacekeeping force were about twice those of the permanent staff of military trainees in Finland. Altogether, 21 accidents or cases of disease resulted in sick leave for at least 3 months after service. One permanent injury resulted from an explosion. Biological, chemical, and physical factors caused 8 to 9 occupational illnesses each. Traffic accidents, operational factors, and munitions and mines were evaluated to be the three most important risk factors, followed by occupational hygiene, living conditions (mold, fungi, dust), and general hygiene. Possible fatal risks, such as traffic accidents and munitions and explosives, received a high ranking in both the subjective and the objective evaluations. One permanent injury resulted from an explosion, and two traffic accidents involved a fatality, although not of a peacekeeper. The reduction of sports and military training accidents, risk-control programs, and, for some tasks, better personal protection is considered a development challenge for the near future.

  15. Establishment of a protocol for the gene expression analysis of laser microdissected rat kidney samples with affymetrix genechips

    International Nuclear Information System (INIS)

    Stemmer, Kerstin; Ellinger-Ziegelbauer, Heidrun; Lotz, Kerstin; Ahr, Hans-J.; Dietrich, Daniel R.

    2006-01-01

    Laser microdissection in conjunction with microarray technology allows selective isolation and analysis of specific cell populations, e.g., preneoplastic renal lesions. To date, only limited information is available on sample preparation and preservation techniques that result in both optimal histomorphological preservation of sections and high-quality RNA for microarray analysis. Furthermore, amplification of minute amounts of RNA from microdissected renal samples allowing analysis with genechips has only scantily been addressed to date. The objective of this study was therefore to establish a reliable and reproducible protocol for laser microdissection in conjunction with microarray technology using kidney tissue from Eker rats p.o. treated for 7 days and 6 months with 10 and 1 mg Aristolochic acid/kg bw, respectively. Kidney tissues were preserved in RNAlater or snap frozen. Cryosections were cut and stained with either H and E or cresyl violet for subsequent morphological and RNA quality assessment and laser microdissection. RNA quality was comparable in snap frozen and RNAlater-preserved samples, however, the histomorphological preservation of renal sections was much better following cryopreservation. Moreover, the different staining techniques in combination with sample processing time at room temperature can have an influence on RNA quality. Different RNA amplification protocols were shown to have an impact on gene expression profiles as demonstrated with Affymetrix Rat Genome 230 2 .0 arrays. Considering all the parameters analyzed in this study, a protocol for RNA isolation from laser microdissected samples with subsequent Affymetrix chip hybridization was established that was also successfully applied to preneoplastic lesions laser microdissected from Aristolochic acid-treated rats

  16. Efficacy of Mobile Serious Games in Increasing HIV Risk Perception in Swaziland: A Randomized Control Trial (SGprev Trial) Research Protocol

    Science.gov (United States)

    Musumari, Patou; El-Saaidi, Christina; Techasrivichien, Teeranee; Suguimoto, S. Pilar; Ono Kihara, Masako; Kihara, Masahiro

    2016-01-01

    the mean change in the wait-list control group at 4-weeks post-intervention. We will use standardized regression coefficients to calculate the effect of the intervention on our primary outcome with P values. We will conduct both intention to treat and as treated analysis. Results This study is funded by Hayao Nakayama Foundation for Science & Technology and Culture; Grant number H26-A2-41. The research and development approval has been obtained from Kyoto University Graduate School and Faculty of Medicine Ethics Committee, Japan, and Swaziland’s Ministry of Health Ethics and Scientific committee. Results are expected in February 2017. Conclusions This study will provide evidence on the efficiency of a mobile phone interactive game in increasing HIV risk perception in Swaziland. Our findings may also be generalizable to similar settings in SSA. Trial Registration University Hospital Medical Information Network Clinical Trial Registry ID number (UMIN-CTR):UMIN000021781; URL:https://upload.umin.ac.jp/cgi-open-bin/ctr_e/ctr_view.cgi?recptno=R000025103 (Archived by WebCite at http://www.webcitation.org/6hOphB11a). PMID:27876685

  17. Risk Analysis for the Different Consolidation Proposals

    CERN Document Server

    Strait, J

    2009-01-01

    In parallel with the repairs in sector 34, improvements are planned to a number of systems, to allow safe detection of faults similar to the one which caused the incident of 19 September, and to limit the damage should a similar incident nonetheless occur. These include improved bus and quench detection systems, improved pressure relief for the insulating and beam vacuum systems, and improved anchoring of the SSS to the tunnel floor. Not all of the planned mitigations, however, may be fully implemented before the restart of the LHC in 2009. I will review the potential benefits of partial or complete implementation of each of the planned improvements, individually or together with others, and conversely the potential risks (consequences) of delayed implementation. I will also review the risks that remain even after the planned consolidation is complete. Considering all proposals and the different risks, I will comment on what would be the best strategy for consolidation, and on the strategy for operations unde...

  18. Impact of targeted scanning protocols on perinatal outcomes in pregnancies at risk of placenta accreta spectrum or vasa previa.

    Science.gov (United States)

    Melcer, Yaakov; Jauniaux, Eric; Maymon, Shlomit; Tsviban, Anna; Pekar-Zlotin, Marina; Betser, Moshe; Maymon, Ron

    2018-04-01

    Placenta accreta spectrum and vasa previa (VP) are congenital disorders of placentation associated with high morbidity and mortality for both mothers and newborns when undiagnosed before delivery. Prenatal diagnosis of these conditions is essential to allow multidisciplinary management and thus improve perinatal outcomes. The objective of the study was to compare perinatal outcome in women with placenta accreta spectrum or vasa previa before and after implementation of targeted scanning protocols. This retrospective study included 2 nonconcurrent cohorts for each condition before and after implementation of the corresponding protocols (2004-1012 vs 2013-2016 for placenta accreta spectrum and 1988-2007 vs 2008-2016 for vasa previa). Clinical reports of women diagnosed with placenta accreta spectrum and vasa previa during the study periods were reviewed and outcomes were compared. In total, there were 97 cases of placenta accreta spectrum and 51 cases with vasa previa, all confirmed at delivery. In both cohorts, the prenatal detection rate increased after implementation of the scanning protocols (28 of 65 cases [43.1%] vs 31 of 32 cases [96.9%], P accreta spectrum and 9 of 18 cases [50%] vs 29 of 33 cases [87.9%], 87.9%, P accreta spectrum cohort, the estimated blood loss and the postoperative hospitalization stay decreased between periods (1520 ± 845 vs 1168 ± 707 mL, P accreta spectrum and vasa previa was associated with improved maternal and neonatal outcomes. The continuous increases in the rates of caesarean deliveries and use of assisted reproductive technology highlights the need to develop training programs and introduce targeted scanning protocols at the national and international levels. Copyright © 2018 Elsevier Inc. All rights reserved.

  19. The Total Risk Analysis of Large Dams under Flood Hazards

    Directory of Open Access Journals (Sweden)

    Yu Chen

    2018-02-01

    Full Text Available Dams and reservoirs are useful systems in water conservancy projects; however, they also pose a high-risk potential for large downstream areas. Flood, as the driving force of dam overtopping, is the main cause of dam failure. Dam floods and their risks are of interest to researchers and managers. In hydraulic engineering, there is a growing tendency to evaluate dam flood risk based on statistical and probabilistic methods that are unsuitable for the situations with rare historical data or low flood probability, so a more reasonable dam flood risk analysis method with fewer application restrictions is needed. Therefore, different from previous studies, this study develops a flood risk analysis method for large dams based on the concept of total risk factor (TRF used initially in dam seismic risk analysis. The proposed method is not affected by the adequacy of historical data or the low probability of flood and is capable of analyzing the dam structure influence, the flood vulnerability of the dam site, and downstream risk as well as estimating the TRF of each dam and assigning corresponding risk classes to each dam. Application to large dams in the Dadu River Basin, Southwestern China, demonstrates that the proposed method provides quick risk estimation and comparison, which can help local management officials perform more detailed dam safety evaluations for useful risk management information.

  20. Risk Analysis for Environmental Health Triage

    International Nuclear Information System (INIS)

    Bogen, K T

    2005-01-01

    The Homeland Security Act mandates development of a national, risk-based system to support planning for, response to and recovery from emergency situations involving large-scale toxic exposures. To prepare for and manage consequences effectively, planners and responders need not only to identify zones of potentially elevated individual risk, but also to predict expected casualties. Emergency response support systems now define ''consequences'' by mapping areas in which toxic chemical concentrations do or may exceed Acute Exposure Guideline Levels (AEGLs) or similar guidelines. However, because AEGLs do not estimate expected risks, current unqualified claims that such maps support consequence management are misleading. Intentionally protective, AEGLs incorporate various safety/uncertainty factors depending on scope and quality of chemical-specific toxicity data. Some of these factors are irrelevant, and others need to be modified, whenever resource constraints or exposure-scenario complexities require responders to make critical trade-off (triage) decisions in order to minimize expected casualties. AEGL-exceedance zones cannot consistently be aggregated, compared, or used to calculate expected casualties, and so may seriously misguide emergency response triage decisions. Methods and tools well established and readily available to support environmental health protection are not yet developed for chemically related environmental health triage. Effective triage decisions involving chemical risks require a new assessment approach that focuses on best estimates of likely casualties, rather than on upper plausible bounds of individual risk. If risk-based consequence management is to become a reality, federal agencies tasked with supporting emergency response must actively coordinate to foster new methods that can support effective environmental health triage

  1. Risk analysis: divergent models and convergent interpretations

    Science.gov (United States)

    Carnes, B. A.; Gavrilova, N.

    2001-01-01

    Material presented at a NASA-sponsored workshop on risk models for exposure conditions relevant to prolonged space flight are described in this paper. Analyses used mortality data from experiments conducted at Argonne National Laboratory on the long-term effects of external whole-body irradiation on B6CF1 mice by 60Co gamma rays and fission neutrons delivered as a single exposure or protracted over either 24 or 60 once-weekly exposures. The maximum dose considered was restricted to 1 Gy for neutrons and 10 Gy for gamma rays. Proportional hazard models were used to investigate the shape of the dose response at these lower doses for deaths caused by solid-tissue tumors and tumors of either connective or epithelial tissue origin. For protracted exposures, a significant mortality effect was detected at a neutron dose of 14 cGy and a gamma-ray dose of 3 Gy. For single exposures, radiation-induced mortality for neutrons also occurred within the range of 10-20 cGy, but dropped to 86 cGy for gamma rays. Plots of risk relative to control estimated for each observed dose gave a visual impression of nonlinearity for both neutrons and gamma rays. At least for solid-tissue tumors, male and female mortality was nearly identical for gamma-ray exposures, but mortality risks for females were higher than for males for neutron exposures. As expected, protracting the gamma-ray dose reduced mortality risks. Although curvature consistent with that observed visually could be detected by a model parameterized to detect curvature, a relative risk term containing only a simple term for total dose was usually sufficient to describe the dose response. Although detectable mortality for the three pathology end points considered typically occurred at the same level of dose, the highest risks were almost always associated with deaths caused by tumors of epithelial tissue origin.

  2. Stress Analysis in Managing the Region’s Budget Risks

    Directory of Open Access Journals (Sweden)

    Natalya Pavlovna Pazdnikova

    2014-09-01

    Full Text Available The article addresses the implementation of budget risk management methods into the practices of governmental authorities. Drawing on the example of a particular region the article aims to demonstrate the possible methods of budget risk management. The authors refine the existing approaches to the notion of risk in its relation to budget system by introducing the notion of “budget risk.” Here the focus is the risk of default of budget spending in full which causes underfunding of territories and decrease in quality of life in the region. The authors have particularized the classification of budget risks and grouped together the criteria and factors which significantly influence the assessment and choice of method to manage budget risks. They hypothesize that budget risk is a financial risk. Therefore, the methods of financial risks management can be applied to budget risks management. The authors suggest a methodological approach to risk assessment based on correlation and regression analysis of program financing. The application of Kendall rank correlation coefficient allowed to assess the efficiency of budget spending on the implementation of state programs in Perm Krai. Two clusters — “Nature management and infrastructure” and “Public security” — turned out to be in the zone of high budget risk. The method of stress analysis, which consists in calculating Value at Risk (VaR, was applied to budget risks that in terms of probability are classified as critical. In order to assess risk as probability rate, the amount of Perm Krai deficit budget was calculated as induced variable from budget revenues and spending. The results demonstrate that contemporary management of public resources in the regions calls for the implementation of new management tools of higher quality and budget risk management is one of them.

  3. Performance Analysis of AODV Routing Protocol for Wireless Sensor Network based Smart Metering

    International Nuclear Information System (INIS)

    Farooq, Hasan; Jung, Low Tang

    2013-01-01

    Today no one can deny the need for Smart Grid and it is being considered as of utmost importance to upgrade outdated electric infrastructure to cope with the ever increasing electric load demand. Wireless Sensor Network (WSN) is considered a promising candidate for internetworking of smart meters with the gateway using mesh topology. This paper investigates the performance of AODV routing protocol for WSN based smart metering deployment. Three case studies are presented to analyze its performance based on four metrics of (i) Packet Delivery Ratio, (ii) Average Energy Consumption of Nodes (iii) Average End-End Delay and (iv) Normalized Routing Load.

  4. Performance analysis for a QoS-aware hybrid token-CDMA MAC protocol

    CSIR Research Space (South Africa)

    Liu, YS

    2007-09-01

    Full Text Available ) 20000 Bad state duration ( i badτ ) 3.2 ms Bad state ibadPEP 1.0 Good state igoodPEP Holtzman’s approximation WTRP Channel bit rate 1.28 Mbps Signal to Noise Rato (SNR) 8 dB .... INTRODUCTION d hoc and wireless mesh networks (WMNs) [1] are commonly known to implement IEEE 802.11 related schemes as their medium access control (MAC) protocols. It is known from [2,3] that with the 802.11 based scheme; the performance is degraded...

  5. Development of a protocol for the kinematic analysis of movement in patients with total hip arthroplasty

    OpenAIRE

    Mateu Pla, Joan

    2015-01-01

    The aim of this final degree project is to study and analyze the kinematics of the human body lower limbs. First of all, it is extremely important to establish a protocol in order to compare two patients operated with two different techniques of total hip arthroplasty. The three usual movements that are employed to make this comparison are gait, sit-to-stand and stairs climbing. A three-dimensional full body model is implemented and the kinematic parameters (angles) necessary for the st...

  6. Modeling issues in nuclear plant fire risk analysis

    International Nuclear Information System (INIS)

    Siu, N.

    1989-01-01

    This paper discusses various issues associated with current models for analyzing the risk due to fires in nuclear power plants. Particular emphasis is placed on the fire growth and suppression models, these being unique to the fire portion of the overall risk analysis. Potentially significant modeling improvements are identified; also discussed are a variety of modeling issues where improvements will help the credibility of the analysis, without necessarily changing the computed risk significantly. The mechanistic modeling of fire initiation is identified as a particularly promising improvement for reducing the uncertainties in the predicted risk. 17 refs., 5 figs. 2 tabs

  7. LDC commodity risk analysis and recommendations

    International Nuclear Information System (INIS)

    2002-01-01

    Under the current operation of the new competitive electricity market in Ontario, local distribution companies (LDCs) are required to pay the monthly invoice of the Independent Market Operator (IMO) before they collect from end-users for the consumption period covered by the invoice, with no clear guarantee that the recovery will occur. This situation creates a major cash flow problem and financial risk for LDCs and threatens the integrity and stability of the electricity market. This paper described 3 features of Ontario's competitive electricity market that create financial and commodity risk. The first problem is that there is no limit on how high prices can rise. Increases in wholesale commodity prices can result in a situation where the amount of the IMO's invoice is greater than the LDC's ability to pay at the time of receipt. Secondly, the LDC bears a 100 per cent payment obligation to the IMO administrator of the wholesale market. The third problem is that LDCs bear payment default risk from all consumers in the Ontario market, including electricity retailers. This paper presents some specific policy solutions that can protect the market from this threat. It was suggested that in order to protect the integrity of Ontario's electricity market during high prices, a policy must be drafted to address the commodity price financing risk (CPFR) issue. The policy must also define what happens if prices increase past the LDCs financing obligation limit. tabs., figs

  8. Risk Analysis and Security Countermeasure Selection

    CERN Document Server

    Norman, Thomas L

    2009-01-01

    Explains how to evaluate the appropriateness of security countermeasures, from a cost-effectiveness perspective. This title guides readers from basic principles to complex processes in a step-by-step fashion, evaluating DHS-approved risk assessment methods, including CARVER, API/NPRA, RAMCAP, and various Sandia methodologies

  9. How to Perform an Ethical Risk Analysis (eRA).

    Science.gov (United States)

    Hansson, Sven Ove

    2018-02-26

    Ethical analysis is often needed in the preparation of policy decisions on risk. A three-step method is proposed for performing an ethical risk analysis (eRA). In the first step, the people concerned are identified and categorized in terms of the distinct but compatible roles of being risk-exposed, a beneficiary, or a decisionmaker. In the second step, a more detailed classification of roles and role combinations is performed, and ethically problematic role combinations are identified. In the third step, further ethical deliberation takes place, with an emphasis on individual risk-benefit weighing, distributional analysis, rights analysis, and power analysis. Ethical issues pertaining to subsidiary risk roles, such as those of experts and journalists, are also treated in this phase. An eRA should supplement, not replace, a traditional risk analysis that puts emphasis on the probabilities and severities of undesirable events but does not cover ethical issues such as agency, interpersonal relationships, and justice. © 2018 Society for Risk Analysis.

  10. Comparative analysis of different DNA extraction protocols in fresh and herbarium specimens of the genus Dalbergia.

    Science.gov (United States)

    Ribeiro, R A; Lovato, M B

    2007-03-29

    Five published DNA extraction protocols were compared for their ability to produce good quality DNA from fresh and herbarium leaves of several species of the genus Dalbergia. The leaves of these species contain high amounts of secondary metabolites, which make it difficult to perform a clean DNA extraction and thereby interfering with subsequent PCR amplification. The protocol that produced the best DNA quality in most of the Dalbergia species analyzed, utilizes polyvinylpyrrolidone to bind the phenolic compounds, a high molar concentration of NaCl to inhibit co-precipitation of polysaccharides and DNA, and LiCl for removing RNA by selective precipitation. The DNA quality of herbarium specimens was worse than that for fresh leaves, due to collecting conditions and preservation of samples. We analyzed 54 herbarium specimens, but the recovered DNA allowed successful PCR amplification in only eight. For the genus Dalbergia, the herbarium is an important source of material for phylogenetic and evolutionary studies; due to the occurrence of the different species in various geographical regions in Brazil, it is difficult to obtain fresh material in nature. Our results demonstrated that for Dalbergia species the methods used for the collection and preservation of herbarium specimens have a mayor influence on DNA quality and in the success of phylogenetic studies of the species.

  11. Quality of life and myelomeningocele: an ethical and evidence-based analysis of the Groningen Protocol.

    Science.gov (United States)

    Barry, Sean

    2010-01-01

    In 2005, a group of pediatricians at the University Medical Center in Groningen, The Netherlands, published the Groningen Protocol (GP) for Euthanasia in Newborns. This protocol is a set of guidelines devised in 2001 to clarify and facilitate the assessment of clinically stable neonates deemed to be in unbearable suffering for whom the prognosis is felt to be hopeless. At the time of publication, the GP had been in use for 7 years, and 22 patients, all with diagnosed myelomeningocele (MMC), had met the selection criteria for euthanasia by lethal injection. MMC is the most common neurological congenital anomaly, affecting approximately 300,000 newborns yearly worldwide. Neurosurgeons have a unique perspective on this disease and therefore an important voice, given the significant role they have in caring for these patients at all stages of their lives. This paper reviews the principal ethical arguments presented to date in the literature regarding the GP. It also provides an evidence-based critique of the GP in light of quality-of-life studies addressing adults with MMC, and ascertains whether or not the GP meets the criteria for an evidence-based guideline. Copyright © 2011 S. Karger AG, Basel.

  12. Performance Analysis of Modified Accelerative Preallocation MAC Protocol for Passive Star-Coupled WDMA Networks

    Science.gov (United States)

    Yun, Changho; Kim, Kiseon

    2006-04-01

    For the passive star-coupled wavelength-division multiple-access (WDMA) network, a modified accelerative preallocation WDMA (MAP-WDMA) media access control (MAC) protocol is proposed, which is based on AP-WDMA. To show the advantages of MAP-WDMA as an adequate MAC protocol for the network over AP-WDMA, the channel utilization, the channel-access delay, and the latency of MAP-WDMA are investigated and compared with those of AP-WDMA under various data traffic patterns, including uniform, quasi-uniform type, disconnected type, mesh type, and ring type data traffics, as well as the assumption that a given number of network stations is equal to that of channels, in other words, without channel sharing. As a result, the channel utilization of MAP-WDMA can be competitive with respect to that of AP-WDMA at the expense of insignificantly higher latency. Namely, if the number of network stations is small, MAP-WDMA provides better channel utilization for uniform, quasi-uniform-type, and disconnected-type data traffics at all data traffic loads, as well as for mesh and ring-type data traffics at low data traffic loads. Otherwise, MAP-WDMA only outperforms AP-WDMA for the first three data traffics at higher data traffic loads. In the aspect of channel-access delay, MAP-WDMA gives better performance than AP-WDMA, regardless of data traffic patterns and the number of network stations.

  13. Improved protocol and data analysis for accelerated shelf-life estimation of solid dosage forms.

    Science.gov (United States)

    Waterman, Kenneth C; Carella, Anthony J; Gumkowski, Michael J; Lukulay, Patrick; MacDonald, Bruce C; Roy, Michael C; Shamblin, Sheri L

    2007-04-01

    To propose and test a new accelerated aging protocol for solid-state, small molecule pharmaceuticals which provides faster predictions for drug substance and drug product shelf-life. The concept of an isoconversion paradigm, where times in different temperature and humidity-controlled stability chambers are set to provide a critical degradant level, is introduced for solid-state pharmaceuticals. Reliable estimates for temperature and relative humidity effects are handled using a humidity-corrected Arrhenius equation, where temperature and relative humidity are assumed to be orthogonal. Imprecision is incorporated into a Monte-Carlo simulation to propagate the variations inherent in the experiment. In early development phases, greater imprecision in predictions is tolerated to allow faster screening with reduced sampling. Early development data are then used to design appropriate test conditions for more reliable later stability estimations. Examples are reported showing that predicted shelf-life values for lower temperatures and different relative humidities are consistent with the measured shelf-life values at those conditions. The new protocols and analyses provide accurate and precise shelf-life estimations in a reduced time from current state of the art.

  14. Flood Risk Assessment Based On Security Deficit Analysis

    Science.gov (United States)

    Beck, J.; Metzger, R.; Hingray, B.; Musy, A.

    Risk is a human perception: a given risk may be considered as acceptable or unac- ceptable depending on the group that has to face that risk. Flood risk analysis of- ten estimates economic losses from damages, but neglects the question of accept- able/unacceptable risk. With input from land use managers, politicians and other stakeholders, risk assessment based on security deficit analysis determines objects with unacceptable risk and their degree of security deficit. Such a risk assessment methodology, initially developed by the Swiss federal authorities, is illustrated by its application on a reach of the Alzette River (Luxembourg) in the framework of the IRMA-SPONGE FRHYMAP project. Flood risk assessment always involves a flood hazard analysis, an exposed object vulnerability analysis, and an analysis combing the results of these two previous analyses. The flood hazard analysis was done with the quasi-2D hydraulic model FldPln to produce flood intensity maps. Flood intensity was determined by the water height and velocity. Object data for the vulnerability analysis, provided by the Luxembourg government, were classified according to their potential damage. Potential damage is expressed in terms of direct, human life and secondary losses. A thematic map was produced to show the object classification. Protection goals were then attributed to the object classes. Protection goals are assigned in terms of an acceptable flood intensity for a certain flood frequency. This is where input from land use managers and politicians comes into play. The perception of risk in the re- gion or country influences the protection goal assignment. Protection goals as used in Switzerland were used in this project. Thematic maps showing the protection goals of each object in the case study area for a given flood frequency were produced. Com- parison between an object's protection goal and the intensity of the flood that touched the object determine the acceptability of the risk and the

  15. Clinical manifestations of tension pneumothorax: protocol for a systematic review and meta-analysis

    Science.gov (United States)

    2014-01-01

    Background Although health care providers utilize classically described signs and symptoms to diagnose tension pneumothorax, available literature sources differ in their descriptions of its clinical manifestations. Moreover, while the clinical manifestations of tension pneumothorax have been suggested to differ among subjects of varying respiratory status, it remains unknown if these differences are supported by clinical evidence. Thus, the primary objective of this study is to systematically describe and contrast the clinical manifestations of tension pneumothorax among patients receiving positive pressure ventilation versus those who are breathing unassisted. Methods/Design We will search electronic bibliographic databases (MEDLINE, PubMed, EMBASE, and the Cochrane Database of Systematic Reviews) and clinical trial registries from their first available date as well as personal files, identified review articles, and included article bibliographies. Two investigators will independently screen identified article titles and abstracts and select observational (cohort, case–control, and cross-sectional) studies and case reports and series that report original data on clinical manifestations of tension pneumothorax. These investigators will also independently assess risk of bias and extract data. Identified data on the clinical manifestations of tension pneumothorax will be stratified according to whether adult or pediatric study patients were receiving positive pressure ventilation or were breathing unassisted, as well as whether the two investigators independently agreed that the clinical condition of the study patient(s) aligned with a previously published tension pneumothorax working definition. These data will then be summarized using a formal narrative synthesis alongside a meta-analysis of observational studies and then case reports and series where possible. Pooled or combined estimates of the occurrence rate of clinical manifestations will be calculated using

  16. On the validation of risk analysis-A commentary

    International Nuclear Information System (INIS)

    Rosqvist, Tony

    2010-01-01

    Aven and Heide (2009) [1] provided interesting views on the reliability and validation of risk analysis. The four validation criteria presented are contrasted with modelling features related to the relative frequency-based and Bayesian approaches to risk analysis. In this commentary I would like to bring forth some issues on validation that partly confirm and partly suggest changes in the interpretation of the introduced validation criteria-especially, in the context of low probability-high consequence systems. The mental model of an expert in assessing probabilities is argued to be a key notion in understanding the validation of a risk analysis.

  17. Risk analysis methodologies for the transportation of radioactive materials

    International Nuclear Information System (INIS)

    Geffen, C.A.

    1983-05-01

    Different methodologies have evolved for consideration of each of the many steps required in performing a transportation risk analysis. Although there are techniques that attempt to consider the entire scope of the analysis in depth, most applications of risk assessment to the transportation of nuclear fuel cycle materials develop specific methodologies for only one or two parts of the analysis. The remaining steps are simplified for the analyst by narrowing the scope of the effort (such as evaluating risks for only one material, or a particular set of accident scenarios, or movement over a specific route); performing a qualitative rather than a quantitative analysis (probabilities may be simply ranked as high, medium or low, for instance); or assuming some generic, conservative conditions for potential release fractions and consequences. This paper presents a discussion of the history and present state-of-the-art of transportation risk analysis methodologies. Many reports in this area were reviewed as background for this presentation. The literature review, while not exhaustive, did result in a complete representation of the major methods used today in transportation risk analysis. These methodologies primarily include the use of severity categories based on historical accident data, the analysis of specifically assumed accident sequences for the transportation activity of interest, and the use of fault or event tree analysis. Although the focus of this work has generally been on potential impacts to public groups, some effort has been expended in the estimation of risks to occupational groups in transportation activities

  18. Risk analysis of complex hydrogen infrastructures

    DEFF Research Database (Denmark)

    Markert, Frank; Marangon, Alessia; Carcassi, Marco

    2015-01-01

    Developing a future sustainable refuelling station network is the next important step to establish hydrogen as a fuel for vehicles and related services. Such stations will most likely be integrated in existing refuelling stations and result in multi-fuel storages with a variety of fuels being...... to improve the quality of biomass based fuels. Therefore, hydrogen supply and distribution chains will likely not only serve to fulfil the demands of refuelling, but may also be important for the wider electrical power and fuel industries. Based on an integrated hydrogen supply and distribution network...... assessment methodologies, and how functional models could support coherent risk and sustainability (Risk Assessment, Life Cycle Assessment /Life Cycle Costing) assessments, in order to find optimal solutions for the development of the infrastructure on a regional or national level....

  19. Analysis of power system collapse risk

    International Nuclear Information System (INIS)

    Eleschova, Z.; Belan, A.; Cintula, B.; Smitkova, M.

    2012-01-01

    In this paper are analysed the initialization events with considering different scenarios and their impact on the power system transient stability. As an initialization event is considered a short circuit at various places of power line. In each scenario are considered protection failures (backup protection), circuit-breaker failures (breaker failure relay activation). The individual states are analysed and the power system collapse risk assessed based on the simulation experiments results (Authors)

  20. Bayesian-network-based safety risk analysis in construction projects

    International Nuclear Information System (INIS)

    Zhang, Limao; Wu, Xianguo; Skibniewski, Miroslaw J.; Zhong, Jingbing; Lu, Yujie

    2014-01-01

    This paper presents a systemic decision support approach for safety risk analysis under uncertainty in tunnel construction. Fuzzy Bayesian Networks (FBN) is used to investigate causal relationships between tunnel-induced damage and its influential variables based upon the risk/hazard mechanism analysis. Aiming to overcome limitations on the current probability estimation, an expert confidence indicator is proposed to ensure the reliability of the surveyed data for fuzzy probability assessment of basic risk factors. A detailed fuzzy-based inference procedure is developed, which has a capacity of implementing deductive reasoning, sensitivity analysis and abductive reasoning. The “3σ criterion” is adopted to calculate the characteristic values of a triangular fuzzy number in the probability fuzzification process, and the α-weighted valuation method is adopted for defuzzification. The construction safety analysis progress is extended to the entire life cycle of risk-prone events, including the pre-accident, during-construction continuous and post-accident control. A typical hazard concerning the tunnel leakage in the construction of Wuhan Yangtze Metro Tunnel in China is presented as a case study, in order to verify the applicability of the proposed approach. The results demonstrate the feasibility of the proposed approach and its application potential. A comparison of advantages and disadvantages between FBN and fuzzy fault tree analysis (FFTA) as risk analysis tools is also conducted. The proposed approach can be used to provide guidelines for safety analysis and management in construction projects, and thus increase the likelihood of a successful project in a complex environment. - Highlights: • A systemic Bayesian network based approach for safety risk analysis is developed. • An expert confidence indicator for probability fuzzification is proposed. • Safety risk analysis progress is extended to entire life cycle of risk-prone events. • A typical

  1. Environmental risk assessment in GMO analysis.

    Science.gov (United States)

    Pirondini, Andrea; Marmiroli, Nelson

    2010-01-01

    Genetically modified or engineered organisms (GMOs, GEOs) are utilised in agriculture, expressing traits of interest, such as insect or herbicide resistance. Soybean, maize, cotton and oilseed rape are the GM crops with the largest acreage in the world. The distribution of GM acreage in the different countries is related with the different positions concerning labelling of GMO products: based on the principle of substantial equivalence, or rather based on the precautionary principle. The paper provides an overview on how the risks associated with release of GMO in the environments can be analysed and predicted, in view of a possible coexistence of GM and non-GM organisms in agriculture.Risk assessment procedures, both qualitative and quantitative, are compared in the context of application to GMOs considering also legislation requirements (Directive 2001/18/EC). Criteria and measurable properties to assess harm for human health and environmental safety are listed, and the possible consequences are evaluated in terms of significance.Finally, a mapping of the possible risks deriving from GMO release is reported, focusing on gene transfer to related species, horizontal gene transfer, direct and indirect effects on non target organisms, development of resistance in target organisms, and effects on biodiversity.

  2. Minimal intervention dentistry: part 3. Paediatric dental care--prevention and management protocols using caries risk assessment for infants and young children.

    Science.gov (United States)

    Ramos-Gomez, F J; Crystal, Y O; Domejean, S; Featherstone, J D B

    2012-11-01

    Recent increases in caries prevalence in young children throughout the world highlight the need for a simple but effective infant oral care programme. This programme needs to include a medical disease prevention management model with an early establishment of a dental home and a treatment approach based on individual patient risk. This article presents an updated approach with practical forms and tools based on the principles of caries management by risk assessment, CAMBRA. This method will aid the general practitioner to develop and maintain a comprehensive protocol adequate for infant and young children oral care visits. Perinatal oral health is vitally important in preventing early childhood caries (ECC) in young children. Providing dental treatment to expectant mothers and their young children in a 'dual parallel track' is an effective innovative strategy and an efficient practice builder. It promotes prevention rather than intervention, and this may be the best way to achieve long-lasting oral health for young patients. General dental practice can adopt easy protocols that will promote early preventive visits and anticipatory guidance/counselling rather than waiting for the need for restorative treatment.

  3. Analysis of Alternatives for Risk Assessment Methodologies and Tools

    Energy Technology Data Exchange (ETDEWEB)

    Nachtigal, Noel M. [Sandia National Lab. (SNL-CA), Livermore, CA (United States). System Analytics; Fruetel, Julia A. [Sandia National Lab. (SNL-CA), Livermore, CA (United States). Systems Research and Analysis; Gleason, Nathaniel J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States). Systems Research and Analysis; Helms, Jovana [Sandia National Lab. (SNL-CA), Livermore, CA (United States). Systems Research and Analysis; Imbro, Dennis Raymond [Sandia National Lab. (SNL-CA), Livermore, CA (United States). Systems Research and Analysis; Sumner, Matthew C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States). Systems Research and Analysis

    2013-10-01

    The purpose of this document is to provide a basic overview and understanding of risk assessment methodologies and tools from the literature and to assess the suitability of these methodologies and tools for cyber risk assessment. Sandia National Laboratories (SNL) performed this review in support of risk modeling activities performed for the Stakeholder Engagement and Cyber Infrastructure Resilience (SECIR) division of the Department of Homeland Security (DHS) Office of Cybersecurity and Communications (CS&C). The set of methodologies and tools covered in this document is not intended to be exhaustive; instead, it focuses on those that are commonly used in the risk assessment community. The classification of methodologies and tools was performed by a group of analysts with experience in risk analysis and cybersecurity, and the resulting analysis of alternatives has been tailored to address the needs of a cyber risk assessment.

  4. The effects of rhythm control strategies versus rate control strategies for atrial fibrillation and atrial flutter: a protocol for a systematic review with meta-analysis and Trial Sequential Analysis.

    Science.gov (United States)

    Sethi, Naqash J; Safi, Sanam; Nielsen, Emil E; Feinberg, Joshua; Gluud, Christian; Jakobsen, Janus C

    2017-03-06

    Atrial fibrillation is the most common arrhythmia of the heart with a prevalence of approximately 2% in the western world. Atrial flutter, another arrhythmia, occurs less often with an incidence of approximately 200,000 new patients per year in the USA. Patients with atrial fibrillation and atrial flutter have an increased risk of death and morbidities. The management of atrial fibrillation and atrial flutter is often based on interventions aiming at either a rhythm control strategy or a rate control strategy. The evidence on the comparable effects of these strategies is unclear. This protocol for a systematic review aims at identifying the best overall treatment strategy for atrial fibrillation and atrial flutter. This protocol for a systematic review was performed following the recommendations of the Cochrane Collaboration and the eight-step assessment procedure suggested by Jakobsen and colleagues. We plan to include all relevant randomised clinical trials assessing the effects of any rhythm control strategy versus any rate control strategy. We plan to search the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE, LILACS, Science Citation Index Expanded on Web of Science, and BIOSIS to identify relevant trials. Any eligible trial will be assessed and classified as either high risk of bias or low risk of bias, and our conclusions will be based on trials with low risk of bias. The analyses of the extracted data will be performed using Review Manager 5 and Trial Sequential Analysis. For both our primary and secondary outcomes, we will create a 'Summary of Findings' table and use GRADE assessment to assess the quality of the evidence. The results of this systematic review have the potential to benefit thousands of patients worldwide as well as healthcare systems and healthcare economy. PROSPERO CRD42016051433.

  5. Work program analysis - defining the capability/risk plan

    International Nuclear Information System (INIS)

    Hrinivich, W.A.

    2004-01-01

    Bruce Power has developed and implemented an analysis methodology (Work Program Analysis) to assess and address corporate business risk associated with work group capability. Work Program Analysis is proving to be an excellent tool for identifying and supporting key business decisions facing the line and senior management at Bruce Power. The following describes the methodology, its application and the results achieved. (author)

  6. The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel

    International Nuclear Information System (INIS)

    Li Jian; Sun Feng-Qi; Pan Ze-Shi; Nie Jin-Rui; Chen Yan-Hua; Yuan Kai-Guo

    2015-01-01

    To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein–Podolsky–Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003) 042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Q 0 (M : (Q 0 , 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ϵ is, the larger the error rate Q is. When the noise level ϵ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q < 0.153. Similarly, if error rate Q > 0.153 = Q 0 , eavesdropping information I > 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. (paper)

  7. Metabolomics Workbench: An international repository for metabolomics data and metadata, metabolite standards, protocols, tutorials and training, and analysis tools.

    Science.gov (United States)

    Sud, Manish; Fahy, Eoin; Cotter, Dawn; Azam, Kenan; Vadivelu, Ilango; Burant, Charles; Edison, Arthur; Fiehn, Oliver; Higashi, Richard; Nair, K Sreekumaran; Sumner, Susan; Subramaniam, Shankar

    2016-01-04

    The Metabolomics Workbench, available at www.metabolomicsworkbench.org, is a public repository for metabolomics metadata and experimental data spanning various species and experimental platforms, metabolite standards, metabolite structures, protocols, tutorials, and training material and other educational resources. It provides a computational platform to integrate, analyze, track, deposit and disseminate large volumes of heterogeneous data from a wide variety of metabolomics studies including mass spectrometry (MS) and nuclear magnetic resonance spectrometry (NMR) data spanning over 20 different species covering all the major taxonomic categories including humans and other mammals, plants, insects, invertebrates and microorganisms. Additionally, a number of protocols are provided for a range of metabolite classes, sample types, and both MS and NMR-based studies, along with a metabolite structure database. The metabolites characterized in the studies available on the Metabolomics Workbench are linked to chemical structures in the metabolite structure database to facilitate comparative analysis across studies. The Metabolomics Workbench, part of the data coordinating effort of the National Institute of Health (NIH) Common Fund's Metabolomics Program, provides data from the Common Fund's Metabolomics Resource Cores, metabolite standards, and analysis tools to the wider metabolomics community and seeks data depositions from metabolomics researchers across the world. © The Author(s) 2015. Published by Oxford University Press on behalf of Nucleic Acids Research.

  8. IMPLEMENTATION AND VALIDATION OF STATISTICAL TESTS IN RESEARCH'S SOFTWARE HELPING DATA COLLECTION AND PROTOCOLS ANALYSIS IN SURGERY.

    Science.gov (United States)

    Kuretzki, Carlos Henrique; Campos, Antônio Carlos Ligocki; Malafaia, Osvaldo; Soares, Sandramara Scandelari Kusano de Paula; Tenório, Sérgio Bernardo; Timi, Jorge Rufino Ribas

    2016-03-01

    The use of information technology is often applied in healthcare. With regard to scientific research, the SINPE(c) - Integrated Electronic Protocols was created as a tool to support researchers, offering clinical data standardization. By the time, SINPE(c) lacked statistical tests obtained by automatic analysis. Add to SINPE(c) features for automatic realization of the main statistical methods used in medicine . The study was divided into four topics: check the interest of users towards the implementation of the tests; search the frequency of their use in health care; carry out the implementation; and validate the results with researchers and their protocols. It was applied in a group of users of this software in their thesis in the strict sensu master and doctorate degrees in one postgraduate program in surgery. To assess the reliability of the statistics was compared the data obtained both automatically by SINPE(c) as manually held by a professional in statistics with experience with this type of study. There was concern for the use of automatic statistical tests, with good acceptance. The chi-square, Mann-Whitney, Fisher and t-Student were considered as tests frequently used by participants in medical studies. These methods have been implemented and thereafter approved as expected. The incorporation of the automatic SINPE (c) Statistical Analysis was shown to be reliable and equal to the manually done, validating its use as a research tool for medical research.

  9. Assessment of Adverse Events in Protocols, Clinical Study Reports, and Published Papers of Trials of Orlistat: A Document Analysis.

    Directory of Open Access Journals (Sweden)

    Jeppe Bennekou Schroll

    2016-08-01

    seven papers stated that "all adverse events were recorded." For one trial, we identified an additional 1,318 adverse events that were not listed or mentioned in the CSR itself but could be identified through manually counting individual adverse events reported in an appendix. We discovered that the majority of patients had multiple episodes of the same adverse event that were only counted once, though this was not described in the CSRs. We also discovered that participants treated with orlistat experienced twice as many days with adverse events as participants treated with placebo (22.7 d versus 14.9 d, p-value < 0.0001, Student's t test. Furthermore, compared with the placebo group, adverse events in the orlistat group were more severe. None of this was stated in the CSR or in the published paper. Our analysis was restricted to one drug tested in the mid-1990s; our results might therefore not be applicable for newer drugs.In the orlistat trials, we identified important disparities in the reporting of adverse events between protocols, clinical study reports, and published papers. Reports of these trials seemed to have systematically understated adverse events. Based on these findings, systematic reviews of drugs might be improved by including protocols and CSRs in addition to published articles.

  10. Urban flooding and health risk analysis by use of quantitative microbial risk assessment

    DEFF Research Database (Denmark)

    Andersen, Signe Tanja

    D thesis is to identify the limitations and possibilities for optimising microbial risk assessments of urban flooding through more evidence-based solutions, including quantitative microbial data and hydrodynamic water quality models. The focus falls especially on the problem of data needs and the causes......, but also when wading through a flooded area. The results in this thesis have brought microbial risk assessments one step closer to more uniform and repeatable risk analysis by using actual and relevant measured data and hydrodynamic water quality models to estimate the risk from flooding caused...... are expected to increase in the future. To ensure public health during extreme rainfall, solutions are needed, but limited knowledge on microbial water quality, and related health risks, makes it difficult to implement microbial risk analysis as a part of the basis for decision making. The main aim of this Ph...

  11. Environmental risk analysis for nanomaterials: Review and evaluation of frameworks

    DEFF Research Database (Denmark)

    Grieger, Khara Deanne; Linkov, Igor; Hansen, Steffen Foss

    2012-01-01

    to occupational settings with minor environmental considerations, and most have not been thoroughly tested on a wide range of NM. Care should also be taken when selecting the most appropriate risk analysis strategy for a given risk context. Given this, we recommend a multi-faceted approach to assess...... the environmental risks of NM as well as increased applications and testing of the proposed frameworks for different NM....

  12. HVAC fault tree analysis for WIPP integrated risk assessment

    International Nuclear Information System (INIS)

    Kirby, P.; Iacovino, J.

    1990-01-01

    In order to evaluate the public health risk from operation of the Waste Isolation Pilot Plant (WIPP) due to potential radioactive releases, a probabilistic risk assessment of waste handling operations was conducted. One major aspect of this risk assessment involved fault tree analysis of the plant heating, ventilation, and air conditioning (HVAC) systems, which comprise the final barrier between waste handling operations and the environment. 1 refs., 1 tab

  13. Effect modification of FADS2 polymorphisms on the association between breastfeeding and intelligence: protocol for a collaborative meta-analysis.

    Science.gov (United States)

    Hartwig, Fernando Pires; Davies, Neil Martin; Horta, Bernardo Lessa; Victora, Cesar Gomes; Davey Smith, George

    2016-06-15

    Evidence from observational studies and randomised controlled trials suggests that breastfeeding is positively associated with IQ, possibly because breast milk is a source of long-chain polyunsaturated fatty acids. Different studies have detected gene-breastfeeding interactions involving FADS2 variants and intelligence. However, findings are inconsistent regarding the direction of such effect modification. To clarify how FADS2 and breastfeeding interact in their association with IQ, we are conducting a consortium-based meta-analysis of independent studies. Results produced by each individual study using standardised analysis scripts and harmonised data will be used. breastfeeding, IQ and either rs174575 or rs1535 polymorphisms available; and being of European ancestry. twin studies; only poorly imputed genetic data available; or unavailability of proper ethics approval. Studies will be invited based on being known to have at least some of the required data, or suggested by participating studies as potentially eligible. This inclusive approach will favour achieving a larger sample size and be less prone to publication bias. Improving current understanding of FADS2-breastfeeding interaction may provide important biological insights regarding the importance of long-chain polyunsaturated fatty acids for the breastfeeding-IQ association. This meta-analysis will help to improve such knowledge by replicating earlier studies, conducting additional analysis and evaluating different sources of heterogeneity. Publishing this protocol will minimise the possibility of bias due to post hoc changes to the analysis protocol. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  14. WE-B-BRC-02: Risk Analysis and Incident Learning

    Energy Technology Data Exchange (ETDEWEB)

    Fraass, B. [Cedars Sinai Medical Center (United States)

    2016-06-15

    Prospective quality management techniques, long used by engineering and industry, have become a growing aspect of efforts to improve quality management and safety in healthcare. These techniques are of particular interest to medical physics as scope and complexity of clinical practice continue to grow, thus making the prescriptive methods we have used harder to apply and potentially less effective for our interconnected and highly complex healthcare enterprise, especially in imaging and radiation oncology. An essential part of most prospective methods is the need to assess the various risks associated with problems, failures, errors, and design flaws in our systems. We therefore begin with an overview of risk assessment methodologies used in healthcare and industry and discuss their strengths and weaknesses. The rationale for use of process mapping, failure modes and effects analysis (FMEA) and fault tree analysis (FTA) by TG-100 will be described, as well as suggestions for the way forward. This is followed by discussion of radiation oncology specific risk assessment strategies and issues, including the TG-100 effort to evaluate IMRT and other ways to think about risk in the context of radiotherapy. Incident learning systems, local as well as the ASTRO/AAPM ROILS system, can also be useful in the risk assessment process. Finally, risk in the context of medical imaging will be discussed. Radiation (and other) safety considerations, as well as lack of quality and certainty all contribute to the potential risks associated with suboptimal imaging. The goal of this session is to summarize a wide variety of risk analysis methods and issues to give the medical physicist access to tools which can better define risks (and their importance) which we work to mitigate with both prescriptive and prospective risk-based quality management methods. Learning Objectives: Description of risk assessment methodologies used in healthcare and industry Discussion of radiation oncology

  15. WE-B-BRC-02: Risk Analysis and Incident Learning

    International Nuclear Information System (INIS)

    Fraass, B.

    2016-01-01

    Prospective quality management techniques, long used by engineering and industry, have become a growing aspect of efforts to improve quality management and safety in healthcare. These techniques are of particular interest to medical physics as scope and complexity of clinical practice continue to grow, thus making the prescriptive methods we have used harder to apply and potentially less effective for our interconnected and highly complex healthcare enterprise, especially in imaging and radiation oncology. An essential part of most prospective methods is the need to assess the various risks associated with problems, failures, errors, and design flaws in our systems. We therefore begin with an overview of risk assessment methodologies used in healthcare and industry and discuss their strengths and weaknesses. The rationale for use of process mapping, failure modes and effects analysis (FMEA) and fault tree analysis (FTA) by TG-100 will be described, as well as suggestions for the way forward. This is followed by discussion of radiation oncology specific risk assessment strategies and issues, including the TG-100 effort to evaluate IMRT and other ways to think about risk in the context of radiotherapy. Incident learning systems, local as well as the ASTRO/AAPM ROILS system, can also be useful in the risk assessment process. Finally, risk in the context of medical imaging will be discussed. Radiation (and other) safety considerations, as well as lack of quality and certainty all contribute to the potential risks associated with suboptimal imaging. The goal of this session is to summarize a wide variety of risk analysis methods and issues to give the medical physicist access to tools which can better define risks (and their importance) which we work to mitigate with both prescriptive and prospective risk-based quality management methods. Learning Objectives: Description of risk assessment methodologies used in healthcare and industry Discussion of radiation oncology

  16. Risk of adverse pregnancy outcomes in women with periodontal disease and the effectiveness of interventions in decreasing this risk: protocol for systematic overview of systematic reviews.

    Science.gov (United States)

    Vanterpool, Sizzle F; Tomsin, Kathleen; Reyes, Leticia; Zimmermann, Luc J; Kramer, Boris W; Been, Jasper V

    2016-02-01

    systematic review and meta-analysis (PRISMA) statement. In our narrative data synthesis, we will consider risk of bias of individual reviews, focusing mainly on the conclusions of the highest quality reviews using the assessment of multiple systematic reviews (AMSTAR) checklist. Disagreements during search, selection, data extraction, and risk of bias assessment will be resolved through discussion and/or consultation of a third reviewer. PROSPERO CRD42015030132.

  17. Goal-Directed Fluid Resuscitation Protocol Based on Arterial Waveform Analysis of Major Burn Patients in a Mass Burn Casualty.

    Science.gov (United States)

    Chiao, Hao-Yu; Chou, Chang-Yi; Tzeng, Yuan-Sheng; Wang, Chih-Hsin; Chen, Shyi-Gen; Dai, Niann-Tzyy

    2018-02-01

    Adequate fluid titration during the initial resuscitation period of major burn patients is crucial. This study aimed to evaluate the feasibility and efficacy of a goal-directed fluid resuscitation protocol that used hourly urine output plus the arterial waveform analysis FloTrac (Edwards LifeSciences, Irvine, Calif) system for major burns to avoid fluid overload. We conducted a retrospective cohort study of 43 major burn patients at the Tri-Service General Hospital after the Formosa Fun Coast Dust Explosion on June 27, 2015. Because of the limited capacity of intensive care units (ICUs), 23 intubated patients were transferred from the burn wards or emergency department to the ICU within 24 hours. Fluid administration was adjusted to achieve a urine output of 30 to 50 mL/h, cardiac index greater than 2.5 L/min/m, and stroke volume variation (SVV) less than 12%. The hourly crystalloid fluid infusion rate was titrated based on SVV and hourly urine output. Of the 23 critically burned patients admitted to the ICU, 13 patients who followed the goal-directed fluid resuscitation protocol within 12 hours postburn were included in the analysis. The mean age (years) was 21.8, and the mean total body surface area (TBSA) burned (%) was 68.0. The mean Revised Baux score was 106.8. All patients sustained inhalation injury. The fluid volumes administered to patients in the first 24 hours and the second 24 hours (mL/kg/% total body surface area) were 3.62 ± 1.23 and 2.89 ± 0.79, respectively. The urine outputs in the first 24 hours and the second 24 hours (mL/kg/h) were 1.13 ± 0.66 and 1.53 ± 0.87, respectively. All patients achieved the established goals within 32 hours postburn. In-hospital mortality rate was 0%. The SVV-based goal-directed fluid resuscitation protocol leads to less unnecessary fluid administration during the early resuscitation phase. Clinicians can efficaciously manage the dynamic body fluid changes in major burn patients under the guidance of the protocol.

  18. Applying Multi-Criteria Analysis Methods for Fire Risk Assessment

    Directory of Open Access Journals (Sweden)

    Pushkina Julia

    2015-11-01

    Full Text Available The aim of this paper is to prove the application of multi-criteria analysis methods for optimisation of fire risk identification and assessment process. The object of this research is fire risk and risk assessment. The subject of the research is studying the application of analytic hierarchy process for modelling and influence assessment of various fire risk factors. Results of research conducted by the authors can be used by insurance companies to perform the detailed assessment of fire risks on the object and to calculate a risk extra charge to an insurance premium; by the state supervisory institutions to determine the compliance of a condition of object with requirements of regulations; by real state owners and investors to carry out actions for decrease in degree of fire risks and minimisation of possible losses.

  19. DYNAMIC HYBRIDS UNDER SOLVENCY II: RISK ANALYSIS AND MODIFICATION POSSIBILITIES

    Directory of Open Access Journals (Sweden)

    Christian Maier

    2017-06-01

    Full Text Available In this study, we investigate the new and standardized European system of supervisory called Solvency II. In essence, asymmetric distribution of information between policyholder and insurer triggered this new regulation which aims at better protecting policyholders. Its three-pillar model is about to challenge both, insurers as well as policyholders. The first pillar includes quantitative aspects, the second pillar contains qualitative aspects and the third pillar comprises market transparency and reporting obligations. Underwriting risks, the default risk of a bank and market risks can be identified for the dynamic hybrid. Solvency II covers all these risks in the first pillar and insurers shall deposit sufficient risk-bearing capital. In our analysis, we first identify the dynamic hybrid specific risks under the Solvency II regime und then develop product modifications to reduce this risk.

  20. Risk and safety analysis of nuclear systems

    National Research Council Canada - National Science Library

    Lee, John C; McCormick, Norman J

    2011-01-01

    ...), and failure modes of systems. All of this material is general enough that it could be used in non-nuclear applications, although there is an emphasis placed on the analysis of nuclear systems...