WorldWideScience

Sample records for single iui protocol

  1. IVF with planned single-embryo transfer versus IUI with ovarian stimulation in couples with unexplained subfertility: an economic analysis.

    Science.gov (United States)

    van Rumste, Minouche M E; Custers, Inge M; van Wely, Madelon; Koks, Carolien A; van Weering, Hans G I; Beckers, Nicole G M; Scheffer, Gabrielle J; Broekmans, Frank J M; Hompes, Peter G A; Mochtar, Monique H; van der Veen, Fulco; Mol, Ben W J

    2014-03-01

    Couples with unexplained subfertility are often treated with intrauterine insemination (IUI) with ovarian stimulation, which carries the risk of multiple pregnancies. An explorative randomized controlled trial was performed comparing one cycle of IVF with elective single-embryo transfer (eSET) versus three cycles of IUI-ovarian stimulation in couples with unexplained subfertility and a poor prognosis for natural conception, to assess the economic burden of the treatment modalities. The main outcome measures were ongoing pregnancy rates and costs. This study randomly assigned 58 couples to IVF-eSET and 58 couples to IUI-ovarian stimulation. The ongoing pregnancy rates were 24% in with IVF-eSET versus 21% with IUI-ovarian stimulation, with two and three multiple pregnancies, respectively. The mean cost per included couple was significantly different: €2781 with IVF-eSET and €1876 with IUI-ovarian stimulation (Pcosts per ongoing pregnancy were €2456 for IVF-eSET. In couples with unexplained subfertility, one cycle of IVF-eSET cost an additional €900 per couple compared with three cycles of IUI-ovarian stimulation, for no increase in ongoing pregnancy rates or decrease in multiple pregnancies. When IVF-eSET results in higher ongoing pregnancy rates, IVF would be the preferred treatment. Couples that have been trying to conceive unsuccessfully are often treated with intrauterine insemination (IUI) and medication to improve egg production (ovarian stimulation). This treatment carries the risk of multiple pregnancies like twins. We performed an explorative study among those couples that had a poor prognosis for natural conception. One cycle of IVF with transfer of one selected embryo (elective single-embryo transfer, eSET) was compared with three cycles of IUI-ovarian stimulation. The aim of this study was to assess the economic burden of both treatments. The Main outcome measures were number of good pregnancies above 12weeks and costs. We randomly assigned 58

  2. Techniques used for IUI: is it time for a change?

    NARCIS (Netherlands)

    Lemmens, L.; Kos, S.; Beijer, C.; Braat, D.D.M.; Nelen, W.L.D.M.; Wetzels, A.M.M.

    2017-01-01

    STUDY QUESTION: Are the guidelines for the technical aspects of IUI (WHO, 2010) still in accordance with the current literature? SUMMARY ANSWER: In general, the laboratory guidelines of the World Health Organization (WHO) are a suitable protocol, although the evidence is not always conclusive and

  3. Techniques used for IUI: is it time for a change?

    Science.gov (United States)

    Lemmens, L; Kos, S; Beijer, C; Braat, D D M; Nelen, W L D M; Wetzels, A M M

    2017-09-01

    Are the guidelines for the technical aspects of IUI (WHO, 2010) still in accordance with the current literature? In general, the laboratory guidelines of the World Health Organization (WHO) are a suitable protocol, although the evidence is not always conclusive and some changes are advisable. Lack of standardization of the technical procedures required for IUI might result in inter-laboratory variation in pregnancy rates. Most centers still use their own materials and methods even though some guidelines are available. A structural review focusing on the association between pregnancy rates and the procedures of semen collection (e.g. ejaculatory abstinence, collection place), semen processing (e.g. preparation method, temperature during centrifugation/storage), insemination (e.g. timing of IUI, bed rest after IUI) and the equipment used. A literature search was performed in Medline and the Cochrane library. When no adequate studies of the impact of a parameter on pregnancy results were found, its association with sperm parameters was reviewed. For most variables, the literature review revealed a low level of evidence, a limited number of studies and/or an inadequate outcome measure. Moreover, the comparison of procedures (i.e. semen preparation technique, time interval between semen, collection, processing and IUI) revealed no consensus about their results. It was not possible to develop an evidence-based, optimal IUI treatment protocol. The included studies exhibited a lack of standardization in inclusion criteria and methods used. This review emphasizes the need for more knowledge about and standardization of assisted reproduction technologies. Our literature search indicates that some of the recommendations in the laboratory guidelines could be adapted to improve standardization, comfort, quality control and to cut costs. The Dutch Foundation for Quality Assessment in Medical Laboratories (SKML), Nijmegen, The Netherlands. S.K. and W.N. have no conflicts of

  4. Cost-effectiveness of primary offer of IVF vs. primary offer of IUI followed by IVF (for IUI failures) in couples with unexplained or mild male factor subfertility.

    Science.gov (United States)

    Pashayan, Nora; Lyratzopoulos, Georgios; Mathur, Raj

    2006-06-23

    In unexplained and mild male factor subfertility, both intrauterine insemination (IUI) and in-vitro fertilisation (IVF) are indicated as first line treatments. Because the success rate of IUI is low, many couples failing IUI subsequently require IVF treatment. In practice, it is therefore important to examine the comparative outcomes (live birth-producing pregnancy), costs, and cost-effectiveness of primary offer of IVF, compared with primary offer of IUI followed by IVF for couples failing IUI. Mathematical modelling was used to estimate comparative clinical and cost effectiveness of either primary offer of one full IVF cycle (including frozen cycles when applicable) or "IUI + IVF" (defined as primary IUI followed by IVF for IUI failures) to a hypothetical cohort of subfertile couples who are eligible for both treatment strategies. Data used in calculations were derived from the published peer-reviewed literature as well as activity data of local infertility units. Cost-effectiveness ratios for IVF, "unstimulated-IUI (U-IUI) + IVF", and "stimulated IUI (S-IUI) + IVF" were 12,600 pounds sterling, 13,100 pound sterling and 15,100 pound sterling per live birth-producing pregnancy respectively. For a hypothetical cohort of 100 couples with unexplained or mild male factor subfertility, compared with primary offer of IVF, 6 cycles of "U-IUI + IVF" or of "S-IUI + IVF" would cost an additional 174,200 pounds sterling and 438,000 pounds sterling, representing an opportunity cost of 54 and 136 additional IVF cycles and 14 to 35 live birth-producing pregnancies respectively. For couples with unexplained and mild male factor subfertility, primary offer of a full IVF cycle is less costly and more cost-effective than providing IUI (of any modality) followed by IVF.

  5. Cost-effectiveness of primary offer of IVF vs. primary offer of IUI followed by IVF (for IUI failures in couples with unexplained or mild male factor subfertility

    Directory of Open Access Journals (Sweden)

    Lyratzopoulos Georgios

    2006-06-01

    Full Text Available Abstract Background In unexplained and mild male factor subfertility, both intrauterine insemination (IUI and in-vitro fertilisation (IVF are indicated as first line treatments. Because the success rate of IUI is low, many couples failing IUI subsequently require IVF treatment. In practice, it is therefore important to examine the comparative outcomes (live birth-producing pregnancy, costs, and cost-effectiveness of primary offer of IVF, compared with primary offer of IUI followed by IVF for couples failing IUI. Methods Mathematical modelling was used to estimate comparative clinical and cost effectiveness of either primary offer of one full IVF cycle (including frozen cycles when applicable or "IUI + IVF" (defined as primary IUI followed by IVF for IUI failures to a hypothetical cohort of subfertile couples who are eligible for both treatment strategies. Data used in calculations were derived from the published peer-reviewed literature as well as activity data of local infertility units. Results Cost-effectiveness ratios for IVF, "unstimulated-IUI (U-IUI + IVF", and "stimulated IUI (S-IUI + IVF" were £12,600, £13,100 and £15,100 per live birth-producing pregnancy respectively. For a hypothetical cohort of 100 couples with unexplained or mild male factor subfertility, compared with primary offer of IVF, 6 cycles of "U-IUI + IVF" or of "S-IUI + IVF" would cost an additional £174,200 and £438,000, representing an opportunity cost of 54 and 136 additional IVF cycles and 14 to 35 live birth-producing pregnancies respectively. Conclusion For couples with unexplained and mild male factor subfertility, primary offer of a full IVF cycle is less costly and more cost-effective than providing IUI (of any modality followed by IVF.

  6. Is IVF-served two different ways-more cost-effective than IUI with controlled ovarian hyperstimulation?

    Science.gov (United States)

    Tjon-Kon-Fat, R I; Bensdorp, A J; Bossuyt, P M M; Koks, C; Oosterhuis, G J E; Hoek, A; Hompes, P; Broekmans, F J; Verhoeve, H R; de Bruin, J P; van Golde, R; Repping, S; Cohlen, B J; Lambers, M D A; van Bommel, P F; Slappendel, E; Perquin, D; Smeenk, J; Pelinck, M J; Gianotten, J; Hoozemans, D A; Maas, J W M; Groen, H; Eijkemans, M J C; van der Veen, F; Mol, B W J; van Wely, M

    2015-10-01

    What is the cost-effectiveness of in vitro fertilization (IVF) with conventional ovarian stimulation, single embryo transfer (SET) and subsequent cryocycles or IVF in a modified natural cycle (MNC) compared with intrauterine insemination with controlled ovarian hyperstimulation (IUI-COH) as a first-line treatment in couples with unexplained subfertility and an unfavourable prognosis on natural conception?. Both IVF strategies are significantly more expensive when compared with IUI-COH, without being significantly more effective. In the comparison between IVF-MNC and IUI-COH, the latter is the dominant strategy. Whether IVF-SET is cost-effective depends on society's willingness to pay for an additional healthy child. IUI-COH and IVF, either after conventional ovarian stimulation or in a MNC, are used as first-line treatments for couples with unexplained or mild male subfertility. As IUI-COH is less invasive, this treatment is usually offered before proceeding to IVF. Yet, as conventional IVF with SET may lead to higher pregnancy rates in fewer cycles for a lower multiple pregnancy rate, some have argued to start with IVF instead of IUI-COH. In addition, IVF in the MNC is considered to be a more patient friendly and less costly form of IVF. We performed a cost-effectiveness analysis alongside a randomized noninferiority trial. Between January 2009 and February 2012, 602 couples with unexplained infertility and a poor prognosis on natural conception were allocated to three cycles of IVF-SET including frozen embryo transfers, six cycles of IVF-MNC or six cycles of IUI-COH. These couples were followed until 12 months after randomization. We collected data on resource use related to treatment, medication and pregnancy from the case report forms. We calculated unit costs from various sources. For each of the three strategies, we calculated the mean costs and effectiveness. Incremental cost-effectiveness ratios (ICER) were calculated for IVF-SET compared with IUI-COH and

  7. IVF or IUI as first-line treatment in unexplained subfertility: the conundrum of treatment selection markers.

    Science.gov (United States)

    Tjon-Kon-Fat, R I; Tajik, P; Zafarmand, M H; Bensdorp, A J; Bossuyt, P M M; Oosterhuis, G J E; van Golde, R; Repping, S; Lambers, M D A; Slappendel, E; Perquin, D; Pelinck, M J; Gianotten, J; Maas, J W M; Eijkemans, M J C; van der Veen, F; Mol, B W; van Wely, M

    2017-05-01

    Are there treatment selection markers that could aid in identifying couples, with unexplained or mild male subfertility, who would have better chances of a healthy child with IVF with single embryo transfer (IVF-SET) than with IUI with ovarian stimulation (IUI-OS)? We did not find any treatment selection markers that were associated with better chances of a healthy child with IVF-SET instead of IUI-OS in couples with unexplained or mild male subfertility. A recent trial, comparing IVF-SET to IUI-OS, found no evidence of a difference between live birth rates and multiple pregnancy rates. It was suggested that IUI-OS should remain the first-line treatment instead of IVF-SET in couples with unexplained or mild male subfertility and female age between 18 and 38 years. The question remains whether there are some couples that may have higher pregnancy chances if treated with IVF-SET instead of IUI. We performed our analyses on data from the INeS trial, where couples with unexplained or mild male subfertility and an unfavourable prognosis for natural conception were randomly allocated to IVF-SET, IVF in a modified natural cycle or IUI-OS. In view of the aim of this study, we only used data of the comparison between IVF-SET (201 couples) and IUI-OS (207 couples). We pre-defined the following baseline characteristics as potential treatment selection markers: female age, ethnicity, smoking status, type of subfertility (primary/secondary), duration of subfertility, BMI, pre-wash total motile count and Hunault prediction score. For each potential treatment selection marker, we explored the association with the chances of a healthy child after IVF-SET and IUI-OS and tested if there was an interaction with treatment. Given the exploratory nature of our analysis, we used a P-value of 0.1. None of the markers were associated with higher chances of a healthy child from IVF-SET compared to IUI-OS (P-value for interaction >0.10). Since this is the first large study that looked at

  8. Is IVF-served two different ways-more cost-effective than IUI with controlled ovarian hyperstimulation?

    NARCIS (Netherlands)

    Tjon-Kon-Fat, R. I.; Bensdorp, A. J.; Bossuyt, P. M. M.; Koks, C.; Oosterhuis, G. J. E.; Hoek, A.; Hompes, P.; Broekmans, F. J.; Verhoeve, H. R.; de Bruin, J. P.; van Golde, R.; Repping, S.; Cohlen, B. J.; Lambers, M. D. A.; van Bommel, P. F.; Slappendel, E.; Perquin, D.; Smeenk, J.; Pelinck, M. J.; Gianotten, J.; Hoozemans, D. A.; Maas, J. W. M.; Groen, H.; Eijkemans, M. J. C.; van der Veen, F.; Mol, B. W. J.; van Wely, M.

    2015-01-01

    What is the cost-effectiveness of in vitro fertilization (IVF) with conventional ovarian stimulation, single embryo transfer (SET) and subsequent cryocycles or IVF in a modified natural cycle (MNC) compared with intrauterine insemination with controlled ovarian hyperstimulation (IUI-COH) as a

  9. Effects of piroxicam administration on pregnancy outcome in intrauterine insemination (IUI) cycles: a randomized clinical trial.

    Science.gov (United States)

    Zarei, A; Mahboubi, M; Parsanezhad, M E; Alborzi, S; Younesi, M; Madadi, G

    2016-01-01

    Uterus contractibility is considered a powerful prognostic factor in predicting the embryo transfer outcome. Moreover, uterine contractions are known to be stimulated by prostaglandins which are produced by cyclooxygenase from arachidonic acid. As such, suppressing the inflammatory response and contractions using anti-inflammatory and relaxant agents is expected to result in increased success rate of embryo transfer and artificial insemination. To investigate the effect of piroxicam administration on the success rate in intrauterine insemination (IU) cycles in patients presenting with unexplained infertility. This randomized, placebo-controlled clinical trial included 260 women with unexplained infertility undergoing IUI cycles. Patients were randomly assigned to receive either piroxicam ten mg/day on days 4-6 after IUI or placebo (control group). The main outcome measures were number of IUI cycles, pregnancy, abortion, and multiple pregnancy rates. The pregnancy rate was found to be 25 (19.2%) and 16 (12.3%) in piroxicam and control groups, respectively (p = 0.039). Five patients (3.8%) in piroxicam group experienced twin pregnancy whereas only three patients (2.3%) in control group had twin pregnancy (p = 0.361). The pregnancy rate per cycle was also significantly higher in those who received piroxicam as compared to controls (11.16 vs. 6.66; p = 0.021). Administration of piroxicam after IUI is associated with decreased number of cycles, as well as increased pregnancy rate and pregnancy rate per cycle in IUI cycles. However, piroxicam did not have any effect on abortion, multiple pregnancy, and ongoing pregnancy rates.

  10. Endometrial Scratch Injury Induces Higher Pregnancy Rate for Women With Unexplained Infertility Undergoing IUI With Ovarian Stimulation: A Randomized Controlled Trial.

    Science.gov (United States)

    Maged, Ahmed M; Al-Inany, Hesham; Salama, Khaled M; Souidan, Ibrahim I; Abo Ragab, Hesham M; Elnassery, Noura

    2016-02-01

    To explore the impact of endometrial scratch injury (ESI) on intrauterine insemination (IUI) success. One hundred and fifty four infertile women received 100 mg of oral clomiphene citrate for 5 days starting on day 3 of the menstrual cycle. Patients were randomized to 2 equal groups: Group C received IUI without ESI and group S had ESI. Successful pregnancy was confirmed by ultrasound. 13, 21, and 10 women got pregnant after the first, second, and third IUI trials, respectively, with 28.6% cumulative pregnancy rate (PR). The cumulative PR was significantly higher in group S (39%) compared to group C (18.2%). The PR in group S was significantly higher compared to that in group C at the second and third trials. The PR was significantly higher in group S at the second trial compared to that reported in the same group at the first trial but nonsignificantly higher compared to that reported during the third trial, while in group C, the difference was nonsignificant. Eight pregnant women had first trimester abortion with 18.2% total abortion rate with nonsignificant difference between studied groups. The ESI significantly improves the outcome of IUI in women with unexplained infertility especially when conducted 1 month prior to IUI. © The Author(s) 2015.

  11. Metformin-letrozole in comparison with Metformin-clomiphene citrate in clomiphene-resistance PCOS patients undergoing IUI

    Directory of Open Access Journals (Sweden)

    Mohammad Hossein Fallahzadeh

    2011-01-01

    Full Text Available Background: Polycystic ovary syndrome (PCOS is associated with approximately 75% of women who suffer from infertility due to anovulation. Additionally, around 20– 25% of anovulatory women with PCOS do not respond at all to clomiphene citrate and are considered to be “clomiphene– resistant”. Aromatase inhibitors have been suggested as an alternative treatment to clomiphene as the discrepancy between ovulation and pregnancy rates with clomiphene citrate has been attributed to its anti-estrogenic action and estrogen receptor depletion. Objective: The aim of this study is to compare results of Metformin-letrozole with Metformin-clomiphene citrate in clomiphene resistance PCOS patients undergoing IUI.Materials and Methods: In this single blind randomized trial, ovarian cycles were studied in 100 clomiphene- resistant patients with PCOS. The inclusion criteria were patients who received 150mg clomiphene citrate daily for 3 cycles and failed to become pregnant. The patients were matched for their age, body mass index (BMI, and infertility period. They were randomly allocated to a metformin-letrozole group (n=50 and a metformin-clomiphene citrate group (n=50. Chemical and clinical pregnancies were assessed after IUI. Abortion rates were determined in both groups. Results: Regarding pregnancy rate, there was no significant difference between the two groups. One miscarriage (2% occurred in the metformin-clomiphene citrate group, whereas none was seen in the metformin-letrozole group. Conclusion: There is no significant difference in pregnancy rate between clomiphene citrate and letrozole groups although it has been 2% in the former and 5% in the latter.

  12. Conversion of ICSI cycles to IUI in poor responders to controlled ovarian hyperstimulation

    Directory of Open Access Journals (Sweden)

    Amal Shohieb

    2012-03-01

    Conclusion: As the pregnancy rates difference between both groups was not statistically significant the conversion to IUI could be considered a useful substitute to the oocyte retrieval procedure in the poor responder cases. However, to adopt this conclusion, further confirmation in other prospective studies with larger sample size is a must.

  13. Comparison of pregnancy rates in PCOS patients undergoing clomiphene citrate and IUI treatment with different leading follicular sizes.

    Science.gov (United States)

    Seckin, Berna; Pekcan, Meryem Kuru; Bostancı, Esra Isci; Inal, Hasan Ali; Cicek, Mahmut Nedim

    2016-04-01

    The objective of the study was to compare the pregnancy rates in PCOS patients undergoing clomiphene citrate (CC) and intrauterine insemination (IUI) treatment with different leading follicular sizes. A total of 358 infertile women with PCOS who underwent 563 clomiphene citrate and IUI treatment cycles were included in this prospective study. Treatment cycles were divided into three groups according to leading follicular size on the day of hCG administration: Group I: follicular size 17-18 mm (n = 177), Group II: 19-22 mm (n = 321), and Group III : >22 mm (n = 65). Pregnancy rates were evaluated. Treatment outcomes of the groups were further analyzed related to endometrial thickness measurement on the day of hCG. For this purpose, cycles were placed into three subgroups as follows: endometrial thickness 9 mm. There was no statistically significant difference in clinical pregnancy rate per cycle between the groups (8.5, 10, and 9.2 % for Group I, II, and III, respectively, p = 0.86). In further analyses related to endometrial thickness, no significant difference was also found in pregnancy rate among the groups. This results suggest that pregnancy rate is not related to leading follicle size on the day of hCG administration in PCOS patients treated with CC and IUI. In addition, pregnancy rate in women with different follicular sizes is not influenced by the endometrial thickness.

  14. Comparative study of intravenous urographic bolus (I.U.B.) and intravenous urographic infusion (I.U.I.) in dogs

    International Nuclear Information System (INIS)

    Thibaut L, Julio; Ditzel, G.; Vargas, L; Born, R; Deppe G, Rodolfo

    1996-01-01

    Two urographic methods were compared: the intravenous urographic bolus (i.u.b.) and the intravenous urographic infusion (i.u.i.). In both methods, two groups of seven healthy adult dogs of both sexes, weighing7.0 to 16.5 kg were used and were anaesthesized with 2% thiopentone sodium in doses of 20 mg/kg via cephalica. In the i.u.b., meglumine diatrizoate (Hypaque-M, 60%) was injected via saphena with a concentration of 282 mg of iodine per mi in doses of 564 mg of iodine per kg. In the i.u.i., meglumine diatrizoate was injected via saphena by drip infusion with a concentration of 200 mg of iodine per mi in doses of 500 mg of iodine per kg. Three series of two X-rays each were taken in ventrodorsal projection 1, 4 and 8 min and left lateral recumbency 30 sec after administering the contrast medium. The X-ray plates obtained were analyzed and compared intra and inter group considering the advance speed of the contrast medium, the radiographic density and outline, and kidney size. The advance speed of the contrast medium was higher in the i.u.i., reaching the kidney, ureter and bladder 1 min after administration in both projections; in ventrodorsal projections in the i.u.b. only the kidneys were reached while in the left lateral recumbency, the kidney and ureters were reached [es

  15. Role of rescue IVF-ET treatment in the management of high response in stimulated IUI cycles.

    Science.gov (United States)

    Olufowobi, O; Sharif, K; Papaioannou, S; Mohamed, H; Neelakantan, D; Afnan, M

    2005-02-01

    Rescue in-vitro fertilisation and embryo transfer (IVF-ET) has been used in high response gonadotrophin intrauterine insemination (IUI) cycles to minimise the risks of ovarian hyperstimulation and multiple gestation. Such unplanned IVF treatment increases the cost of treatment. But can this added cost and the risks associated with IVF be justified? We present our experience with this treatment using clinical pregnancy and live birth rates as the primary outcomes. Between 1998 to 2001, 40 women undergoing IUI cycles who over responded (>3 follicles measuring >15 mm in diameter on the planned day of hCG administration) to gonadotrophin were offered the choice of conversion to IVF-ET or cancel the cycle. 17/40 declined rescue IVF/ET and had their cycles cancelled. 23/40 converted to IVF/ET and underwent transvaginal oocyte retrieval. 21/23 had embryo transferred. The clinical pregnancy and live birth rates were 52% and 48%, respectively. Rescue IVF-ET offers excellent clinical pregnancy and live birth rates in high responders. However, affordability can be an obstacle in the utilization of this treatment option.

  16. The INeS study: prevention of multiple pregnancies: a randomised controlled trial comparing IUI COH versus IVF e SET versus MNC IVF in couples with unexplained or mild male subfertility.

    Science.gov (United States)

    Bensdorp, Alexandra J; Slappendel, Els; Koks, Carolien; Oosterhuis, Jur; Hoek, Annemieke; Hompes, Peter; Broekmans, Frank; Verhoeve, Harold; de Bruin, Jan Peter; van Weert, Janne Meije; Traas, Maaike; Maas, Jacques; Beckers, Nicole; Repping, Sjoerd; Mol, Ben W; van der Veen, Fulco; van Wely, Madelon

    2009-12-18

    Multiple pregnancies are high risk pregnancies with higher chances of maternal and neonatal mortality and morbidity. In the past decades the number of multiple pregnancies has increased. This trend is partly due to the fact that women start family planning at an increased age, but also due to the increased use of ART.Couples with unexplained or mild male subfertility generally receive intrauterine insemination IUI with controlled hormonal stimulation (IUI COH). The cumulative pregnancy rate is 40%, with a 10% multiple pregnancy rate.This study aims to reveal whether alternative treatments such as IVF elective Single Embryo Transfer (IVF e SET) or Modified Natural Cycle IVF (MNC IVF) can reduce the number of multiple pregnancy rates, but uphold similar pregnancy rates as IUI COH in couples with mild male or unexplained subfertility. Secondly, the aim is to perform a cost effective analyses and assess treatment preference of these couples. We plan a multicentre randomised controlled clinical trial in the Netherlands comparing six cycles of intra-uterine insemination with controlled ovarian hyperstimulation or six cycles of Modified Natural Cycle (MNC) IVF or three cycles with IVF-elective Single Embryo Transfer (eSET) plus cryo-cycles within a time frame of 12 months.Couples with unexplained subfertility or mild male subfertility and a poor prognosis for treatment independent pregnancy will be included. Women with anovulatory cycles, severe endometriosis, double sided tubal pathology or serious endocrine illness will be excluded.Our primary outcome is the birth of a healthy singleton. Secondary outcomes are multiple pregnancy, treatment costs, and patient experiences in each treatment arm. The analysis will be performed according tot the intention to treat principle. We will test for non-inferiority of the three arms with respect to live birth. As we accept a 12.5% loss in pregnancy rate in one of the two IVF arms to prevent multiple pregnancies, we need 200 couples

  17. A randomised controlled trial of intra-uterine insemination versus in vitro fertilisation in patients with idiopathic or mild male infertility.

    Science.gov (United States)

    Elzeiny, Hossam; Garrett, Claire; Toledo, Manuela; Stern, Kate; McBain, John; Baker, Hugh William Gordon

    2014-04-01

    The cause of infertility is unexplained or poorly explained in 30-40% of couples undergoing standard investigations, and treatment ranges from expectant management to IUI and IVF. The aim of this study was to compare the clinical pregnancy rates and costs of intra-uterine insemination (IUI) and in vitro fertilisation (IVF) in women where the same ovarian stimulation led to the development of two or three mature follicles. A randomised controlled clinical trial compared the efficacy of IUI and IVF in a tertiary fertility centre (ISRCTN28780587). Primary outcome measures were fetal heart positive pregnancy rate and cost per live birth. The selection criteria were age: females 18-42 years and males 18-60 years, infertility for one year or more, no IVF or IUI for 12 months prior to the trial, and no coital, tubal or ovulatory disorders, oligospermia, untreated endometriosis or contraindication for multiple pregnancy. All women (n = 102) had the same dose FSH stimulation protocol. Those who developed two or three preovulatory follicles were randomised 3:1 to IUI (n = 33) or IVF (n = 10). IUI or IVF was performed 36 h after hCG administration with single or double embryo transfer on day two. Clinical pregnancy rates (40% vs 12%, P = 0.04) and live birth rate (40% vs 6%, P = 0.01) were higher for IVF than IUI. The cost per live birth was AU$8735 for IVF compared with $42,487 for IUI. This study provides evidence that IVF is more successful and cost-effective than IUI using the same doses of FSH. Further confirmatory studies are required. © 2014 The Royal Australian and New Zealand College of Obstetricians and Gynaecologists.

  18. The INeS study: prevention of multiple pregnancies: a randomised controlled trial comparing IUI COH versus IVF e SET versus MNC IVF in couples with unexplained or mild male subfertility

    Directory of Open Access Journals (Sweden)

    Beckers Nicole

    2009-12-01

    Full Text Available Abstract Background Multiple pregnancies are high risk pregnancies with higher chances of maternal and neonatal mortality and morbidity. In the past decades the number of multiple pregnancies has increased. This trend is partly due to the fact that women start family planning at an increased age, but also due to the increased use of ART. Couples with unexplained or mild male subfertility generally receive intrauterine insemination IUI with controlled hormonal stimulation (IUI COH. The cumulative pregnancy rate is 40%, with a 10% multiple pregnancy rate. This study aims to reveal whether alternative treatments such as IVF elective Single Embryo Transfer (IVF e SET or Modified Natural Cycle IVF (MNC IVF can reduce the number of multiple pregnancy rates, but uphold similar pregnancy rates as IUI COH in couples with mild male or unexplained subfertility. Secondly, the aim is to perform a cost effective analyses and assess treatment preference of these couples. Methods/Design We plan a multicentre randomised controlled clinical trial in the Netherlands comparing six cycles of intra-uterine insemination with controlled ovarian hyperstimulation or six cycles of Modified Natural Cycle (MNC IVF or three cycles with IVF-elective Single Embryo Transfer (eSET plus cryo-cycles within a time frame of 12 months. Couples with unexplained subfertility or mild male subfertility and a poor prognosis for treatment independent pregnancy will be included. Women with anovulatory cycles, severe endometriosis, double sided tubal pathology or serious endocrine illness will be excluded. Our primary outcome is the birth of a healthy singleton. Secondary outcomes are multiple pregnancy, treatment costs, and patient experiences in each treatment arm. The analysis will be performed according tot the intention to treat principle. We will test for non-inferiority of the three arms with respect to live birth. As we accept a 12.5% loss in pregnancy rate in one of the two IVF arms

  19. Effective dose comparison between stitched and single FOV in CBCT protocols for complete dental arcade

    International Nuclear Information System (INIS)

    Soares, Maria Rosangela; Batista, Wilson Otto; Antonio, Patricia Lara de; Caldas, Linda V.E.; Maia, Ana F.

    2015-01-01

    Objective: The objective of this study was to assess and compare protocols with a single field of view and multiple stitched field of view with a similar clinical purpose by means of effective dose value. Materials and methods: Measurements of absorbed dose were performed with thermoluminescent dosemeters inserted in the position of organs/tissues of a female anthropomorphic phantom and from these values the effective dose was calculated, utilizing weighting factor tissue-ICRP 103 (2007). Results: The results obtained in this study for effective dose are within the range of 43.1 µSv and 111.5 µSv for equipment using protocols with single FOV and in the range of 44.5 µSv and 236.2 µSv for equipments that using protocols with stitched field of view. Conclusions: In terms of the value of effective dose, stitched FOV protocols do not have any advantage over the single field of view protocols. This results suggest the necessity for knowledge of the exposure parameters and effective dose values associated with each image protocol. - Highlights: • The study relies on the comparison of two protocols with similar goals of CBCT: stitched protocols and single protocols. • The stitched FOV protocol is more specific and it is good option when want imaging only of some dental units. • In relation the effective dose, single FOV protocols presents advantage over the stitched FOV protocols. • Know the exposure parameters and effective dose values associated with each image protocol is necessity for request the best CBCT tomographic image

  20. The effect of a positive reappraisal coping intervention and problem-solving skills training on coping strategies during waiting period of IUI treatment: An RCT

    Science.gov (United States)

    Ghasemi, Marzieh; Kordi, Masoumeh; Asgharipour, Negar; Esmaeili, Habibollah; Amirian, Maliheh

    2017-01-01

    Background: Waiting period of fertility treatment is stressful, therefore it is necessary to use effective coping strategies to cope with waiting period of intrauterine insemination (IUI) treatment. Objective: The aim of this study was comparing the effect of the positive reappraisal coping intervention (PRCI) with the problem-solving skills training (PSS) on the coping strategies of IUI waiting period, in infertile women referred to Milad Infertility Center in Mashhad. Materials and Methods: In this randomized clinical trial, 108 women were evaluated into three groups. The control group received the routine care, but in PRCI group, two training sessions were held and they were asked to review the coping thoughts cards and fill out the daily monitoring forms during the waiting period, and in PSS group problem-solving skill were taught during 3 sessions. The coping strategies were compared between three groups on the 10th day of IUI waiting period. Results: Results showed that the mean score for problem-focused were significantly different between the control (28.54±9.70), PSS (33.71±9.31), and PRCI (30.74±10.96) (p=0.025) groups. There were significant differences between the PSS group and others groups, and mean emotion-focused were significantly different between the control (32.09±11.65), PSS (29.20±9.88), and PRCI (28.74±7.96) (p=0.036) groups. There were significant differences between the PRCI and the control group (p=0.047). Conclusion: PSS was more effective to increase problem-focused coping strategies than PRCI, therefore it is recommended that this intervention should be used in infertility treatment centers. PMID:29404530

  1. The effect of a positive reappraisal coping intervention and problem-solving skills training on coping strategies during waiting period of IUI treatment: An RCT.

    Science.gov (United States)

    Ghasemi, Marzieh; Kordi, Masoumeh; Asgharipour, Negar; Esmaeili, Habibollah; Amirian, Maliheh

    2017-11-01

    Waiting period of fertility treatment is stressful, therefore it is necessary to use effective coping strategies to cope with waiting period of intrauterine insemination (IUI) treatment. The aim of this study was comparing the effect of the positive reappraisal coping intervention (PRCI) with the problem-solving skills training (PSS) on the coping strategies of IUI waiting period, in infertile women referred to Milad Infertility Center in Mashhad. In this randomized clinical trial, 108 women were evaluated into three groups. The control group received the routine care, but in PRCI group, two training sessions were held and they were asked to review the coping thoughts cards and fill out the daily monitoring forms during the waiting period, and in PSS group problem-solving skill were taught during 3 sessions. The coping strategies were compared between three groups on the 10 th day of IUI waiting period. Results showed that the mean score for problem-focused were significantly different between the control (28.54±9.70), PSS (33.71±9.31), and PRCI (30.74±10.96) (p=0.025) groups. There were significant differences between the PSS group and others groups, and mean emotion-focused were significantly different between the control (32.09±11.65), PSS (29.20±9.88), and PRCI (28.74±7.96) (p=0.036) groups. There were significant differences between the PRCI and the control group (p=0.047). PSS was more effective to increase problem-focused coping strategies than PRCI, therefore it is recommended that this intervention should be used in infertility treatment centers.

  2. The effect of a positive reappraisal coping intervention and problem-solving skills training on coping strategies during waiting period of IUI treatment: An RCT

    Directory of Open Access Journals (Sweden)

    Marzieh Ghasemi

    2017-11-01

    Full Text Available Background: Waiting period of fertility treatment is stressful, therefore it is necessary to use effective coping strategies to cope with waiting period of intrauterine insemination (IUI treatment. Objective: The aim of this study was comparing the effect of the positive reappraisal coping intervention (PRCI with the problem-solving skills training (PSS on the coping strategies of IUI waiting period, in infertile women referred to Milad Infertility Center in Mashhad. Materials and Methods: In this randomized clinical trial, 108 women were evaluated into three groups. The control group received the routine care, but in PRCI group, two training sessions were held and they were asked to review the coping thoughts cards and fill out the daily monitoring forms during the waiting period, and in PSS group problem-solving skill were taught during 3 sessions. The coping strategies were compared between three groups on the 10th day of IUI waiting period. Results: Results showed that the mean score for problem-focused were significantly different between the control (28.54±9.70, PSS (33.71±9.31, and PRCI (30.74±10.96 (p=0.025 groups. There were significant differences between the PSS group and others groups, and mean emotion-focused were significantly different between the control (32.09±11.65, PSS (29.20±9.88, and PRCI (28.74±7.96 (p=0.036 groups. There were significant differences between the PRCI and the control group (p=0.047. Conclusion: PSS was more effective to increase problem-focused coping strategies than PRCI, therefore it is recommended that this intervention should be used in infertility treatment centers.

  3. CPM Test-Retest Reliability: "Standard" vs "Single Test-Stimulus" Protocols.

    Science.gov (United States)

    Granovsky, Yelena; Miller-Barmak, Adi; Goldstein, Oren; Sprecher, Elliot; Yarnitsky, David

    2016-03-01

    Assessment of pain inhibitory mechanisms using conditioned pain modulation (CPM) is relevant clinically in prediction of pain and analgesic efficacy. Our objective is to provide necessary estimates of intersession CPM reliability, to enable transformation of the CPM paradigm into a clinical tool. Two cohorts of young healthy subjects (N = 65) participated in two dual-session studies. In Study I, a Bath-Thermode CPM protocol was used, with hot water immersion and contact heat as conditioning- and test-stimuli, respectively, in a classical parallel CPM design introducing test-stimulus first, and then the conditioning- and repeated test-stimuli in parallel. Study II consisted of two CPM protocols: 1) Two-Thermodes, one for each of the stimuli, in the same parallel design as above, and 2) single test-stimulus (STS) protocol with a single administration of a contact heat test-stimulus, partially overlapped in time by a remote shorter contact heat as conditioning stimulus. Test-retest reliability was assessed within 3-7 days. The STS-CPM had superior reliability intraclass correlation (ICC 2 ,: 1  = 0.59) over Bath-Thermode (ICC 2 ,: 1  = 0.34) or Two-Thermodes (ICC 2 ,: 1  = 0.21) protocols. The hand immersion conditioning pain had higher reliability than thermode pain (ICC 2 ,: 1  = 0.76 vs ICC 2 ,: 1  = 0.16). Conditioned test-stimulus pain scores were of good (ICC 2 ,: 1  = 0.62) or fair (ICC 2 ,: 1  = 0.43) reliability for the Bath-Thermode and the STS, respectively, but not for the Two-Thermodes protocol (ICC 2 ,: 1  = 0.20). The newly developed STS-CPM paradigm was more reliable than other CPM protocols tested here, and should be further investigated for its clinical relevance. It appears that large contact size of the conditioning-stimulus and use of single rather than dual test-stimulus pain contribute to augmentation of CPM reliability. © 2015 American Academy of Pain Medicine. All rights reserved. For permissions, please e

  4. Intrauterine Insemination: Fundamentals Revisited.

    Science.gov (United States)

    Allahbadia, Gautam N

    2017-12-01

    Intrauterine insemination (IUI) is an assisted conception technique that involves the deposition of a processed semen sample in the upper uterine cavity, overcoming natural barriers to sperm ascent in the female reproductive tract. It is a cost-effective, noninvasive first-line therapy for selected patients with functionally normal tubes, and infertility due to a cervical factor, anovulation, moderate male factor, unexplained factors, immunological factor, and ejaculatory disorders with clinical pregnancy rates per cycle ranging from 10 to 20%. It, however, has limited use in patients with endometriosis, severe male factor infertility, tubal factor infertility, and advanced maternal age ≥ 35 years. IUI may be performed with or without ovarian stimulation. Controlled ovarian stimulation, particularly with low-dose gonadotropins, with IUI offers significant benefit in terms of pregnancy outcomes compared with natural cycle or timed intercourse, while reducing associated COH complications such as multiple pregnancies and ovarian hyperstimulation syndrome. Important prognostic indicators of success with IUI include age of patient, duration of infertility, stimulation protocol, infertility etiology, number of cycles, timing of insemination, number of preovulatory follicles on the day of hCG, processed total motile sperm > 10 million, and insemination count > 1 × 106 with > 4% normal spermatozoa. Alternative insemination techniques, such as Fallopian tube sperm perfusion, intracervical insemination, and intratubal insemination, provide no additional benefit compared to IUI. A complete couple workup that includes patient history, physical examination, and clinical and laboratory investigations is mandatory to justify the choice in favor of IUI and guide alternative patient management, while individualizing the treatment protocol according to the patient characteristics with a strict cancelation policy to limit multi-follicular development may help optimize IUI

  5. Pelvic endometriosis with peritoneal fluid reduces pregnancy rates in women undergoing intrauterine insemination

    OpenAIRE

    Wu, Hong-Ming; Tzeng, Chii-Ruey; Chen, Chi-Hung; Chen, Pi-Hua

    2013-01-01

    Objective: This study investigated the occurrence of peritoneal fluid in women undergoing intrauterine insemination (IUI) and its correlation with the stage of pelvic endometriosis and its influence on pregnancy outcomes. Materials and Methods: A retrospective case–control design was used to recruit 272 infertile women with pelvic endometriosis. The treatment protocol consisted of controlled ovarian hyperstimulation with downregulation and gonadotropin for IUI treatment following ultrasoun...

  6. A single-aliquot OSL protocol using bracketing regenerative doses to accurately determine equivalent doses in quartz

    CERN Document Server

    Folz, E

    1999-01-01

    In most cases, sediments show inherent heterogeneity in their luminescence behaviours and bleaching histories, and identical aliquots are not available: single-aliquot determination of the equivalent dose (ED) is then the approach of choice and the advantages of using regenerative protocols are outlined. Experiments on five laboratory bleached and dosed quartz samples, following the protocol described by Murray and Roberts (1998. Measurement of the equivalent dose in quartz using a regenerative-dose single aliquot protocol. Radiation Measurements 27, 171-184), showed the hazards of using a single regeneration dose: a 10% variation in the regenerative dose yielded some equivalent dose estimates that differed from the expected value by more than 5%. A protocol is proposed that allows the use of different regenerative doses to bracket the estimated equivalent dose. The measured ED is found to be in excellent agreement with the known value when the main regeneration dose is within 10% of the true equivalent dose.

  7. A single-aliquot OSL protocol using bracketing regenerative doses to accurately determine equivalent doses in quartz

    International Nuclear Information System (INIS)

    Folz, Elise; Mercier, Norbert

    1999-01-01

    In most cases, sediments show inherent heterogeneity in their luminescence behaviours and bleaching histories, and identical aliquots are not available: single-aliquot determination of the equivalent dose (ED) is then the approach of choice and the advantages of using regenerative protocols are outlined. Experiments on five laboratory bleached and dosed quartz samples, following the protocol described by Murray and Roberts (1998. Measurement of the equivalent dose in quartz using a regenerative-dose single aliquot protocol. Radiation Measurements 27, 171-184), showed the hazards of using a single regeneration dose: a 10% variation in the regenerative dose yielded some equivalent dose estimates that differed from the expected value by more than 5%. A protocol is proposed that allows the use of different regenerative doses to bracket the estimated equivalent dose. The measured ED is found to be in excellent agreement with the known value when the main regeneration dose is within 10% of the true equivalent dose

  8. Security of a single-state semi-quantum key distribution protocol

    Science.gov (United States)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  9. A COMPARISON OF CLOMIPHENE CITRATE AND SEQUENTIAL CLOMIPHENE CITRATE PLUS HUMAN MENOPAUSAL GONADOTROPIN FOR USE IN CONJUNCTION WITH INTRAUTERINE INSEMINATION

    Directory of Open Access Journals (Sweden)

    B. H. Rashidi

    2005-06-01

    Full Text Available There are currently ‎many different protocols in use for controlled ovarian hyperstimulation (COH, but the optimal method has ‎not yet been determined. To compare the outcome of COH using ‎clomiphene citrate (CC versus CC plus human menopausal gonadotropin (hMG in conjunction with intrauterine insemination (IUI, we studied 117 infertile couples‎. IUI with CC was used in 92 cycles ‎(group A and IUI with CC plus hMG was used in 66 cycles (group B. ‎Data analysis demonstrated no significant difference between the two ‎groups with respect to patients’ age, duration and type of infertility, prior COH and endometrial thickness and pattern. Group A had a little ‎longer follicular phase length than group B. ‎Pregnancy rate for group A and B were 6.52% and 12.12%, respectively (P= 0.22. ‎Endometrial pattern and thickness had no impact on pregnancy rate. ‎There were no multiple gestation and obvious hyperstimulation syndrome. ‎For patients undergoing controlled ovarian hyperstimulation with IUI, ‎CC plus hMG protocol yields higher pregnancy rate than one using CC, although this ‎difference was not statistically significant because of limitation of number of ‎cycles.

  10. Performance of Differential-Phase-Shift Keying Protocol Applying 1310 nm Up-Conversion Single-Photon Detector

    International Nuclear Information System (INIS)

    Chen-Xu, Feng; Rong-Zhen, Jiao; Wen-Han, Zhang

    2008-01-01

    The performance of the differential-phase-shift keying (DPSK) protocol applying a 1310 nm up-conversion single-photon detector is analysed. The error rate and the communication rate as a function of distance for three quantum key distribution protocols, the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the DPSK, are presented. Then we compare the performance of these three protocols using the 1310nm up-conversion detector. We draw the conclusion that the DPSK protocol applying the detector has significant advantage over the other two protocols. Longer transmission distance and lower error rate can be achieved. (general)

  11. Measurement of the equivalent dose in quartz using a regenerative-dose single-aliquot protocol

    International Nuclear Information System (INIS)

    Murray, A.S.; Roberts, R.G.

    1998-01-01

    The principles behind a regenerative-dose single-aliquot protocol are outlined. It is shown for three laboratory-bleached Australian sedimentary quartz samples that the relative change in sensitivity of the optically stimulated luminescence (OSL) during a repeated measurement cycle (consisting of a dose followed by a 10 s preheat at a given temperature and then a 100 s exposure to blue/green light at 125 deg. C) is very similar to that of the 110 deg. C thermoluminescence (TL) peak measured during the preheat cycle. The absolute change in the TL sensitivity with preheat temperature is different for samples containing a natural or a regenerative dose. Furthermore, the absolute change in sensitivity in both the OSL and TL signals is non-linear with regeneration cycle, but the relative change in the OSL signal compared to the following 110 deg. C TL measurement is well approximated by a straight line. Both signals are thought to use the same luminescence centres, and so some common behaviour is not unexpected. A new regenerative-dose protocol is presented which makes use of this linear relationship to correct for sensitivity changes with regeneration cycle, and requires only one aliquot for the estimation of the equivalent dose (D e ). The protocol has been applied to quartz from nine Australian sites. To illustrate the value of the regenerative-dose single-aliquot approach, the apparent values of D e for 13 samples, containing doses of between 0.01 and 100 Gy, have been measured at various preheat temperatures of between 160 and 300 deg. C, using a single aliquot for each D e measurement. Excellent agreement is found between these single-aliquot estimates of D e and those obtained from additive-dose multiple-aliquot and single-aliquot protocols, over the entire dose range

  12. Single-Rooted Extraction Sockets: Classification and Treatment Protocol.

    Science.gov (United States)

    El Chaar, Edgar; Oshman, Sarah; Fallah Abed, Pooria

    2016-09-01

    Clinicians have many treatment techniques from which to choose when extracting a failing tooth and replacing it with an implant-supported restoration and when successful management of an extraction socket during the course of tooth replacement is necessary to achieve predictable and esthetic outcomes. This article presents a straightforward, yet thorough, classification for extraction sockets of single-rooted teeth and provides guidance to clinicians in the selection of appropriate and predictable treatment. The presented classification of extraction sockets for single-rooted teeth focuses on the topography of the extraction socket, while the protocol for treatment of each socket type factors in the shape of the remaining bone, the biotype, and the location of the socket whether it be in the mandible or maxilla. This system is based on the biologic foundations of wound healing and can help guide clinicians to successful treatment outcomes.

  13. Single-cell qPCR on dispersed primary pituitary cells -an optimized protocol

    Directory of Open Access Journals (Sweden)

    Haug Trude M

    2010-11-01

    Full Text Available Abstract Background The incidence of false positives is a potential problem in single-cell PCR experiments. This paper describes an optimized protocol for single-cell qPCR measurements in primary pituitary cell cultures following patch-clamp recordings. Two different cell harvesting methods were assessed using both the GH4 prolactin producing cell line from rat, and primary cell culture from fish pituitaries. Results Harvesting whole cells followed by cell lysis and qPCR performed satisfactory on the GH4 cell line. However, harvesting of whole cells from primary pituitary cultures regularly produced false positives, probably due to RNA leakage from cells ruptured during the dispersion of the pituitary cells. To reduce RNA contamination affecting the results, we optimized the conditions by harvesting only the cytosol through a patch pipette, subsequent to electrophysiological experiments. Two important factors proved crucial for reliable harvesting. First, silanizing the patch pipette glass prevented foreign extracellular RNA from attaching to charged residues on the glass surface. Second, substituting the commonly used perforating antibiotic amphotericin B with β-escin allowed efficient cytosol harvest without loosing the giga seal. Importantly, the two harvesting protocols revealed no difference in RNA isolation efficiency. Conclusion Depending on the cell type and preparation, validation of the harvesting technique is extremely important as contaminations may give false positives. Here we present an optimized protocol allowing secure harvesting of RNA from single cells in primary pituitary cell culture following perforated whole cell patch clamp experiments.

  14. Synthetic CT: Simulating low dose single and dual energy protocols from a dual energy scan

    International Nuclear Information System (INIS)

    Wang, Adam S.; Pelc, Norbert J.

    2011-01-01

    Purpose: The choice of CT protocol can greatly impact patient dose and image quality. Since acquiring multiple scans at different techniques on a given patient is undesirable, the ability to predict image quality changes starting from a high quality exam can be quite useful. While existing methods allow one to generate simulated images of lower exposure (mAs) from an acquired CT exam, the authors present and validate a new method called synthetic CT that can generate realistic images of a patient at arbitrary low dose protocols (kVp, mAs, and filtration) for both single and dual energy scans. Methods: The synthetic CT algorithm is derived by carefully ensuring that the expected signal and noise are accurate for the simulated protocol. The method relies on the observation that the material decomposition from a dual energy CT scan allows the transmission of an arbitrary spectrum to be predicted. It requires an initial dual energy scan of the patient to either synthesize raw projections of a single energy scan or synthesize the material decompositions of a dual energy scan. The initial dual energy scan contributes inherent noise to the synthesized projections that must be accounted for before adding more noise to simulate low dose protocols. Therefore, synthetic CT is subject to the constraint that the synthesized data have noise greater than the inherent noise. The authors experimentally validated the synthetic CT algorithm across a range of protocols using a dual energy scan of an acrylic phantom with solutions of different iodine concentrations. An initial 80/140 kVp dual energy scan of the phantom provided the material decomposition necessary to synthesize images at 100 kVp and at 120 kVp, across a range of mAs values. They compared these synthesized single energy scans of the phantom to actual scans at the same protocols. Furthermore, material decompositions of a 100/120 kVp dual energy scan are synthesized by adding correlated noise to the initial material

  15. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    Energy Technology Data Exchange (ETDEWEB)

    Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br

    2013-09-15

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.

  16. XPS Protocol for the Characterization of Pristine and Functionalized Single Wall Carbon Nanotubes

    Science.gov (United States)

    Sosa, E. D.; Allada, R.; Huffman, C. B.; Arepalli, S.

    2009-01-01

    Recent interest in developing new applications for carbon nanotubes (CNT) has fueled the need to use accurate macroscopic and nanoscopic techniques to characterize and understand their chemistry. X-ray photoelectron spectroscopy (XPS) has proved to be a useful analytical tool for nanoscale surface characterization of materials including carbon nanotubes. Recent nanotechnology research at NASA Johnson Space Center (NASA-JSC) helped to establish a characterization protocol for quality assessment for single wall carbon nanotubes (SWCNTs). Here, a review of some of the major factors of the XPS technique that can influence the quality of analytical data, suggestions for methods to maximize the quality of data obtained by XPS, and the development of a protocol for XPS characterization as a complementary technique for analyzing the purity and surface characteristics of SWCNTs is presented. The XPS protocol is then applied to a number of experiments including impurity analysis and the study of chemical modifications for SWCNTs.

  17. THE USE OF GnRH ANTAGONISTS IN OVARIAN STIMULATION FOR INTRAUTERINE INSEMINATION

    Directory of Open Access Journals (Sweden)

    Mete Işıkoğlu

    2013-12-01

    Full Text Available The first paper entitled intrauterine insemination (IUI was published in 1962. By time, several methods involving the technique and the ovulation induction schedules have evolved in order to improve the success rates. Although gonadotrophin releasing hormone antagonists (GnRHa is a crucial part of assisted reproductive treatments now, concerns also arouse regarding the need for the use of it in IUI cycles. These drugs may be considered in IUI programs basically in order to prevent premature LH surges and related cycle cancellations. Although administration of a GnRH antagonist almost completely abolishes premature luteinization, it does not substantially improve the pregnancy rate. The decision of using GnRH antagonists in IUI cycles should be based primarily on the local cost/benefit analysis of individual centers. It will be prudent to limit the involvement of the antagonists in ovulation induction protocols to: patients who frequently exhibit premature LH discharges and therefore either fail to complete treatment or result in unsuccessful outcome; initiated cycles intented for IUI but converted to ART; if it is not possible for logistic reasons (weekend to perform the insemination or for medical centers in which a gynecologist on call is not available and in order to decrease clinical task burden resulting from strict cycle monitoring such as serial transvaginal sonography and/or frequent urine tests.

  18. Should we give up hormone treatment in menopause?

    Directory of Open Access Journals (Sweden)

    Mehmet Aral Atalay

    2013-12-01

    Full Text Available The first paper entitled intrauterine insemination (IUI was published in 1962. By time, several methods involving the technique and the ovulation induction schedules have evolved in order to improve the success rates. Although gonadotrophin releasing hormone antagonists (GnRHa is a crucial part of assisted reproductive treatments now, concerns also arouse regarding the need for the use of it in IUI cycles. These drugs may be considered in IUI programs basically in order to prevent premature LH surges and related cycle cancellations. Although administration of a GnRH antagonist almost completely abolishes premature luteinization, it does not substantially improve the pregnancy rate. The decision of using GnRH antagonists in IUI cycles should be based primarily on the local cost/benefit analysis of individual centers. It will be prudent to limit the involvement of the antagonists in ovulation induction protocols to: patients who frequently exhibit premature LH discharges and therefore either fail to complete treatment or result in unsuccessful outcome; initiated cycles intented for IUI but converted to ART; if it is not possible for logistic reasons (weekend to perform the insemination or for medical centers in which a gynecologist on call is not available and in order to decrease clinical task burden resulting from strict cycle monitoring such as serial transvaginal sonography and/or frequent urine tests.

  19. The Effects of Total Motile Sperm Count on Spontaneous Pregnancy Rate and Pregnancy After IUI Treatment in Couples with Male Factor and Unexplained Infertility.

    Science.gov (United States)

    Hajder, Mithad; Hajder, Elmira; Husic, Amela

    2016-02-01

    Male infertility factor is defined if the total number of motile spermatozoa (TMSC) 3,10(6) / ejaculate and a spontaneous pregnancy, group (B) with TMSCl 3 x 10(6) / ejaculate and couples who have not achieved pregnancy. From a total of 98 pairs of men's and unexplained infertility, 42 of them (42.8%) achieved spontaneous pregnancy, while 56 (57.2%) pairs did not achieve spontaneous pregnancy. TMSC was significantly higher (42.4 ± 28.4 vs. 26.2 ± 24, p 20 x 10(6) / ejaculate (RR = 1.7, 95% CI: 1.56-1.82, 5 x 10(6) / ejaculate are indicated for treatment with IUI. TMSC can be used as the method of choice for diagnosis and treatment of male infertility.

  20. Taxonomy and Analysis of IP Micro-Mobility Protocols in Single and Simultaneous Movements Scenarios

    Directory of Open Access Journals (Sweden)

    G. De Marco

    2007-01-01

    Full Text Available The micro-mobility is an important aspect in mobile communications, where the applications are anywhere and used anytime. One of the problems of micro-mobility is the hand-off latency. In this paper, we analyse two solutions for IP micro-mobility by means of a general taxonomy. The first one is based on the Stream Control Transmission Protocol (SCTP, which allows the dynamic address configuration of an association. The second one is based on the Session Initiation Protocol (SIP, which is the most popular protocol for multimedia communications over IP networks. We show that for the SCTP solution, there is room for further optimisations of the hand-off latency by adding slight changes to the protocol. However, as full end-to-end solution, SCTP is not able to handle simultaneous movement of hosts, whose probability in general cannot be neglected. On the other hand, the SIP can handle both single and simultaneous movements cases, although the hand-off latency can increase with respect to the SCTP solution. We show that for a correct and fast hand-off, the SIP server should be statefull.

  1. Pelvic endometriosis with peritoneal fluid reduces pregnancy rates in women undergoing intrauterine insemination.

    Science.gov (United States)

    Wu, Hong-Ming; Tzeng, Chii-Ruey; Chen, Chi-Hung; Chen, Pi-Hua

    2013-12-01

    This study investigated the occurrence of peritoneal fluid in women undergoing intrauterine insemination (IUI) and its correlation with the stage of pelvic endometriosis and its influence on pregnancy outcomes. A retrospective case-control design was used to recruit 272 infertile women with pelvic endometriosis. The treatment protocol consisted of controlled ovarian hyperstimulation with downregulation and gonadotropin for IUI treatment following ultrasound and laparoscopic intervention. The amount and color of the peritoneal fluid were determined during laparoscopy. The mean amount of peritoneal fluid with pelvic endometriosis that was detected using transvaginal ultrasound was ~ 15.1 mL. Women whose cycles contained more peritoneal fluid had significantly lower pregnancy rates (17.2% and 31.3%, respectively). The total clinical pregnancy rate was not significantly different between the two groups with reddish and yellowish peritoneal fluid who had pelvic endometriosis. Pelvic endometriosis and peritoneal fluid, detected through vaginal ultrasound, have negative effects on the pregnancy outcome of IUI treatment. Copyright © 2013. Published by Elsevier B.V.

  2. Developing a single-aliquot protocol for measuring equivalent dose in biogenic carbonates

    International Nuclear Information System (INIS)

    Stirling, R.J.; Duller, G.A.T.; Roberts, H.M.

    2012-01-01

    Exploiting biogenic carbonates as thermoluminescence dosimeters requires an understanding of trap kinetics and an appropriate sequence with which to measure equivalent dose. The trap kinetics of two high temperature peaks (peaks II and III) from calcitic snail opercula have been investigated resulting in the calculation of lifetimes of 7.4 × 10 7 and 1.4 × 10 11 years for the two peaks respectively. Two measurement sequences, based upon changes in the application and measurement of a test dose, have been applied to peaks II and III, and though both methods were equally successful in dose recovery and production of a dose response curve some differences were observed. Primarily, the use of method 1 lead to dose dependant sensitivity change implying competition effects occurring during irradiation; method 2 did not experience this phenomenon. As a consequence method 2 was chosen as the most appropriate protocol for single-aliquot dating of this material. When assessing the TL behaviour of the two peaks, peak II performed poorly in dose recovery experiments recovering a dose 60–100% larger than that applied. Disproportionate growth of peak II in response to a beta dose applied prior to measurement, compared to growth following regeneration doses indicated that peak II was not suitable for use in single-aliquot protocols. However, dose recovery results for peak III were all within errors of unity of the given dose, and peak III was therefore chosen as the most appropriate peak for TL dosimetry in these single-aliquot procedures. The lifetime of charge in peak III is sufficient to date over many millions of years, and furthermore using the chosen method 2 the dose response curve has a D 0 of 3,250 ± 163 Gy allowing dating to over 3 million years.

  3. FACTORS AFFECTING THE SUCCESS OF INTRAUTERINE INSEMINATION- A CASE COMPARATIVE STUDY IN A TERTIARY HOSPITAL

    Directory of Open Access Journals (Sweden)

    Priyasree Jayasimhan

    2016-12-01

    Full Text Available BACKGROUND IUI is one of the simple techniques of assisted reproductive technique for treating infertility by artificial insemination. It has the advantage of positioning good quality sperm with increased count prepared by special semen washing technique into the uterine cavity, so that factors like decreased sperm count, poor sperm motility, impenetrable or absent cervical mucus or antisperm antibodies can be overcome. Sperm preparation method includes wash and swim-up technique using Percoll gradient. IUI is done by simple method and does not require the elaborate setup, investment and personnel like the other procedures of ART. The aims and objectives- 1. Factors associated with effectiveness of IUI among couples with primary infertility. 2. Factors studied include- Age of female partner, duration of infertility, menstrual regularity, menstrual flow, ovarian stimulation protocol, timing of IUI, endometrial thickness, number of cycles of IUI, luteal support, semen analysis findings. MATERIALS AND METHODS This is a case comparative study conducted in a tertiary hospital during three year period in which the forty women who conceived were considered as “study group” and another forty non-conceived women selected at random were taken as “control group.” RESULTS Factors like age of female showed statistical significance- when the age of female increased from 20-24 years to 30 years and above, the rate of conception reduced from 50% to 9%. Other factors like menstrual regularity, menstrual flow timing of IUI and number of cycles of IUI yielded no significant association with conception rates. Regarding the mode of ovarian induction, 90% of conceived group was given controlled superovulation using clomiphene citrate and gonadotrophins and 39% had ovulation triggered by HCG, which were statistically significant. In the conceived group, the mean endometrial thickness was 9.3 mm contrary to 7.8 mm in the non-conceived group. Minimum duration of

  4. Construction of a single atom trap for quantum information protocols

    Science.gov (United States)

    Shea, Margaret E.; Baker, Paul M.; Gauthier, Daniel J.; Duke Physics Department Team

    2016-05-01

    The field of quantum information science addresses outstanding problems such as achieving fundamentally secure communication and solving computationally hard problems. Great progress has been made in the field, particularly using photons coupled to ions and super conducting qubits. Neutral atoms are also interesting for these applications and though the technology for control of neutrals lags behind that of trapped ions, they offer some key advantages: primarily coupling to optical frequencies closer to the telecom band than trapped ions or superconducting qubits. Here we report progress on constructing a single atom trap for 87 Rb. This system is a promising platform for studying the technical problems facing neutral atom quantum computing. For example, most protocols destroy the trap when reading out the neutral atom's state; we will investigate an alternative non-destructive state detection scheme. We detail the experimental systems involved and the challenges addressed in trapping a single atom. All of our hardware components are off the shelf and relatively inexpensive. Unlike many other systems, we place a high numerical aperture lens inside our vacuum system to increase photon collection efficiency. We gratefully acknowledge the financial support of the ARO through Grant # W911NF1520047.

  5. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  6. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  7. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  8. Investigations of the post-IR IRSL protocol applied to single K-feldspar grains from fluvial sediment samples

    International Nuclear Information System (INIS)

    Nian, Xiaomei; Bailey, Richard M.; Zhou, Liping

    2012-01-01

    The post-IR IRSL protocol with single K-feldspar grains was applied to three samples taken from a fluvial sedimentary sequence at the archaeological site of the Dali Man, Shaanxi Province, China. K-feldspar coarse grains were extracted for measurement. Approximately 30–40% of the grains were sufficiently bright to measure, and after application of rejection criteria based on signal strength, recuperation, recycling ratio and saturation dose, ∼10–15% of the grains were used for D e calculation. The relationship of signal decay rate and form of D e (t) with the recovery dose were investigated. The dose recovery ratios of the samples after initial bleaching with the four different light sources were within uncertainties of unity. No anomalous fading was observed. The over-dispersion of the recovered dose and D e values were similar, suggesting neither incomplete resetting of the post-IR IRSL signals nor spatially heterogeneous dose rates significantly affected the natural dose estimates. The values of D e obtained with the single K-feldspar grain post-IR IRSL protocol were in the range ∼400–490 Gy. Combining all of the measured single-grain signals for each of the individual samples (into a ‘synthetic single aliquot’) increased the D e estimates to the range ∼700–900 Gy, suggesting that the grains screened-out by the rejection criteria may have the potential to cause palaeodose over-estimation, although this finding requires a more extensive investigation. Thermally transferred signals were found in the single K-feldspar grains post-IR IRSL protocol, and the proportion of thermally transferred signal to test-dose OSL signal (stimulation at 290 °C) from the natural dose was higher than from regenerative doses, and the proportion was grain- and dose-dependent. As such, TT-post-IR IRSL signals at 290 °C have the potential to cause dose underestimation, although this may be reduced by using larger test-dose irradiations. Our study demonstrates

  9. Effect of single family rooms for preterm infants on neurodevelopment: study protocol for a systematic review.

    Science.gov (United States)

    van Veenendaal, Nicole R; van der Schoor, Sophie R D; Limpens, Jacqueline; van Kempen, Anne A M W; van Goudoever, Johannes B

    2017-08-04

    Preterm infants are at an increased risk for neurodevelopmental delay. They have to endure many stressors in early life, including parent-infant separation, noise and painful procedures during hospitalisation in the highly technological environment of the modern neonatal ward. Currently, a shift is being noticed in the architectural design of neonatal wards towards single family rooms instead of the common open bay units. The influence of the hospital environment on health and specifically neurodevelopment in this vulnerable patient population remains under discussion. To assess the effect of single family rooms during hospitalisation primarily on neurodevelopment in preterm infants. Secondary outcome measures will be neonatal (ie, breastfeeding rates, sepsis, growth during hospital stay, length of hospital stay) and parental (ie, parental stress, satisfaction, participation, presence and self-efficacy). The PRISMA-P 2015 (Preferred Reporting Items for Systematic reviews and Meta-Analyses for Protocols 2015) 17 items checklist was used for the generation of the protocol for this review. The following PICO was formulated: Population: preterm infants with need of hospitalisation in the neonatal ward; Intervention: single family rooms; Comparison: standard neonatal care in open bay units; Outcome: neurodevelopmental outcome of infants from 9 months onwards. If at least two studies, with low or moderate risk of bias, suitable for inclusion are found a meta-analysis will be performed. If quantitative synthesis is not appropriate the data will be presented descriptively. This will be the first review, systematically assessing the effect of single family rooms on neurodevelopmental outcome in preterm infants. Clinical practice could possibly be optimised to ameliorate neurodevelopment in this vulnerable patient population based on these insights. This systematic review will be published in an international peer-reviewed journal. We registered this systematic review

  10. The reliability of a single protocol to determine endothelial, microvascular and autonomic functions in adolescents.

    Science.gov (United States)

    Bond, Bert; Williams, Craig A; Barker, Alan R

    2017-11-01

    Impairments in macrovascular, microvascular and autonomic function are present in asymptomatic youths with clustered cardiovascular disease risk factors. This study determines the within-day reliability and between-day reliability of a single protocol to non-invasively assess these outcomes in adolescents. Forty 12- to 15-year-old adolescents (20 boys) visited the laboratory in a fasted state on two occasions, approximately 1 week apart. One hour after a standardized cereal breakfast, macrovascular function was determined via flow-mediated dilation (FMD). Heart rate variability (root mean square of successive R-R intervals; RMSSD) was determined from the ECG-gated ultrasound images acquired during the FMD protocol prior to cuff occlusion. Microvascular function was simultaneously quantified as the peak (PRH) and total (TRH) hyperaemic response to occlusion in the cutaneous circulation of the forearm via laser Doppler imaging. To address within-day reliability, a subset of twenty adolescents (10 boys) repeated these measures 90 min afterwards on one occasion. The within-day typical error and between-day typical error expressed as a coefficient of variation of these outcomes are as follows: ratio-scaled FMD, 5·1% and 10·6%; allometrically scaled FMD, 4·4% and 9·4%; PRH, 11% and 13·3%; TRH, 29·9% and 23·1%; and RMSSD, 17·6% and 17·6%. The within- and between-day test-retest correlation coefficients for these outcomes were all significant (r > 0·54 for all). Macrovascular, microvascular and autonomic functions can be simultaneously and non-invasively determined in adolescents using a single protocol with an appropriate degree of reproducibility. Determining these outcomes may provide greater understanding of the progression of cardiovascular disease and aid early intervention. © 2016 Scandinavian Society of Clinical Physiology and Nuclear Medicine. Published by John Wiley & Sons Ltd.

  11. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  12. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  13. Effect of Gonadotropin Types and Indications on Homologous Intrauterine Insemination Success: A Study from 1251 Cycles and a Review of the Literature

    Directory of Open Access Journals (Sweden)

    Rosalie Cabry-Goubet

    2017-01-01

    Full Text Available Objective. To evaluate the IUI success factors relative to controlled ovarian stimulation (COS and infertility type, this retrospective cohort study included 1251 couples undergoing homologous IUI. Results. We achieved 13% clinical pregnancies and 11% live births. COS and infertility type do not have significant effect on IUI clinical outcomes with unstable intervention of various couples’ parameters, including the female age, the IUI attempt rank, and the sperm quality. Conclusion. Further, the COS used seemed a weak predictor for IUI success; therefore, the indications need more discussion, especially in unexplained infertility cases involving various factors. Indeed, the fourth IUI attempt, the female age over 40 years, and the total motile sperm count <5 × 106 were critical in decreasing the positive clinical outcomes of IUI. Those parameter cut-offs necessitate a larger analysis to give infertile couples more chances through IUI before carrying out other ART techniques.

  14. Total fertilization failure and idiopathic subfertility

    Directory of Open Access Journals (Sweden)

    Goverde Angelique J

    2009-01-01

    Full Text Available Abstract Background To gain more insight in whether failure of intrauterine insemination (IUI treatment in patients with idiopathic subfertility could be related to diminished fertilization, the aim of this study is to compare the fertilization of an initial IVF procedure after six cycles of IUI and the fertilization of an initial IVF procedure without preceding IUI cycles in couples with idiopathic subfertility. Methods We performed a complimentary analysis of a randomized controlled trial, in which the number of total fertilization failure (TFF in the first IVF procedure after unsuccessful IUI was compared to those of IVF without preceding IUI in patients with idiopathic subfertility. These patients participated in a previous study that assessed the cost effectiveness of IUI versus IVF in idiopathic subfertility and were randomized to either IUI or IVF treatment. Results 45 patients underwent IVF after 6 cycles of unsuccessful IUI and 58 patients underwent IVF immediately without preceding IUI. In 7 patients the IVF treatment was cancelled before ovum pick. In the IVF after unsuccessful IUI group TFF was seen in 2 of the 39 patients (5% versus 7 of the 56 patients (13% in the immediate IVF group. After correction for confounding factors the TFF rate was not significantly different between the two groups (p = 0.08, OR 7.4; 95% CI: 0.5–14.9. Conclusion Our data showed that TFF and the fertilization rate in the first IVF treatment were not significantly different between couples with idiopathic subfertility undergoing IVF after failure of IUI versus those couples undergoing IVF immediately without prior IUI treatment. Apparently, impaired fertilization does not play a significant role in the success rate of IUI in patients with idiopathic subfertility.

  15. Comprehensive low-dose imaging of carotid and coronary arteries with a single-injection dual-source CT angiography protocol.

    Science.gov (United States)

    Tognolini, A; Arellano, C S; Marfori, W; Heidari, G; Sayre, J W; Krishnam, M S; Ruehm, S G

    2014-03-01

    To assess the feasibility of a fast single-bolus combined carotid and coronary computed tomography angiography (CTA) protocol in asymptomatic patients. Thirty-three consecutive patients (18 women and 15 men) with a median age of 61 ± 14 years old (range 37-87 years) with known or suspected atherosclerotic disease were enrolled in this prospective study. A single breath-hold, single biphasic injection protocol (50 ml at 3 ml/s, 50 ml at 5 ml/s, 50 ml saline flush at 5 ml/s) was used for combined CTA imaging of the supra-aortic (SAA) and coronary arteries (CA) on a 64-slice dual-source CT (DSCT) machine. Helical CTA acquisition of the SAA was followed by prospective electrocardiography (ECG)-triggered coronary CTA. Subjective (four-point scale) image quality and objective signal-to-noise (SNR) and contrast-to-noise (CNR) measurements were performed. Vascular disease was graded on a four-point scale (grade 1: absent; grade 2: mild, grade 3: moderate; grade 4: severe). The radiation dose was recorded for each patient. The average enhancement and subjective quality score of SAA and CA segments were 396 HU/358 HU and 1.2 ± 0.3/1.72 ± 0.4, respectively. The SNR was 27.1 ± 1.7 in the SAA and 21.6 ± 1.6 in the CA (p grade 2 and 1/33 (3%) had grade 3 disease. CA findings were as follows: 25/33 (76%) showed no disease and 6/33 (18%) patients had grade 2 and 2/33 (6%) had grade 3 disease. Five patients had disease in both districts. The average radiation dose for the combined CTA angiogram was 4.3 ± 0.6 mSv. A fast, low-dose combined DSCT angiography protocol appears technically feasible for imaging carotid and coronary atherosclerotic disease. Copyright © 2013 The Royal College of Radiologists. Published by Elsevier Ltd. All rights reserved.

  16. Compositional mining of multiple object API protocols through state abstraction.

    Science.gov (United States)

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments.

  17. Effects of a single-session assertiveness music therapy role playing protocol for psychiatric inpatients.

    Science.gov (United States)

    Silverman, Michael J

    2011-01-01

    The purpose of this study was to implement and measure the effectiveness of a single-session assertiveness music therapy role playing protocol for psychiatric inpatients. Participants (N=133) were randomly assigned by group to one of three conditions: (a) Assertiveness Music Therapy, (b) No Music Assertiveness, or (c) Music No Assertiveness. Participants in both assertiveness conditions role played a number of different commonly occurring scenarios at an inpatient psychiatric facility and in the community. There were no significant between-group differences in posttest quality of life, locus of control, or other subscales. However, participants in both assertiveness conditions tended to have slightly higher internal locus of control and overall quality of life scores than participants in the music no assertiveness condition. Additionally, the assertiveness music therapy condition had higher attendance rates than the other conditions. A higher percentage of participants from both the assertiveness music therapy and music no assertiveness conditions indicated they thought their session was the most helpful/therapeutic group therapy session in which they had participated; this was not the case for the assertiveness no music condition. Future research is warranted to measure the effects of protocols that can help psychiatric patients generalize skills learned in treatment.

  18. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...

  19. Near-optimality of special periodic protocols for fluid models of single server switched networks with switchover times

    Science.gov (United States)

    Matveev, A. S.; Ishchenko, R.

    2017-11-01

    We consider a generic deterministic time-invariant fluid model of a single server switched network, which consists of finitely many infinite size buffers (queues) and receives constant rate inflows of jobs from the outside. Any flow undergoes a multi-phase service, entering a specific buffer after every phase, and ultimately leaves the network; the route of the flow over the buffers is pre-specified, and flows may merge inside the network. They share a common source of service, which can serve at most one buffer at a time and has to switch among buffers from time to time; any switch consumes a nonzero switchover period. With respect to the long-run maximal scaled wip (work in progress) performance metric, near-optimality of periodic scheduling and service protocols is established: the deepest optimum (that is over all feasible processes in the network, irrespective of the initial state) is furnished by such a protocol up to as small error as desired. Moreover, this can be achieved with a special periodic protocol introduced in the paper. It is also shown that the exhaustive policy is optimal for any buffer whose service at the maximal rate does not cause growth of the scaled wip.

  20. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  1. Image quality comparison between single energy and dual energy CT protocols for hepatic imaging

    International Nuclear Information System (INIS)

    Yao, Yuan; Pelc, Norbert J.; Ng, Joshua M.; Megibow, Alec J.

    2016-01-01

    Purpose: Multi-detector computed tomography (MDCT) enables volumetric scans in a single breath hold and is clinically useful for hepatic imaging. For simple tasks, conventional single energy (SE) computed tomography (CT) images acquired at the optimal tube potential are known to have better quality than dual energy (DE) blended images. However, liver imaging is complex and often requires imaging of both structures containing iodinated contrast media, where atomic number differences are the primary contrast mechanism, and other structures, where density differences are the primary contrast mechanism. Hence it is conceivable that the broad spectrum used in a dual energy acquisition may be an advantage. In this work we are interested in comparing these two imaging strategies at equal-dose and more complex settings. Methods: We developed numerical anthropomorphic phantoms to mimic realistic clinical CT scans for medium size and large size patients. MDCT images based on the defined phantoms were simulated using various SE and DE protocols at pre- and post-contrast stages. For SE CT, images from 60 kVp through 140 with 10 kVp steps were considered; for DE CT, both 80/140 and 100/140 kVp scans were simulated and linearly blended at the optimal weights. To make a fair comparison, the mAs of each scan was adjusted to match the reference radiation dose (120 kVp, 200 mAs for medium size patients and 140 kVp, 400 mAs for large size patients). Contrast-to-noise ratio (CNR) of liver against other soft tissues was used to evaluate and compare the SE and DE protocols, and multiple pre- and post-contrasted liver-tissue pairs were used to define a composite CNR. To help validate the simulation results, we conducted a small clinical study. Eighty-five 120 kVp images and 81 blended 80/140 kVp images were collected and compared through both quantitative image quality analysis and an observer study. Results: In the simulation study, we found that the CNR of pre-contrast SE image mostly

  2. Study Protocol: Phase III single-blinded fast-track pragmatic randomised controlled trial of a complex intervention for breathlessness in advanced disease

    Directory of Open Access Journals (Sweden)

    Brafman-Kennedy Barbara

    2011-05-01

    Full Text Available Abstract Background Breathlessness in advanced disease causes significant distress to patients and carers and presents management challenges to health care professionals. The Breathlessness Intervention Service (BIS seeks to improve the care of breathless patients with advanced disease (regardless of cause through the use of evidence-based practice and working with other healthcare providers. BIS delivers a complex intervention (of non-pharmacological and pharmacological treatments via a multi-professional team. BIS is being continuously developed and its impact evaluated using the MRC's framework for complex interventions (PreClinical, Phase I and Phase II completed. This paper presents the protocol for Phase III. Methods/Design Phase III comprises a pragmatic, fast-track, single-blind randomised controlled trial of BIS versus standard care. Due to differing disease trajectories, the service uses two broad service models: one for patients with malignant disease (intervention delivered over two weeks and one for patients with non-malignant disease (intervention delivered over four weeks. The Phase III trial therefore consists of two sub-protocols: one for patients with malignant conditions (four week protocol and one for patients with non-malignant conditions (eight week protocol. Mixed method interviews are conducted with patients and their lay carers at three to five measurement points depending on randomisation and sub-protocol. Qualitative interviews are conducted with referring and non-referring health care professionals (malignant disease protocol only. The primary outcome measure is 'patient distress due to breathlessness' measured on a numerical rating scale (0-10. The trial includes economic evaluation. Analysis will be on an intention to treat basis. Discussion This is the first evaluation of a breathlessness intervention for advanced disease to have followed the MRC framework and one of the first palliative care trials to use fast

  3. Semi-quantum Dialogue Based on Single Photons

    Science.gov (United States)

    Ye, Tian-Yu; Ye, Chong-Qiang

    2018-02-01

    In this paper, we propose two semi-quantum dialogue (SQD) protocols by using single photons as the quantum carriers, where one requires the classical party to possess the measurement capability and the other does not have this requirement. The security toward active attacks from an outside Eve in the first SQD protocol is guaranteed by the complete robustness of present semi-quantum key distribution (SQKD) protocols, the classical one-time pad encryption, the classical party's randomization operation and the decoy photon technology. The information leakage problem of the first SQD protocol is overcome by the classical party' classical basis measurements on the single photons carrying messages which makes him share their initial states with the quantum party. The security toward active attacks from Eve in the second SQD protocol is guaranteed by the classical party's randomization operation, the complete robustness of present SQKD protocol and the classical one-time pad encryption. The information leakage problem of the second SQD protocol is overcome by the quantum party' classical basis measurements on each two adjacent single photons carrying messages which makes her share their initial states with the classical party. Compared with the traditional information leakage resistant QD protocols, the advantage of the proposed SQD protocols lies in that they only require one party to have quantum capabilities. Compared with the existing SQD protocol, the advantage of the proposed SQD protocols lies in that they only employ single photons rather than two-photon entangled states as the quantum carriers. The proposed SQD protocols can be implemented with present quantum technologies.

  4. Comprehensive low-dose imaging of carotid and coronary arteries with a single-injection dual-source CT angiography protocol

    International Nuclear Information System (INIS)

    Tognolini, A.; Arellano, C.S.; Marfori, W.; Heidari, G.; Sayre, J.W.; Krishnam, M.S.; Ruehm, S.G.

    2014-01-01

    Aim: To assess the feasibility of a fast single-bolus combined carotid and coronary computed tomography angiography (CTA) protocol in asymptomatic patients. Materials and methods: Thirty-three consecutive patients (18 women and 15 men) with a median age of 61 ± 14 years old (range 37–87 years) with known or suspected atherosclerotic disease were enrolled in this prospective study. A single breath-hold, single biphasic injection protocol (50 ml at 3 ml/s, 50 ml at 5 ml/s, 50 ml saline flush at 5 ml/s) was used for combined CTA imaging of the supra-aortic (SAA) and coronary arteries (CA) on a 64-slice dual-source CT (DSCT) machine. Helical CTA acquisition of the SAA was followed by prospective electrocardiography (ECG)-triggered coronary CTA. Subjective (four-point scale) image quality and objective signal-to-noise (SNR) and contrast-to-noise (CNR) measurements were performed. Vascular disease was graded on a four-point scale (grade 1: absent; grade 2: mild, grade 3: moderate; grade 4: severe). The radiation dose was recorded for each patient. Results: The average enhancement and subjective quality score of SAA and CA segments were 396 HU/358 HU and 1.2 ± 0.3/1.72 ± 0.4, respectively. The SNR was 27.1 ± 1.7 in the SAA and 21.6 ± 1.6 in the CA (p < 0.0001). The CNR was 18.1 ± 1.2 and 15.9 ± 1.8, respectively (p = 0.4). Four percent of SAA and 14% of CA segments (mostly due to peri-venous streak artefacts and small calibre, respectively) produced non-diagnostic images. SAA findings were as follows: 26/33 (79%) patients showed no disease and 6/33 (18%) had grade 2 and 1/33 (3%) had grade 3 disease. CA findings were as follows: 25/33 (76%) showed no disease and 6/33 (18%) patients had grade 2 and 2/33 (6%) had grade 3 disease. Five patients had disease in both districts. The average radiation dose for the combined CTA angiogram was 4.3 ± 0.6 mSv. Conclusion: A fast, low-dose combined DSCT angiography protocol appears technically feasible for imaging carotid and

  5. Implementation of a split-bolus single-pass CT protocol at a UK major trauma centre to reduce excess radiation dose in trauma pan-CT

    International Nuclear Information System (INIS)

    Leung, V.; Sastry, A.; Woo, T.D.; Jones, H.R.

    2015-01-01

    Aim: To quantify the dose reduction and ensure that the use of a split-bolus protocol provided sufficient vascular enhancement. Materials and methods: Between 1 January 2014 and 31 May 2014, both split bolus and traditional two-phase scans were performed on a single CT scanner (SOMATOM Definition AS+, Siemens Healthcare) using a two-pump injector (Medrad Stellant). Both protocols used Siemens' proprietary tube current and tube voltage modulation techniques (CARE dose and CARE kV). The protocols were compared retrospectively to assess the dose–length product (DLP), aortic radiodensity at the level of the coeliac axis and radiodensity of the portal vein. Results: There were 151 trauma CT examinations during this period. Seventy-eight used the split-bolus protocol. Seventy-one had traditional two-phase imaging. One patient was excluded as they were under the age of 18 years. The radiodensity measurements for the portal vein were significantly higher (p<0.001) in the split-bolus protocol. The mean aortic enhancement in both protocols exceeded 250 HU, although the traditional two-phase protocol gave greater arterial enhancement (p<0.001) than the split-bolus protocol. The split-bolus protocol had a significantly lower (p<0.001) DLP with 43.5% reduction in the mean DLP compared to the traditional protocol. Conclusion: Split-bolus CT imaging offers significant dose reduction for this relatively young population while retaining both arterial and venous enhancement. -- Highlights: •We implemented a split bolus pan-CT protocol for trauma CT. •We compared the radiation dose and vascular enhancement of the split bolus protocol to a traditional two phase protocol. •The split bolus protocol had a 43.5% reduction in mean DLP

  6. Using the OSL single-aliquot regenerative-dose protocol with quartz extracted from building materials in retrospective dosimetry

    DEFF Research Database (Denmark)

    Bøtter-Jensen, L.; Solongo, S.; Murray, A.S.

    2000-01-01

    We report on the application of the single-aliquot regenerative-dose (SAR) protocol to the optically stimulated luminescence signal from quartz extracted from fired bricks acid unfired mortar in retrospective dosimetry. The samples came from a radioactive materials storage facility, with ambient...... dose rates of about 0.1 mGy/h. A detailed dose-depth profile was analysed from one brick, and compared with dose records from area TL dosemeters. Small-aliquot dose-distributions were analysed from the mortar samples; one associated with the exposed brick, and one from a remote site exposed only...

  7. Highly multiplexed targeted DNA sequencing from single nuclei.

    Science.gov (United States)

    Leung, Marco L; Wang, Yong; Kim, Charissa; Gao, Ruli; Jiang, Jerry; Sei, Emi; Navin, Nicholas E

    2016-02-01

    Single-cell DNA sequencing methods are challenged by poor physical coverage, high technical error rates and low throughput. To address these issues, we developed a single-cell DNA sequencing protocol that combines flow-sorting of single nuclei, time-limited multiple-displacement amplification (MDA), low-input library preparation, DNA barcoding, targeted capture and next-generation sequencing (NGS). This approach represents a major improvement over our previous single nucleus sequencing (SNS) Nature Protocols paper in terms of generating higher-coverage data (>90%), thereby enabling the detection of genome-wide variants in single mammalian cells at base-pair resolution. Furthermore, by pooling 48-96 single-cell libraries together for targeted capture, this approach can be used to sequence many single-cell libraries in parallel in a single reaction. This protocol greatly reduces the cost of single-cell DNA sequencing, and it can be completed in 5-6 d by advanced users. This single-cell DNA sequencing protocol has broad applications for studying rare cells and complex populations in diverse fields of biological research and medicine.

  8. Reliability of single aliquot regenerative protocol (SAR) for dose estimation in quartz at different burial temperatures: A simulation study

    International Nuclear Information System (INIS)

    Koul, D.K.; Pagonis, V.; Patil, P.

    2016-01-01

    The single aliquot regenerative protocol (SAR) is a well-established technique for estimating naturally acquired radiation doses in quartz. This simulation work examines the reliability of SAR protocol for samples which experienced different ambient temperatures in nature in the range of −10 to 40 °C. The contribution of various experimental variables used in SAR protocols to the accuracy and precision of the method is simulated for different ambient temperatures. Specifically the effects of paleo-dose, test dose, pre-heating temperature and cut-heat temperature on the accuracy of equivalent dose (ED) estimation are simulated by using random combinations of the concentrations of traps and centers using a previously published comprehensive quartz model. The findings suggest that the ambient temperature has a significant bearing on the reliability of natural dose estimation using SAR protocol, especially for ambient temperatures above 0 °C. The main source of these inaccuracies seems to be thermal sensitization of the quartz samples caused by the well-known thermal transfer of holes between luminescence centers in quartz. The simulations suggest that most of this inaccuracy in the dose estimation can be removed by delivering the laboratory doses in pulses (pulsed irradiation procedures). - Highlights: • Ambient temperatures affect the reliability of SAR. • It overestimates the dose with increase in burial temperature and burial time periods. • Elevated temperature irradiation does not correct for these overestimations. • Inaccuracies in dose estimation can be removed by incorporating pulsed irradiation procedures.

  9. MPLEx: a Robust and Universal Protocol for Single-Sample Integrative Proteomic, Metabolomic, and Lipidomic Analyses

    Energy Technology Data Exchange (ETDEWEB)

    Nakayasu, Ernesto S.; Nicora, Carrie D.; Sims, Amy C.; Burnum-Johnson, Kristin E.; Kim, Young-Mo; Kyle, Jennifer E.; Matzke, Melissa M.; Shukla, Anil K.; Chu, Rosalie K.; Schepmoes, Athena A.; Jacobs, Jon M.; Baric, Ralph S.; Webb-Robertson, Bobbie-Jo; Smith, Richard D.; Metz, Thomas O.; Chia, Nicholas

    2016-05-03

    ABSTRACT

    Integrative multi-omics analyses can empower more effective investigation and complete understanding of complex biological systems. Despite recent advances in a range of omics analyses, multi-omic measurements of the same sample are still challenging and current methods have not been well evaluated in terms of reproducibility and broad applicability. Here we adapted a solvent-based method, widely applied for extracting lipids and metabolites, to add proteomics to mass spectrometry-based multi-omics measurements. Themetabolite,protein, andlipidextraction (MPLEx) protocol proved to be robust and applicable to a diverse set of sample types, including cell cultures, microbial communities, and tissues. To illustrate the utility of this protocol, an integrative multi-omics analysis was performed using a lung epithelial cell line infected with Middle East respiratory syndrome coronavirus, which showed the impact of this virus on the host glycolytic pathway and also suggested a role for lipids during infection. The MPLEx method is a simple, fast, and robust protocol that can be applied for integrative multi-omic measurements from diverse sample types (e.g., environmental,in vitro, and clinical).

    IMPORTANCEIn systems biology studies, the integration of multiple omics measurements (i.e., genomics, transcriptomics, proteomics, metabolomics, and lipidomics) has been shown to provide a more complete and informative view of biological pathways. Thus, the prospect of extracting different types of molecules (e.g., DNAs, RNAs, proteins, and metabolites) and performing multiple omics measurements on single samples is very attractive, but such studies are challenging due to the fact that the extraction conditions differ according to the molecule type. Here, we adapted an organic solvent-based extraction method that demonstrated

  10. Comparative study of intravenous urographic bolus (I.U.B.) and intravenous urographic infusion (I.U.I.) in dogs; Estudio comparativo entre el urograma endovenoso en bolo y de infusión en perros

    Energy Technology Data Exchange (ETDEWEB)

    Thibaut L, Julio; Ditzel, G. [Universidad Austral de Chile, Valdivia (Chile); Vargas, L; Born, R; Deppe G, Rodolfo

    1996-07-01

    Two urographic methods were compared: the intravenous urographic bolus (i.u.b.) and the intravenous urographic infusion (i.u.i.). In both methods, two groups of seven healthy adult dogs of both sexes, weighing7.0 to 16.5 kg were used and were anaesthesized with 2% thiopentone sodium in doses of 20 mg/kg via cephalica. In the i.u.b., meglumine diatrizoate (Hypaque-M, 60%) was injected via saphena with a concentration of 282 mg of iodine per mi in doses of 564 mg of iodine per kg. In the i.u.i., meglumine diatrizoate was injected via saphena by drip infusion with a concentration of 200 mg of iodine per mi in doses of 500 mg of iodine per kg. Three series of two X-rays each were taken in ventrodorsal projection 1, 4 and 8 min and left lateral recumbency 30 sec after administering the contrast medium. The X-ray plates obtained were analyzed and compared intra and inter group considering the advance speed of the contrast medium, the radiographic density and outline, and kidney size. The advance speed of the contrast medium was higher in the i.u.i., reaching the kidney, ureter and bladder 1 min after administration in both projections; in ventrodorsal projections in the i.u.b. only the kidneys were reached while in the left lateral recumbency, the kidney and ureters were reached [Spanish] Con el fin de comparar el urograma endovenoso en bolo (u.e.b.) y el urograma endovenoso en infusion (u.e.i.), se trabajo con dos grupos de 7 perros adultos de ambos sexos, clinicamente sanos, con un peso de 7,0 a 16,5kg, anestesiados con tiopental sodico al 2% en dosis de 20 mg/kg via vena cefalica. En el u.e.b. se inyecto via vena safena diatrizoato de meglumina (Hypaque M, 60%) con una concentracion de 282mg de yodo por ml en dosis de 564mg de yodo por kg. En el u.e.i. se inyecto via fleboclisis diatrizoato de meglumina con una concentracion de 200mg de yodo por ml en dosis de 500mg de yodo por kg. Para cada perro se tomaron tres series de dos radiografias cada una, en proyeccion

  11. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  12. Isolated abnormal strict morphology is not a contraindication for intrauterine insemination.

    Science.gov (United States)

    Lockwood, G M; Deveneau, N E; Shridharani, A N; Strawn, E Y; Sandlow, J I

    2015-11-01

    This study sought to investigate whether isolated abnormal strict morphology (<5% normal forms) and very low strict morphology (0-1% normal forms) affects pregnancy rates in intrauterine insemination (IUI). This was a retrospective study performed at an Academic Medical Center/Reproductive Medicine Center. Four hundred and eight couples were included for 856 IUI cycles. 70 IUI cycles were performed in couples with abnormal strict morphology and otherwise normal semen parameters. Outcomes were measured as clinical pregnancy rate per IUI cycle as documented by fetal heart activity on maternal ultrasound. Clinical pregnancy rate did not significantly differ between the group with abnormal strict morphology [11/70 (15.7%)] and the normal morphology group [39/281 (13.9%)]. Additionally, there was no significant difference between the pregnancy rate in the abnormal morphology group compared to that of our overall institutional IUI pregnancy rate [145/856 (16.9%)]. Furthermore, there was no significant difference between pregnancy rate in the very low morphology group [3/14 (21.4%)] compared to those with normal morphology or the overall IUI pregnancy rate. Patients with isolated abnormal strict morphology have clinical pregnancy rates similar to those with normal morphology for IUI. Even in those with very low normal forms, consideration of IUI for assisted reproduction should not be excluded. © 2015 American Society of Andrology and European Academy of Andrology.

  13. Single-needle temporomandibular joint arthrocentesis with hyaluronic acid injections. Preliminary data after a five-injection protocol.

    Science.gov (United States)

    Manfredini, D; Guarda-Nardini, L; Ferronato, G

    2009-10-01

    The classical technique for temporomandibular joint (TMJ) arthrocentesis provides a double access to the joint space, which may lead to patient's postoperatory discomfort. For this reason, a less invasive, single-needle approach has been recently described, and the present investigation reports findings on a case series of patients with TMJ osteoarthritis treated with hyaluronic acid injections following a single needle arthrocentesis. METHODS. Fourteen consecutive patients with a diagnosis of TMJ osteoarthritis according to the Research Diagnostic Criteria for Temporo-mandibular Disorders were treated with a cycle of five weekly injections of hyaluronic acid after arthrocentesis. A number of subjective (pain at rest and mastication, masticatory efficiency, functional limitation, subjective efficacy of treatment, tolerability of treatment) and objective (maximum assisted and unassited mouth opening, protrusive and laterotrusive movements) outcome variables were assessed before and after the treatment period. At the end of the five-injection protocol, significant improvements were showed in almost all the subjective outcome variables. Tolerability of the treatment was good on a four-point ordinal scale since the time of the first injection. The present investigation suggested that the single needle technique for TMJ hyaluronic injection following arthrocentesis in osteoarthritic joints may have promising applications in the clinical setting, which have to be confirmed with future studies.

  14. Blind quantum computation protocol in which Alice only makes measurements

    Science.gov (United States)

    Morimae, Tomoyuki; Fujii, Keisuke

    2013-05-01

    Blind quantum computation is a new secure quantum computing protocol which enables Alice (who does not have sufficient quantum technology) to delegate her quantum computation to Bob (who has a full-fledged quantum computer) in such a way that Bob cannot learn anything about Alice's input, output, and algorithm. In previous protocols, Alice needs to have a device which generates quantum states, such as single-photon states. Here we propose another type of blind computing protocol where Alice does only measurements, such as the polarization measurements with a threshold detector. In several experimental setups, such as optical systems, the measurement of a state is much easier than the generation of a single-qubit state. Therefore our protocols ease Alice's burden. Furthermore, the security of our protocol is based on the no-signaling principle, which is more fundamental than quantum physics. Finally, our protocols are device independent in the sense that Alice does not need to trust her measurement device in order to guarantee the security.

  15. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  16. Gene probes : principles and protocols [Methods in molecular biology, v. 179

    National Research Council Canada - National Science Library

    Rapley, Ralph; Aquino de Muro, Marilena

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  17. Preventing falls in older multifocal glasses wearers by providing single-lens distance glasses: the protocol for the VISIBLE randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Lee Bonsan B

    2009-03-01

    Full Text Available Abstract Background Recent research has shown that wearing multifocal glasses increases the risk of trips and falls in older people. The aim of this study is to determine whether the provision of single-lens distance glasses to older multifocal glasses wearers, with recommendations for wearing them for walking and outdoor activities, can prevent falls. We will also measure the effect of the intervention on health status, lifestyle activities and fear of falling, as well as the extent of adherence to the program. Methods/Design Approximately 580 older people who are regular wearers of multifocal glasses people will be recruited. Participants will be randomly allocated to either an intervention group (provision of single lens glasses, with counselling and advice about appropriate use or a control group (usual care. The primary outcome measure will be falls (measured with 13 monthly calendars. Secondary measures will be quality of life, falls efficacy, physical activity levels and adverse events. Discussions The study will determine the impact of providing single-lens glasses, with advice about appropriate use, on preventing falls in older regular wearers of multifocal glasses. This pragmatic intervention, if found to be effective, will guide practitioners with regard to recommending appropriate glasses for minimising the risk of falls in older people. Trial Registration The protocol for this study was registered with the Clinical Trials.gov Protocol Registration System on June 7th 2006 (#350855.

  18. Single dental implant retained mandibular complete dentures – influence of the loading protocol: study protocol for a randomized controlled trial

    Science.gov (United States)

    2014-01-01

    Background Over the years, there has been a strong consensus in dentistry that at least two implants are required to retain a complete mandibular denture. It has been shown in several clinical trials that one single median implant can retain a mandibular overdenture sufficiently well for up to 5 years without implant failures, when delayed loading was used. However, other trials have reported conflicting results with in part considerable failure rates when immediate loading was applied. Therefore it is the purpose of the current randomized clinical trial to test the hypothesis that immediate loading of a single mandibular midline implant with an overdenture will result in a comparable clinical outcome as using the standard protocol of delayed loading. Methods/design This prospective nine-center randomized controlled clinical trial is still ongoing. The final patient will complete the trial in 2016. In total, 180 edentulous patients between 60 and 89 years with sufficient complete dentures will receive one median implant in the edentulous mandible, which will retain the existing complete denture using a ball attachment. Loading of the median implant is either immediately after implant placement (experimental group) or delayed by 3 months of submerged healing at second-stage surgery (control group). Follow-up of patients will be performed for 24 months after implant loading. The primary outcome measure is non-inferiority of implant success rate of the experimental group compared to the control group. The secondary outcome measures encompass clinical, technical and subjective variables. The study was funded by the Deutsche Forschungsgemeinschaft (German research foundation, KE 477/8-1). Discussion This multi-center clinical trial will give information on the ability of a single median implant to retain a complete mandibular denture when immediately loaded. If viable, this treatment option will strongly improve everyday dental practice. Trial registration The trial

  19. Using the OSL single-aliquot regenerative-dose protocol with quartz extracted from building materials in retrospective dosimetry

    International Nuclear Information System (INIS)

    Boetter-Jensen, L.; Solongo, S.; Murray, A.S.; Banerjee, D.; Jungner, H.

    2000-01-01

    We report on the application of the single-aliquot regenerative-dose (SAR) protocol to the optically stimulated luminescence signal from quartz extracted from fired bricks and unfired mortar in retrospective dosimetry. The samples came from a radioactive materials storage facility, with ambient dose rates of about 0.1 mGy/h. A detailed dose-depth profile was analysed from one brick, and compared with dose records from area TL dosemeters. Small-aliquot dose-distributions were analysed from the mortar samples; one associated with the exposed brick, and one from a remote site exposed only to background radiation. We conclude that unfired materials have considerable potential in retrospective dosimetry

  20. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  1. Protocol renal biopsy in patients with lupus nephritis: a single center experience.

    Science.gov (United States)

    Singh, Ametashver; Ghosh, Rabindranath; Kaur, Prabhjeet; Golay, Vishal; Pandey, Rajendra; Roychowdhury, Arpita

    2014-07-01

    Renal biopsy plays an indispensable role in the diagnosis and management of patients with lupus nephritis (LN). A number of studies have evaluated the role of a repeat biopsy in case of disease relapse or treatment unresponsiveness. We studied 40 patients with LN with renal biopsies performed at baseline and after six months of therapy. The baseline and protocol biopsies were compared with respect to histological class transformation, crescents, tubular atrophy, interstitial fibrosis and glomerulosclerosis. We also compared serum creatinine, hemoglobin, systemic lupus erythematosus disease activity index (SLEDAI) scores, 24-h urine protein excretion and C3levels as well as activity index (AI) and chronicity index (CI) at baseline and at six months. Comparison of means was made by paired t test, McNemar test and marginal homogeneity test (multinomial data). Histological class transformation was seen in 10 patients (25%). Intra-class progression to greater chronicity was seen in 10 other patients (25%).There was an increase in glomerulosclerosis, tubular atrophy, interstitial fibrosis and a reduction in cellularity, crescent formation and wire loop lesions in the protocol biopsy. A decline in AI (6.05 vs. 2.50, P protocol biopsy. Our study shows a trend toward greater chronicity in protocol biopsies in LN.

  2. Calculation of 3D genome structures for comparison of chromosome conformation capture experiments with microscopy: An evaluation of single-cell Hi-C protocols.

    Science.gov (United States)

    Lando, David; Stevens, Tim J; Basu, Srinjan; Laue, Ernest D

    2018-01-01

    Single-cell chromosome conformation capture approaches are revealing the extent of cell-to-cell variability in the organization and packaging of genomes. These single-cell methods, unlike their multi-cell counterparts, allow straightforward computation of realistic chromosome conformations that may be compared and combined with other, independent, techniques to study 3D structure. Here we discuss how single-cell Hi-C and subsequent 3D genome structure determination allows comparison with data from microscopy. We then carry out a systematic evaluation of recently published single-cell Hi-C datasets to establish a computational approach for the evaluation of single-cell Hi-C protocols. We show that the calculation of genome structures provides a useful tool for assessing the quality of single-cell Hi-C data because it requires a self-consistent network of interactions, relating to the underlying 3D conformation, with few errors, as well as sufficient longer-range cis- and trans-chromosomal contacts.

  3. A combined static-dynamic single-dose imaging protocol to compare quantitative dynamic SPECT with static conventional SPECT.

    Science.gov (United States)

    Sciammarella, Maria; Shrestha, Uttam M; Seo, Youngho; Gullberg, Grant T; Botvinick, Elias H

    2017-08-03

    SPECT myocardial perfusion imaging (MPI) is a clinical mainstay that is typically performed with static imaging protocols and visually or semi-quantitatively assessed for perfusion defects based upon the relative intensity of myocardial regions. Dynamic cardiac SPECT presents a new imaging technique based on time-varying information of radiotracer distribution, which permits the evaluation of regional myocardial blood flow (MBF) and coronary flow reserve (CFR). In this work, a preliminary feasibility study was conducted in a small patient sample designed to implement a unique combined static-dynamic single-dose one-day visit imaging protocol to compare quantitative dynamic SPECT with static conventional SPECT for improving the diagnosis of coronary artery disease (CAD). Fifteen patients (11 males, four females, mean age 71 ± 9 years) were enrolled for a combined dynamic and static SPECT (Infinia Hawkeye 4, GE Healthcare) imaging protocol with a single dose of 99m Tc-tetrofosmin administered at rest and a single dose administered at stress in a one-day visit. Out of 15 patients, eleven had selective coronary angiography (SCA), 8 within 6 months and the rest within 24 months of SPECT imaging, without intervening symptoms or interventions. The extent and severity of perfusion defects in each myocardial region was graded visually. Dynamically acquired data were also used to estimate the MBF and CFR. Both visually graded images and estimated CFR were tested against SCA as a reference to evaluate the validity of the methods. Overall, conventional static SPECT was normal in ten patients and abnormal in five patients, dynamic SPECT was normal in 12 patients and abnormal in three patients, and CFR from dynamic SPECT was normal in nine patients and abnormal in six patients. Among those 11 patients with SCA, conventional SPECT was normal in 5, 3 with documented CAD on SCA with an overall accuracy of 64%, sensitivity of 40% and specificity of 83%. Dynamic SPECT image

  4. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    Science.gov (United States)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  5. Protocols for BNCT of glioblastoma multiforme at Brookhaven: Practical considerations

    Energy Technology Data Exchange (ETDEWEB)

    Chanana, A.D.; Coderre, J.A.; Joel, D.D.; Slatkin, D.N.

    1996-12-31

    In this report we discuss some issues considered in selecting initial protocols for boron neutron capture therapy (BNCT) of human glioblastoma multiforme. First the tolerance of normal tissues, especially the brain, to the radiation field. Radiation doses limits were based on results with human and animal exposures. Estimates of tumor control doses were based on the results of single-fraction photon therapy and single fraction BNCT both in humans and experimental animals. Of the two boron compounds (BSH and BPA), BPA was chosen since a FDA-sanctioned protocol for distribution in humans was in effect at the time the first BNCT protocols were written and therapy studies in experimental animals had shown it to be more effective than BSH.

  6. Single-electron quantum tomography in quantum Hall edge channels

    International Nuclear Information System (INIS)

    Grenier, Ch; Degiovanni, P; Herve, R; Bocquillon, E; Parmentier, F D; Placais, B; Berroir, J M; Feve, G

    2011-01-01

    We propose a quantum tomography protocol to measure single-electron coherence in quantum Hall edge channels, and therefore access for the first time the wavefunction of single-electron excitations propagating in ballistic quantum conductors. Its implementation would open the way to quantitative studies of single-electron decoherence and would provide a quantitative tool for analyzing single- to few-electron sources. We show how this protocol could be implemented using ultrahigh-sensitivity noise measurement schemes.

  7. The outcome of ART in males with impaired spermatogenesis

    Directory of Open Access Journals (Sweden)

    V S Mangoli

    2008-01-01

    Full Text Available Aims: This study was conducted to evaluate the outcomes of assisted reproductive technology (ART procedures, viz., intrauterine insemination (IUI, in vitro fertilization (IVF and intracytoplasmic sperm injection (ICSI in males with impaired spermatogenesis. Settings and Design: The subjects of the study were infertile couples who were undergoing ART treatment due to male factor indications. The project was designed to correlate the outcome of the ART treatment and its efficacy in different study groups. Methods: Males were grouped as: 1. oligozoospermia (n = 153, 2. asthenoteratozoospermia (n = 158, 3. obstructive azoospermia (n = 110 and 4. nonobstructive azoospermia (n = 58. Patients from groups 1 and 2 were considered for IUI, IVF and ICSI. Those from group 3 were considered for IVF and ICSI and the 4th group underwent only ICSI treatment. Results: Oligozoospermia showed lower pregnancy rates with IUI than with both IVF and ICSI. An average minimum native and postharvest count was obtained to get an acceptable IUI outcome. Asthenoteratozoospermia had the lowest pregnancy rate with IUI as compared to IVF, whereas ICSI showed significantly higher pregnancy rates in this group. Obstructive azoospermia showed significant improvement with ICSI over IVF. In nonobstructive azoospermia, ICSI resulted in a 27.58% pregnancy rate. Conclusion: The IUI outcome was impressive though less effective whereas there was no difference between the IVF and ICSI outcomes in oligozoospermia. In asthenoteratozoospermia, ICSI showed a significant advantage over IUI and IVF, with IUI resulting in poor outcome in this group. In obstructive azoospermia, ICSI had a distinct advantage over IVF whereas in nonobstructive azoospermia, ICSI, the only option, was found to be effective and helpful in achieving an acceptable pregnancy rate.

  8. Comparison of four different protocols of I-131 therapy for toxic single thyroid nodule

    International Nuclear Information System (INIS)

    Zakavi, S.R.; Mousavi, Z.

    2007-01-01

    Full text: Aim: Radio-iodine therapy is the preferred method of treatment of toxic thyroid nodule, however there is no consensus on the dose of I-131 administered. The aim of this study was to compare 4 different dose protocols for treatment of these patients. Methods and patients: All patients with hyperthyroidism and single hot thyroid nodule were referred for I-131 therapy after thyroid physical examination, ultrasonography and measurements of 24 hours thyroid iodine uptake. They were randomly entered in one of 4 groups: fixed low dose (FLD), fixed high dose (FHD), calculated low dose (CLD) and calculated high dose (CHD). In fixed dose protocol, 13mCi of I-131 was administered for patients in FLD group and 22.5mCi was administered for patients in FHD group. Quimby formula was used for calculation of radio-iodine dose in calculated groups with 90-100uCi and 180-200uCi per gram of thyroid weight in CLD and CHD groups respectively. Patients were followed up for a mean of 2, 5, 10 , 22 and 50 months later and physical exam and measurements of thyroid values were done in each follow up. Results: One hundred and sixteen patients were studied. One 72 year old patient was decreased 2 months after treatment due to coronary artery disease and 18 other patients did not complete follow up. From 97 patients who completed follow- up 8 patients were male and 89 patients were female. Mean age of patients were 43.3 years (SD=13.4) and mean thyroid nodule weight was 51 grams (SD=19.2).Mean 24 hours thyroid uptake was 48.07% (SD=14.07). Follow up was done up to 85 months with a median follow up of 14 months. Twenty two patients were in CHD group, 23 patients in CLD, 25 patients in FLD and 27 patients in FHD group. No significant difference was noted in 4 groups regarding age, sex, thyroid uptake and thyroid weight. The mean administered dose was 10.5mCi (SD=3.2) and 18.7mCi (SD=5.3) in CLD and CHD groups respectively (P<0.001). In CHD group, hyperthyroidism was decreased from 33

  9. Intra-uterine insemination: pregnancy rate in relation to number, size of pre-ovulatory follicles and day of insemination.

    Science.gov (United States)

    Karuppaswamy, J; Smedley, Mamin; Carter, Lindsay

    2009-03-01

    The objective of the study was to analyse the pregnancy rate in intra-uterine insemination (IUI) in relation to pre-ovulatory follicular number, size and day of insemination. A retrospective analysis of 216 completed IUI cycles was used in an attempt to identify significant variables predictive of treatment success. Couples with unexplained infertility and male factor infertility underwent IUI with or without ovarian stimulation. The mean number of IUI cycles per patient was 4.1, the overall pregnancy rate was 27.3% per patient, and the pregnancy rate per cycle was 6.9%. The pregnancy rate was 4.4% when one follicle was produced, whereas with more than two follicles, the rate increased to 21.2%. Hormonal stimulation using clomiphene citrate and/or human menopausal gonadotrophin/follicle stimulating hormone yielded a significant higher pregnancy rate compared to IUI in natural cycles (10.3% versus 3.3%). Although not statistically significant, the pregnancy rate decreased with advancing age of woman. The results suggest that IUI is a useful method of assisted conception in unexplained infertility and higher pregnancy rates can be achieved with good patient selection and ovarian stimulation.

  10. A Proof-of-Concept Clinical Trial of A Single Luteal Use of Long-Acting Gonadotropin-Releasing Hormone Antagonist Degarelix in Controlled Ovarian Stimulation for In Vitro Fertilization: Long Antagonist Protocol

    Directory of Open Access Journals (Sweden)

    Evangelos G. Papanikolaou

    2018-03-01

    Full Text Available IntroductionA drawback of gonadotropin-releasing hormone (GnRH antagonist protocols in in vitro fertilization (IVF is that they have limited flexibility in cycle programming. This proof of concept study explored the efficacy of a single-dose, long-acting GnRH antagonist IVF protocol. Trial registration number is NCT03240159, retrospectively registered on March 08, 2017.Materials and methodsThe efficacy of a single-dose long-acting antagonist, degarelix, was explored initially in healthy donors and subsequently in infertile patients. In the first part, five healthy oocyte donors underwent ovarian stimulation with this new protocol: in the late luteal phase, at day 24, a bolus injection of degarelix was administered subcutaneously to control the LH surge in the follicular phase. Ovarian stimulation with gonadotropins was initiated subsequently from day 7 to day 10. End points were first to inhibit the LH surge later in the follicular phase and, second, to retrieve mature oocytes for IVF. In the second part, five infertile women received the same bolus injection of degarelix administered during the luteal phase at day 24. Different gonadotropin starting days (day 2 through day 8 were tested in order to observe possible differences in ovarian stimulation. In these infertile patients, fresh embryo transfers were performed to assess the pregnancy efficacy of this protocol on pregnancy outcomes and to address any possible negative effects on endometrium receptivity.ResultsIn the first part of the study, all donors were effectively downregulated with a single luteal dose of 0.5 ml of degarelix for up to 22 days until the final oocyte maturation triggering day. Mature oocytes were retrieved after 36 h from all patients and all produced 2–7 blastocysts. In the second part, all five infertile patients achieved sufficient LH downregulation and completed ovarian stimulation without any LH surge. All patients (except one with freeze all strategy had

  11. Assisted reproductive technology and intrauterine inseminations in Europe, 2005: results generated from European registers by ESHRE: ESHRE. The European IVF Monitoring Programme (EIM), for the European Society of Human Reproduction and Embryology (ESHRE)

    DEFF Research Database (Denmark)

    Nyboe Andersen, A; Goossens, V; Bhattacharya, S

    2009-01-01

    BACKGROUND: Results of assisted reproductive techniques from treatments initiated in Europe during 2005 are presented in this ninth report. Data were mainly collected from existing national registers. METHODS: From 30 countries, 923 clinics reported 418 111 treatment cycles including: IVF (118 074...... insemination using husband/partner's semen (IUI-H) and donor semen (IUI-D) were reported from 21 countries and included 128 908 IUI-H and 20 568 IUI-D cycles. RESULTS: In 16 countries where all clinics reported to the IVF register, 1115 cycles were performed per million inhabitants. For IVF, the clinical...... pregnancy rates per aspiration and per transfer were 26.9% and 30.3%, respectively. For ICSI, the corresponding rates were 28.5% and 30.9%. After IUI-H, the clinical pregnancy rate was 12.6% per insemination in women IVF and ICSI, the distribution of transfer of one, two, three and four or more...

  12. Blunt hepatic and splenic trauma. A single Center experience using a multidisciplinary protocol.

    Science.gov (United States)

    Ruscelli, Paolo; Buccoliero, Farncesco; Mazzocato, Susanna; Belfiori, Giulio; Rabuini, Claudio; Sperti, Pierluigi; Rimini, Massimiliano

    2017-01-01

    The aim of this retrospective study was to describe more than 10 years experience of a single Trauma Center about non operative management of abdominal organ injuries in hemodynamically stable patients MATERIAL OF STUDY: Between January 2001 and December 2014 ,732 consecutive patients were admitted with blunt abdominal trauma, involving liver and/or spleen and/or kidney, at the Bufalini Cesena Hospital .Management of patients included a specific institutional developed protocol :hemodynamic stability was evaluated in shock room according to the patients response to fluid challenge and the patients were classified into three categories A,B,and C. Form 732 Trauma, 356(48.6%) of patients were submitted to a surgical procedure, all the other patient 376(51.4%) underwent an non operative management .Overall mortality was 9.8% (72), mortality in the surgery group was 15.4% eheras in the non operative group was 4.5%; the relative risk of mortality, measured by the odds ratio waith a 95% confidence interval, was 3.417(2.023-5.772) for rhe surgery group; patient over 40 years old has a statistically significant higher mortality. In our series the overall mortality rate of non operative management group was 4.5%, instead in unstable patients, the surgery group, the mortality was 15.3%; the overall mortality mortality rate after the application of our protocol is 9.8%, Although surgery continues to be the standard for hemodically unstable patients with blunt hepatic and splenic trauma. In our experience AAST Organ Injury Scale was useless for the therapeutic decision making process after the CT scan if a source of bleeding was detected and immediate angiography was performed in order to control and solve it. In our experience the AAST Organ Injury Scale was useless for the therapeutic decision making process, The results suggest that the only criteria of choice for therapeutici strategy was the hemodynamic stability, Nonoperative managem,ent can be applied only following

  13. High-response intrauterine insemination cycles converted to low-cost in vitro fertilization

    Directory of Open Access Journals (Sweden)

    Aletebi F

    2011-05-01

    Full Text Available Fatma AletebiAssisted Reproduction Unit, Department of Obstetrics and Gynaecology, King Abdulaziz University, Soliman Fakeeh Hospital, Jeddah, Saudi ArabiaBackground: There is a trend to cancel intrauterine insemination (IUI in women with a high response. The aim of this study was to evaluate the efficacy of low-cost in vitro fertilization (IVF in high-response IUI cycles in comparison with conventional IVF.Methods and materials: A total of 46 women were included in the study. Group A (study group included 23 women with hyper-response to IUI cycles who were converted to IVF. They received oral letrozole 2.5 mg twice daily from days 3–7 of the menstrual cycle, along with 75 International Units (IU of recombinant follicle-stimulating hormone on days 3 and 8. Group B (control group underwent conventional IVF, and received downregulation with a gonadotrophin-releasing hormone agonist followed by stimulation with recombinant follicle-stimulating hormone 150–300 IU/day. Ovulation was triggered by 10,000 IU of human chorionic gonadotrophin, followed by IVF and embryo transfer. The primary outcome measure analyzed was pregnancy rates in both groups.Results: The study group received a significantly lower (P = 0.001 total dose of follicle-stimulating hormone and had significantly (P = 0.002 decreased levels of terminal estradiol. Although the pregnancy rate (30.43% in the study group versus 39.13% in the conventional group per stimulated cycle was higher in the conventional IVF group, the miscarriage rate (study group 4.34% versus conventional group 13.04% was also higher, and hence the take-home baby rate (study group 26.08% versus conventional group 30.43% was more or less similar in both the groups.Conclusion: IVF can be offered to women having a high response to IUI cycles with good pregnancy rates and at low cost compared with use of a conventional protocol, and therefore can be considered more patient-friendly in selected cases.Keywords: low

  14. Predictive value of sperm morphology and progressively motile sperm count for pregnancy outcomes in intrauterine insemination.

    Science.gov (United States)

    Lemmens, Louise; Kos, Snjezana; Beijer, Cornelis; Brinkman, Jacoline W; van der Horst, Frans A L; van den Hoven, Leonie; Kieslinger, Dorit C; van Trooyen-van Vrouwerff, Netty J; Wolthuis, Albert; Hendriks, Jan C M; Wetzels, Alex M M

    2016-06-01

    To investigate the value of sperm parameters to predict an ongoing pregnancy outcome in couples treated with intrauterine insemination (IUI), during a methodologically stable period of time. Retrospective, observational study with logistic regression analyses. University hospital. A total of 1,166 couples visiting the fertility laboratory for their first IUI episode, including 4,251 IUI cycles. None. Sperm morphology, total progressively motile sperm count (TPMSC), and number of inseminated progressively motile spermatozoa (NIPMS); odds ratios (ORs) of the sperm parameters after the first IUI cycle and the first finished IUI episode; discriminatory accuracy of the multivariable model. None of the sperm parameters was of predictive value for pregnancy after the first IUI cycle. In the first finished IUI episode, a positive relationship was found for ≤4% of morphologically normal spermatozoa (OR 1.39) and a moderate NIPMS (5-10 million; OR 1.73). Low NIPMS showed a negative relation (≤1 million; OR 0.42). The TPMSC had no predictive value. The multivariable model (i.e., sperm morphology, NIPMS, female age, male age, and the number of cycles in the episode) had a moderate discriminatory accuracy (area under the curve 0.73). Intrauterine insemination is especially relevant for couples with moderate male factor infertility (sperm morphology ≤4%, NIPMS 5-10 million). In the multivariable model, however, the predictive power of these sperm parameters is rather low. Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  15. Heralded noiseless amplification for single-photon entangled state with polarization feature

    Science.gov (United States)

    Wang, Dan-Dan; Jin, Yu-Yu; Qin, Sheng-Xian; Zu, Hao; Zhou, Lan; Zhong, Wei; Sheng, Yu-Bo

    2018-03-01

    Heralded noiseless amplification is a promising method to overcome the transmission photon loss in practical noisy quantum channel and can effectively lengthen the quantum communication distance. Single-photon entanglement is an important resource in current quantum communications. Here, we construct two single-photon-assisted heralded noiseless amplification protocols for the single-photon two-mode entangled state and single-photon three-mode W state, respectively, where the single-photon qubit has an arbitrary unknown polarization feature. After the amplification, the fidelity of the single-photon entangled state can be increased, while the polarization feature of the single-photon qubit can be well remained. Both the two protocols only require the linear optical elements, so that they can be realized under current experimental condition. Our protocols may be useful in current and future quantum information processing.

  16. A survey of four years intrauterine insemination at Shariati Hospital

    Directory of Open Access Journals (Sweden)

    Aghahosseini M

    1998-08-01

    Full Text Available Intrauterine insemination (IUI has been practiced since the late 1800's primarily for idiopathic infertility, and in men with deficient semen parameters. The procedure is done by placing washed sperm in uterus a few hours before ovulation. The records of 427 couples receiving IUI for treatment of infertility at Shariati hospital in 1370-74 were reviewed retrospectively. These patients had IUI in 574 cycles. Eighty patients became pregnant and delivery rate was 14% per cycle. Pregnancy rate is impressive when ovulation induction is combined with insemination timed just before ovulation. The success rate in Shariati hospital is comparable to other infertility centers in the world and cost of a cycle of IUI with HMG superovulation is approximately one third the cost of IVF-ET or GIFT cycle and avoids invasive oocyte retrieval and extracorporeal fertilization. So we suggest that women with refractory infertility without anatomic distortion of pelvis can have at least 3-6 cycles of IUI before IVF or GIFT.

  17. Poor response cycles: when should we cancel? Comparison of outcome between egg collection, intrauterine insemination conversion, and follow-up cycles after abandonment.

    Science.gov (United States)

    Nicopoullos, James D M; Abdalla, Hossam

    2011-01-01

    To determine optimal management with one or two mature follicles after stimulation. Retrospective analysis. Lister fertility clinic. A total of 1,350 IVF/intracytoplasmic sperm injection cycles (7.3% of total) during 1998-2009 were found to have one or two mature follicles. Group 1 (n = 807) comprised those who proceeded to vaginal egg collection (VEC) (59.8%; outcome per egg collection), group 2 (n=248) those who converted to IUI (18.4%; outcome per insemination) and group 3 (n=259) those who abandoned the current cycle (21.9%; outcome per abandoned cycle in first subsequent cycle). Live birth rate, clinical pregnancy rate, and biochemical pregnancy rate. Biochemical pregnancy rates of 13.1%, 4.9%, and 9.7%, clinical pregnancy rates of 8.1%, 3.6%, and 7.2%, and ongoing pregnancy rates of 6.8%, 2.0%, and 5.5% were achieved in groups 1, 2, and 3, respectively. All pregnancy outcomes were significantly higher after VEC (group 1) than for those converted to IUI (group 2), and all pregnancy outcomes were higher with borderline significance in group 3 vs. group 2. There was no significant difference in outcome between groups 1 and 3. Our data suggest that for such poor responders, proceeding to VEC may represent their best chance of successful outcome. Conversion to IUI offers the poorest outcome, and despite the potential for improvements in cycle protocol, abandoning and a further attempt does not improve outcome (using abandoned cycle as the denominator). Copyright © 2011 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  18. Integration of GC-MSD and ER-Calux® assay into a single protocol for determining steroid estrogens in environmental samples.

    Science.gov (United States)

    Avberšek, Miha; Žegura, Bojana; Filipič, Metka; Heath, Ester

    2011-11-01

    There are many published studies that use either chemical or biological methods to investigate steroid estrogens in the aquatic environment, but rarer are those that combine both. In this study, gas chromatography with mass selective detection (GC-MSD) and the ER-Calux(®) estrogenicity assay were integrated into a single protocol for simultaneous determination of natural (estrone--E1, 17β-estradiol--E2, estriol--E3) and synthetic (17α-ethinylestradiol--EE2) steroid estrogens concentrations and the total estrogenic potential of environmental samples. For integration purposes, several solvents were investigated and the commonly used dimethyl sulphoxide (DMSO) in the ER-Calux(®) assay was replaced by ethyl acetate, which is more compatible with gas chromatography and enables the same sample to be analysed by both GC-MSD and the ER-Calux(®) assay. The integrated protocol was initially tested using a standard mixture of estrogens. The results for pure standards showed that the estrogenicity calculated on the basis of GC-MSD and the ER-Calux(®) assay exhibited good correlation (r(2)=0.96; α=0.94). The result remained the same when spiked waste water extracts were tested (r(2)=0.92, α=1.02). When applied to real waste water influent and effluent samples the results proved (r(2)=0.93; α=0.99) the applicability of the protocol. The main advantages of this newly developed protocol are simple sample handling for both methods, and reduced material consumption and labour. In addition, it can be applied as either a complete or sequential analysis where the ER-Calux(®) assay is used as a pre-screening method prior to the chemical analysis. Copyright © 2011 Elsevier B.V. All rights reserved.

  19. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  20. A comparison of the cost-effectiveness of in vitro fertilization strategies and stimulated intrauterine insemination in a Canadian health economic model.

    Science.gov (United States)

    Bhatt, Taimur; Baibergenova, Akerke

    2008-05-01

    In vitro fertilization (IVF) with single embryo transfer (SET) has been proposed as a means of reducing multiple pregnancies associated with infertility treatment. All existing cost-effectiveness studies of IVF-SET have compared it with IVF with multiple embryo transfer but not with intrauterine insemination with gonadotropin stimulation (sIUI). We conducted a systematic review of studies of cost-effectiveness of IVF-SET versus IVF with double embryo transfer (DET). Further, we developed a health economy model that compared three strategies: (1) IVF-SET, (2) IVF-DET, and (3) sIUI. The decision analysis considered three cycles for each treatment option. IVF treatment was assumed to be a combination of cycles with transfer of fresh and frozen-thawed embryos. Probabilities used to populate the model were taken from published randomized clinical trials and observational studies. Cost estimates were based on average costs of associated procedures in Canada. The results of published studies on the cost-effectiveness of IVF-SET versus IVF-DET were not consistent. In our analysis, IVF-DET proved to be the most cost-effective strategy at $35,144/live birth, followed by sIUI at $66,960/live birth, and IVF-SET at $109,358/live birth. The results were sensitive both to the cost of IVF cycles and to the probability of live birth. This economic analysis showed that IVF-DET was the most cost-effective strategy of the options, and IVF-SET was the least cost-effective. The results in this model were insensitive to various probability inputs and to the costs associated with sIUI and IVF procedures.

  1. Authenticated Quantum Key Distribution with Collective Detection using Single Photons

    Science.gov (United States)

    Huang, Wei; Xu, Bing-Jie; Duan, Ji-Tong; Liu, Bin; Su, Qi; He, Yuan-Hang; Jia, Heng-Yue

    2016-10-01

    We present two authenticated quantum key distribution (AQKD) protocols by utilizing the idea of collective (eavesdropping) detection. One is a two-party AQKD protocol, the other is a multiparty AQKD protocol with star network topology. In these protocols, the classical channels need not be assumed to be authenticated and the single photons are used as the quantum information carriers. To achieve mutual identity authentication and establish a random key in each of the proposed protocols, only one participant should be capable of preparing and measuring single photons, and the main quantum ability that the rest of the participants should have is just performing certain unitary operations. Security analysis shows that these protocols are free from various kinds of attacks, especially the impersonation attack and the man-in-the-middle (MITM) attack.

  2. Thermogravimetric Analysis of Single-Wall Carbon Nanotubes

    Science.gov (United States)

    Arepalli, Sivram; Nikolaev, Pavel; Gorelik, Olga

    2010-01-01

    An improved protocol for thermogravimetric analysis (TGA) of samples of single-wall carbon nanotube (SWCNT) material has been developed to increase the degree of consistency among results so that meaningful comparisons can be made among different samples. This improved TGA protocol is suitable for incorporation into the protocol for characterization of carbon nanotube material. In most cases, TGA of carbon nanotube materials is performed in gas mixtures that contain oxygen at various concentrations. The improved protocol is summarized.

  3. Low-dose single acquisition rest 99mTc/stress 201Tl myocardial perfusion SPECT protocol: phantom studies and clinical validation

    International Nuclear Information System (INIS)

    Dey, Thomas; Backus, Barbra E.; Romijn, R.Leo; Wieczorek, Herfried; Verzijlbergen, J.F.

    2014-01-01

    We developed and tested a single acquisition rest 99m Tc-sestamibi/stress 201 Tl dual isotope protocol (SDI) with the intention of improving the clinical workflow and patient comfort of myocardial perfusion single photon emission computed tomography (SPECT). The technical feasibility of SDI was evaluated by a series of anthropomorphic phantom studies on a standard SPECT camera. The attenuation map was created by a moving transmission line source. Iterative reconstruction including attenuation correction, resolution recovery and Monte Carlo simulation of scatter was used for simultaneous reconstruction of dual tracer distribution. For clinical evaluation, patient studies were compared to stress 99m Tc and rest 99m Tc reference images acquired in a 2-day protocol. Clinical follow-up examinations like coronary angiography (CAG) and fractional flow reserve (FFR) were included in the assessment if available. Phantom studies demonstrated the technical feasibility of SDI. Artificial lesions inserted in the phantom mimicking ischaemia could be clearly identified. In 51/53 patients, the image quality was adequate for clinical evaluation. For the remaining two obese patients with body mass index > 32 the injected 201 Tl dose of 74 MBq was insufficient for clinical assessment. In answer to this the 201 Tl dose was adapted for obese patients in the rest of the study. In 31 patients, SDI and 99m Tc reference images resulted in equivalent clinical assessment. Significant differences were found in 20 patients. In 18 of these 20 patients additional examinations were available. In 15 patients the diagnosis based on the SDI images was confirmed by the results of CAG or FFR. In these patients the SDI images were more accurate than the 99m Tc reference study. In three patients minor ischaemic lesions were detected by SDI but were not confirmed by CAG. In one of these cases this was probably caused by pronounced apical thinning. For two patients no relevant clinical follow

  4. Recyclable amplification for single-photon entanglement from photon loss and decoherence

    Science.gov (United States)

    Zhou, Lan; Chen, Ling-Quan; Zhong, Wei; Sheng, Yu-Bo

    2018-01-01

    We put forward a highly efficient recyclable single-photon assisted amplification protocol, which can protect single-photon entanglement (SPE) from photon loss and decoherence. Making use of quantum nondemolition detection gates constructed with the help of cross-Kerr nonlinearity, our protocol has some attractive advantages. First, the parties can recover less-entangled SPE to be maximally entangled SPE, and reduce photon loss simultaneously. Second, if the protocol fails, the parties can repeat the protocol to reuse some discarded items, which can increase the success probability. Third, when the protocol is successful, they can similarly repeat the protocol to further increase the fidelity of the SPE. Thereby, our protocol provides a possible way to obtain high entanglement, high fidelity and high success probability simultaneously. In particular, our protocol shows higher success probability in the practical high photon loss channel. Based on the above features, our amplification protocol has potential for future application in long-distance quantum communication.

  5. Formal description of the jumpstart just-in-time signaling protocol using EFSM

    Science.gov (United States)

    Zaim, A. H.; Baldine, Ilia; Cassada, Mark; Rouskas, George N.; Perros, Harry G.; Stevenson, Daniel S.

    2002-07-01

    We present a formal protocol description for a Just-In-Time (JIT) signaling scheme running over a core dWDM network which utilizes Optical Burst Switches (OBS). We apply an eight-tuple extended finite state machine (EFSM) model to formally specify the protocol. Using the EFSM model, we define the communication between a source client node and a destination client node through an ingress and one or multiple intermediate switches. We worked on single burst connections that means setting up the connection just before sending a single burst and then closing the connection as soon as the burst is sent. The communication between the EFSMs is handled through message transfer between protocol entities.

  6. Clinical Efficiency of Application of Intravenous Immunoglobulin in Pregnant Women with Intrauterine Infection

    Directory of Open Access Journals (Sweden)

    O.L. Ishchenko

    2016-02-01

    Full Text Available The problem of intrauterine infection (IUI is still relevant today. Ineffective treatment of this pathology is associated with physiological decline of the immunity in these patients. We have proposed the additional use of intravenous immunoglobulin for the treatment of pregnant women with IUI. There were examined 75 patients with IUI, which was diagnosed in the II trimester. The I group consisted of 40 individuals who received conventional treatment, the II group was formed from 35 women who additionally received intravenous immunoglobulin. On the background of IUI, pregnancy was characterized by an increased incidence of threatened miscarriage and premature labor, gestosis and placental dysfunction; during delivery, premature rupture of amniotic membrane and fetal distress were more common. These patients had placenta with both ultrasonic and histological signs of infection. Among newborns, there was a significant increase in the incidence of pathology associated with intrauterine infection. Additional use of intravenous immunoglobulin in the treatment of IUI during the II trimester of pregnancy in comparison with conventional therapy leads to a significant reduction in the incidence of both obstetric complications and perinatal pathology.

  7. Safety of a DVT chemoprophylaxis protocol following traumatic brain injury: a single center quality improvement initiative.

    Science.gov (United States)

    Nickele, Christopher M; Kamps, Timothy K; Medow, Joshua E

    2013-04-01

    Venous thromboembolism (VTE) is a complication that affects approximately 30 % of moderate and severe traumatic brain injury (TBI) patients when pharmacologic prophylaxis is not used. Following TBI, specifically in the case of contusions, the safety and efficacy of pharmacologic thromboembolism prophylaxis (PTP) has been studied only in small sample sizes. In this study, we attempt to assess the safety and efficacy of a PTP protocol for TBI patients, as a quality improvement (QI) initiative, in the neuroscience intensive care unit (NSICU). Between January 1st and December 31st, 2009, consecutive patients discharged from the University of Wisconsin NSICU after >a 48 h minimum stay were evaluated as part of a QI project. A protocol for the initiation of PTP was designed and implemented for NSICU patients. The protocol did not vary based on type of intracranial injury. The rate of VTE was reported as was heparin-induced thrombocytopenia and PTP-related expansion of intracranial hemorrhage (IH) requiring reoperation. The number of patients receiving PTP and the timing of therapy were tracked. Patients were excluded for persistent coagulopathy, other organ system bleeding (such as the gastrointestinal tract), or pregnancy. Faculty could opt out of the protocol without reason. Using the same criteria, patients discharged during the preceding 6 months, from July 1st to December 31st, 2008, were evaluated as controls as the PTP protocol was not in effect during this time. During the control period, there were 48 head trauma admissions who met the inclusion criteria. In 22 patients (45.8 %), PTP was initiated at an average of 4.9 ± 5.4 days after admission. During the protocol period, there were 87 head trauma admissions taken from 1,143 total NSICU stays who met criteria. In 63 patients (72.4 %), the care team in the NSICU successfully initiated PTP, at an average of 3.4 ± 2.8 days after admission. All 87 trauma patients were analyzed, and the rate of clinically

  8. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  9. Can anti-Mullerian hormone (AMH) predict the outcome of intrauterine insemination with controlled ovarian stimulation?

    Science.gov (United States)

    Bakas, Panagiotis; Boutas, Ioannis; Creatsa, Maria; Vlahos, Nicos; Gregoriou, Odysseas; Creatsas, George; Hassiakos, Dimitrios

    2015-10-01

    To assess whether the levels of anti-Mullerian hormone (AMH) are related to outcome of intrauterine insemination (IUI) in patients treated with gonadotropins. A total of 195 patients underwent controlled ovarian stimulation (COS) with recombinant follicle stimulating hormone (rFSH) (50-150 IU/d). All patients were submitted upto three cycles of IUI. Primary outcome was the ability of AMH levels to predict clinical pregnancy at first attempt and the cumulative clinical pregnancy probability of upto three IUI cycles. Secondary outcomes were the relation of AMH, LH, FSH, BMI, age, parity and basic estradiol levels with each other and the outcome of IUI. The area under the receiver operating characteristic (ROC) curve in predicting clinical pregnancy for AMH at first attempt was 0.53 and for cumulative clinical pregnancy was 0.76. AMH levels were positively correlated with clinical pregnancy rate at first attempt and with cumulative clinical pregnancy rate, but negatively correlated with patient's age and FSH levels. Patient's FSH, LH levels were negatively correlated with cumulative clinical pregnancy rate. AMH levels seem to have a positive correlation and patient's age and LH levels had a negative correlation with the outcome of IUI and COS with gonadotropins. AMH concentration was significantly higher and LH was significantly lower in patients with a clinical pregnancy after three cycles of IUI treatment compared with those who did not achieve pregnancy.

  10. Effect of endometrial biopsy on intrauterine insemination outcome in controlled ovarian stimulation cycle.

    Science.gov (United States)

    Wadhwa, Leena; Pritam, Amrita; Gupta, Taru; Gupta, Sangeeta; Arora, Sarika; Chandoke, Rajkumar

    2015-01-01

    The objective was to evaluate the effect of endometrial biopsy (EB) on intrauterine insemination (IUI) outcome in controlled ovarian stimulation (COS) cycle. Prospective randomized control study. Tertiary care center. A total of 251 subjects were enrolled in the study. Subjects undergoing COS with IUI were randomly allocated into three groups. Group A: EB was taken between D19 and 24 of the spontaneous menstrual cycles that precedes the fertility treatment and IUI, which was done in next cycle (n = 86). Group B: EB was taken before D6 of the menstrual cycle, and fertility treatment and IUI was done in the same cycle (n = 90). Group C: (control group) no EB in previous 3 cycle (n = 75). Clinical pregnancy rate (CPR). Clinical pregnancy rate was 19.77%, 31.11%, and 9.3% for Group A, Group B, and Group C, respectively. The results show a highly significant value for the paired t-test of intervention Group B and control Group C of the cases (P = 0.000957). CPR was maximum after first cycle of ovulation induction and IUI following EB scratch in both Groups A and in Group B (P Endometrial biopsy done in early follicular phase in the same cycle of stimulation with IUI gives better CPR as compared with EB done in the luteal phase of the previous cycle.

  11. The effect of endometrial scratch injury on pregnancy outcome in women with previous intrauterine insemination failure: A randomized clinical trial.

    Science.gov (United States)

    Ashrafi, Mahnaz; Tehraninejad, Ensieh Shahrokh; Haghiri, Mansooreh; Masomi, Masoumeh; Sadatmahalleh, Shahideh Jahanian; Arabipoor, Arezoo

    2017-09-01

    Endometrial scratch injury (ESI) has been recently proposed to enhance the implantation rate in assisted reproductive technology cycles. The present study was conducted to determine the effect of ESI on pregnancy rate in women with intrauterine insemination (IUI) failure. This prospective randomized controlled study was carried out in Imam-Khomeini Hospital and Royan Institute, Tehran, during a 12-month period from January 2013 to January 2014. After assessment, 169 patients who had IUI failure twice or more (no chemical or clinical pregnancy) with normal uterine anatomy and hysterosalpingography, were enrolled. They were randomly assigned into two groups. In the experimental group, all patients underwent ESI at day 8 or 9 of stimulation phase in the present IUI cycle, whereas no intervention was performed on the control group. IUI outcome was then compared between the two groups. A total of 150 patients completed the IUI cycle during the study. The chemical pregnancy rate was 10.7% and 2.7% in the experimental and control groups, respectively, without significant difference (P = 0.09). Also no significant differences were detected in terms of clinical pregnancy and miscarriage rates between the two groups (P > 0.05). No significant beneficial effect of ESI on fertility outcome in patients with repeated IUI failure was detected when it was carried out on day 8 or 9 of the same IUI stimulation cycle. Also, however, no negative impact secondary to ESI was observed. Therefore, confirmation or refutation of this hypothesis requires further studies with a larger sample size. IRCT201507271141N19. © 2017 Japan Society of Obstetrics and Gynecology.

  12. Endometrial scratch injury before intrauterine insemination: is it time to re-evaluate its value? Evidence from a systematic review and meta-analysis of randomized controlled trials.

    Science.gov (United States)

    Vitagliano, Amerigo; Noventa, Marco; Saccone, Gabriele; Gizzo, Salvatore; Vitale, Salvatore Giovannni; Laganà, Antonio Simone; Litta, Pietro Salvatore; Saccardi, Carlo; Nardelli, Giovanni Battista; Di Spiezio Sardo, Attilio

    2018-01-01

    To assess the impact of endometrial scratch injury (ESI) on the outcomes of intrauterine insemination (IUI) stimulated cycles. Systematic review and meta-analysis. Not applicable. Infertile women undergoing one or more IUI stimulated cycles. Randomized controlled trials (RCTs) were identified by searching electronic databases. We included RCTs comparing ESI (i.e., intervention group) during the course of IUI stimulated cycle (C-ESI) or during the menstrual cycle preceding IUI treatment (P-ESI) with controls (no endometrial scratch). The summary measures were reported as odds ratio (OR) with 95% confidence-interval (CI). Clinical pregnancy rate, ongoing pregnancy rate, multiple pregnancy rate, ectopic pregnancy rate, miscarriage rate. Eight trials were included in the meta-analysis, comprising a total of 1,871 IUI cycles. Endometrial scratch injury was associated with a higher clinical pregnancy rate (OR 2.27) and ongoing pregnancy rate (OR 2.04) in comparison with the controls. No higher risk of multiple pregnancy (OR 1.09), miscarriage (OR 0.80), or ectopic pregnancy (OR 0.82) was observed in patients receiving ESI. Subgroup analysis based on ESI timing showed higher clinical pregnancy rate (OR 2.57) and ongoing pregnancy rate (OR 2.27) in patients receiving C-ESI and no advantage in patients receiving P-ESI. Available data suggest that ESI performed once, preferably during the follicular phase of the same cycle of IUI with flexible aspiration catheters, may improve clinical pregnancy and ongoing pregnancy rates in IUI cycles. Endometrial scratch injury does not appear to increase the risk of multiple pregnancy, miscarriage, or ectopic pregnancy. Copyright © 2017 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  13. Radon in large buildings: The development of a protocol

    International Nuclear Information System (INIS)

    Wilson, D.L.; Dudney, C.S.; Gammage, R.B.

    1993-01-01

    Over the past several years, considerable research has been devoted by the US Environmental Protection Agency (USEPA) and others to develop radon sampling protocols for single family residences and schools. However, very little research has been performed on measuring radon in the work place. To evaluate possible sampling protocols, 833 buildings throughout the United States were selected for extensive radon testing. The buildings tested (warehouses, production plants and office buildings) were representative of commercial buildings across the country both in design, size and use. Based on the results, preliminary radon sampling protocols for the work place have been developed

  14. Quantum private comparison with d-level single-particle states

    International Nuclear Information System (INIS)

    Yu, Chao-Hua; Guo, Gong-De; Lin, Song

    2013-01-01

    In this paper, a quantum private comparison protocol with d-level single-particle states is proposed. In the protocol, a semi-honest third party is introduced to help two participants compare the size relationship of their secrets without revealing them to any other people. It is shown that the protocol is secure in theory. Moreover, the security of the protocol in real circumstance is also discussed. (paper)

  15. Minimal computational-space implementation of multiround quantum protocols

    International Nuclear Information System (INIS)

    Bisio, Alessandro; D'Ariano, Giacomo Mauro; Perinotti, Paolo; Chiribella, Giulio

    2011-01-01

    A single-party strategy in a multiround quantum protocol can be implemented by sequential networks of quantum operations connected by internal memories. Here, we provide an efficient realization in terms of computational-space resources.

  16. Single-step affinity purification for fungal proteomics.

    Science.gov (United States)

    Liu, Hui-Lin; Osmani, Aysha H; Ukil, Leena; Son, Sunghun; Markossian, Sarine; Shen, Kuo-Fang; Govindaraghavan, Meera; Varadaraj, Archana; Hashmi, Shahr B; De Souza, Colin P; Osmani, Stephen A

    2010-05-01

    A single-step protein affinity purification protocol using Aspergillus nidulans is described. Detailed protocols for cell breakage, affinity purification, and depending on the application, methods for protein release from affinity beads are provided. Examples defining the utility of the approaches, which should be widely applicable, are included.

  17. Seqüência de Robin: protocolo único de tratamento Robin sequence: a single treatment protocol

    Directory of Open Access Journals (Sweden)

    Ilza L. Marques

    2005-02-01

    Full Text Available OBJETIVO: Apresentar protocolo único que possa atender tanto às dificuldades respiratórias como às dificuldades alimentares dos neonatos e lactentes com seqüência de Robin. FONTE DE DADOS: O artigo foi desenvolvido tomando como base as publicações mais recentes disponíveis em bancos de dados bibliográficos e livros que discutem o tratamento da seqüência de Robin, em especial os estudos realizados no Hospital de Reabilitação de Anomalias Craniofaciais da Universidade de São Paulo (HRAC/USP. SÍNTESE DE DADOS: O artigo apresenta os aspectos morfológicos e genéticos da seqüência de Robin e conceitos sobre nasofaringoscopia e suas implicações clínicas, discute o tratamento das dificuldades respiratórias e alimentares e apresenta um protocolo único para atender a todos os casos de seqüência de Robin, independentemente de sua gravidade e complexidade. CONCLUSÕES: A seqüência de Robin não é somente uma patologia obstrutiva anatômica para ser resolvida com procedimentos cirúrgicos, mas os conhecimentos sobre crescimento e desenvolvimento devem ser aplicados por uma equipe multidisciplinar, porque possibilitam a rápida recuperação da permeabilidade das vias aéreas e da capacidade de alimentação oral, evitando-se, muitas vezes, os procedimentos cirúrgicos e seus riscos, principalmente quando realizados em neonatos e lactentes pequenos.OBJECTIVE: To present a single protocol that might cover both the respiratory and feeding difficulties of neonates and infants with Robin sequence. SOURCES OF DATA: The article was prepared on the basis of the most recent publications available in bibliographic databases and in books that discuss the treatment of Robin sequence, especially the studies conducted at the Hospital for Rehabilitation of Craniofacial Anomalies of Universidade de São Paulo (HRAC/USP. SUMMARY OF THE FINDINGS: We present the morphological and genetic aspects of Robin sequence and concepts about

  18. Implementation of an office-based semen preparation method (SEP ...

    African Journals Online (AJOL)

    Implementation of an office-based semen preparation method (SEP-D Kit) for intra-uterine insemination (IUI): A controlled randomised study to compare the IUI pregnancy outcome between a routine (swim-up) and the SEP-D Kit method.

  19. Practical single-photon-assisted remote state preparation with non-maximally entanglement

    Science.gov (United States)

    Wang, Dong; Huang, Ai-Jun; Sun, Wen-Yang; Shi, Jia-Dong; Ye, Liu

    2016-08-01

    Remote state preparation (RSP) and joint remote state preparation (JRSP) protocols for single-photon states are investigated via linear optical elements with partially entangled states. In our scheme, by choosing two-mode instances from a polarizing beam splitter, only the sender in the communication protocol needs to prepare an ancillary single-photon and operate the entanglement preparation process in order to retrieve an arbitrary single-photon state from a photon pair in partially entangled state. In the case of JRSP, i.e., a canonical model of RSP with multi-party, we consider that the information of the desired state is split into many subsets and in prior maintained by spatially separate parties. Specifically, with the assistance of a single-photon state and a three-photon entangled state, it turns out that an arbitrary single-photon state can be jointly and remotely prepared with certain probability, which is characterized by the coefficients of both the employed entangled state and the target state. Remarkably, our protocol is readily to extend to the case for RSP and JRSP of mixed states with the all optical means. Therefore, our protocol is promising for communicating among optics-based multi-node quantum networks.

  20. Effect of endometrial biopsy on intrauterine insemination outcome in controlled ovarian stimulation cycle

    Directory of Open Access Journals (Sweden)

    Leena Wadhwa

    2015-01-01

    Full Text Available OBJECTIVE: The objective was to evaluate the effect of endometrial biopsy (EB on intrauterine insemination (IUI outcome in controlled ovarian stimulation (COS cycle. DESIGN: Prospective randomized control study. SETTING: Tertiary care center. MATERIALS AND METHODS: A total of 251 subjects were enrolled in the study. Subjects undergoing COS with IUI were randomly allocated into three groups. Group A: EB was taken between D19 and 24 of the spontaneous menstrual cycles that precedes the fertility treatment and IUI, which was done in next cycle (n = 86. Group B: EB was taken before D6 of the menstrual cycle, and fertility treatment and IUI was done in the same cycle (n = 90. Group C: (control group no EB in previous 3 cycle (n = 75. MAIN OUTCOME MEASURE: Clinical pregnancy rate (CPR. RESULTS: Clinical pregnancy rate was 19.77%, 31.11%, and 9.3% for Group A, Group B, and Group C, respectively. The results show a highly significant value for the paired t-test of intervention Group B and control Group C of the cases (P = 0.000957. CPR was maximum afterfirst cycle of ovulation induction and IUI following EB scratch in both Groups A and in Group B (P < 0.001. CONCLUSIONS: Endometrial biopsy done in early follicular phase in the same cycle of stimulation with IUI gives better CPR as compared with EB done in the luteal phase of the previous cycle.

  1. Advanced CUBIC protocols for whole-brain and whole-body clearing and imaging.

    Science.gov (United States)

    Susaki, Etsuo A; Tainaka, Kazuki; Perrin, Dimitri; Yukinaga, Hiroko; Kuno, Akihiro; Ueda, Hiroki R

    2015-11-01

    Here we describe a protocol for advanced CUBIC (Clear, Unobstructed Brain/Body Imaging Cocktails and Computational analysis). The CUBIC protocol enables simple and efficient organ clearing, rapid imaging by light-sheet microscopy and quantitative imaging analysis of multiple samples. The organ or body is cleared by immersion for 1-14 d, with the exact time required dependent on the sample type and the experimental purposes. A single imaging set can be completed in 30-60 min. Image processing and analysis can take whole-brain neural activities at single-cell resolution using Arc-dVenus transgenic (Tg) mice. CUBIC informatics calculated the Venus signal subtraction, comparing different brains at a whole-organ scale. These protocols provide a platform for organism-level systems biology by comprehensively detecting cells in a whole organ or body.

  2. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  3. Device-independent randomness amplification with a single device

    International Nuclear Information System (INIS)

    Plesch, Martin; Pivoluska, Matej

    2014-01-01

    Expansion and amplification of weak randomness with untrusted quantum devices has recently become a very fruitful topic of research. Here we contribute with a procedure for amplifying a single weak random source using tri-partite GHZ-type entangled states. If the quality of the source reaches a fixed threshold R=log 2 ⁡(10), perfect random bits can be produced. This technique can be used to extract randomness from sources that can't be extracted neither classically, nor by existing procedures developed for Santha–Vazirani sources. Our protocol works with a single fault-free device decomposable into three non-communicating parts, that is repeatedly reused throughout the amplification process. - Highlights: • We propose a protocol for device independent randomness amplification. • Our protocol repeatedly re-uses a single device decomposable into three parts. • Weak random sources with min-entropy rate greater than 1/4 log 2 ⁡(10) can be amplified. • Security against all-quantum adversaries is achieved

  4. Performance of the postwash total motile sperm count as a predictor of pregnancy at the time of intrauterine insemination: a meta-analysis

    NARCIS (Netherlands)

    van Weert, Janne-Meije; Repping, Sjoerd; van Voorhis, Bradley J.; van der Veen, Fulco; Bossuyt, Patrick M. M.; Mol, Ben W. J.

    2004-01-01

    Objective: To assess the performance and clinical value of the postwash total motile sperm count (postwash TMC) as a test to predict intrauterine insemination (IUI) outcome. Design: Meta-analysis of diagnostic tests. Setting: Tertiary fertility center. Patient(s): Patients undergoing IUI.

  5. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  6. Dosimetric evaluation of cone beam computed tomography scanning protocols

    International Nuclear Information System (INIS)

    Soares, Maria Rosangela

    2015-01-01

    It was evaluated the cone beam computed tomography, CBCT scanning protocols, that was introduced in dental radiology at the end of the 1990's, and quickly became a fundamental examination for various procedures. Its main characteristic, the difference of medical CT is the beam shape. This study aimed to calculate the absorbed dose in eight tissues / organs of the head and neck, and to estimate the effective dose in 13 protocols and two techniques (stitched FOV e single FOV) of 5 equipment of different manufacturers of cone beam CT. For that purpose, a female anthropomorphic phantom was used, representing a default woman, in which were inserted thermoluminescent dosimeters at several points, representing organs / tissues with weighting values presented in the standard ICRP 103. The results were evaluated by comparing the dose according to the purpose of the tomographic image. Among the results, there is a difference up to 325% in the effective dose in relation to protocols with the same image goal. In relation to the image acquisition technique, the stitched FOV technique resulted in an effective dose of 5.3 times greater than the single FOV technique for protocols with the same image goal. In the individual contribution, the salivary glands are responsible for 31% of the effective dose in CT exams. The remaining tissues have also a significant contribution, 36%. The results drew attention to the need of estimating the effective dose in different equipment and protocols of the market, besides the knowledge of the radiation parameters and equipment manufacturing engineering to obtain the image. (author)

  7. Protecting single-photon entanglement with practical entanglement source

    Science.gov (United States)

    Zhou, Lan; Ou-Yang, Yang; Wang, Lei; Sheng, Yu-Bo

    2017-06-01

    Single-photon entanglement (SPE) is important for quantum communication and quantum information processing. However, SPE is sensitive to photon loss. In this paper, we discuss a linear optical amplification protocol for protecting SPE. Different from the previous protocols, we exploit the practical spontaneous parametric down-conversion (SPDC) source to realize the amplification, for the ideal entanglement source is unavailable in current quantum technology. Moreover, we prove that the amplification using the entanglement generated from SPDC source as auxiliary is better than the amplification assisted with single photons. The reason is that the vacuum state from SPDC source will not affect the amplification, so that it can be eliminated automatically. This protocol may be useful in future long-distance quantum communications.

  8. Outcomes of Optimized over Standard Protocol of Rabbit Antithymocyte Globulin for Severe Aplastic Anemia: A Single-Center Experience

    Science.gov (United States)

    Ge, Meili; Shao, Yingqi; Huang, Jinbo; Huang, Zhendong; Zhang, Jing; Nie, Neng; Zheng, Yizhou

    2013-01-01

    Background Previous reports showed that outcome of rabbit antithymocyte globulin (rATG) was not satisfactory as the first-line therapy for severe aplastic anemia (SAA). We explored a modifying schedule of administration of rATG. Design and Methods Outcomes of a cohort of 175 SAA patients, including 51 patients administered with standard protocol (3.55 mg/kg/d for 5 days) and 124 cases with optimized protocol (1.97 mg/kg/d for 9 days) of rATG plus cyclosporine (CSA), were analyzed retrospectively. Results Of all 175 patients, response rates at 3 and 6 months were 36.6% and 56.0%, respectively. 51 cases received standard protocol had poor responses at 3 (25.5%) and 6 months (41.2%). However, 124 patients received optimized protocol had better responses at 3 (41.1%, P = 0.14) and 6 (62.1%, P = 0.01). Higher incidences of infection (57.1% versus 37.9%, P = 0.02) and early mortality (17.9% versus 0.8%, P<0.001) occurred in patients received standard protocol compared with optimized protocol. The 5-year overall survival in favor of the optimized over standard rATG protocol (76.0% versus. 50.3%, P<0.001) was observed. By multivariate analysis, optimized protocol (RR = 2.21, P = 0.04), response at 3 months (RR = 10.31, P = 0.03) and shorter interval (<23 days) between diagnosis and initial dose of rATG (RR = 5.35, P = 0.002) were independent favorable predictors of overall survival. Conclusions Optimized instead of standard rATG protocol in combination with CSA remained efficacious as a first-line immunosuppressive regimen for SAA. PMID:23554855

  9. Generation of an arbitrary concatenated Greenberger-Horne-Zeilinger state with single photons

    Science.gov (United States)

    Chen, Shan-Shan; Zhou, Lan; Sheng, Yu-Bo

    2017-02-01

    The concatenated Greenberger-Horne-Zeilinger (C-GHZ) state is a new kind of logic-qubit entangled state, which may have extensive applications in future quantum communication. In this letter, we propose a protocol for constructing an arbitrary C-GHZ state with single photons. We exploit the cross-Kerr nonlinearity for this purpose. This protocol has some advantages over previous protocols. First, it only requires two kinds of cross-Kerr nonlinearities to generate single phase shifts  ±θ. Second, it is not necessary to use sophisticated m-photon Toffoli gates. Third, this protocol is deterministic and can be used to generate an arbitrary C-GHZ state. This protocol may be useful in future quantum information processing based on the C-GHZ state.

  10. Low-dose single acquisition rest {sup 99m}Tc/stress {sup 201}Tl myocardial perfusion SPECT protocol: phantom studies and clinical validation

    Energy Technology Data Exchange (ETDEWEB)

    Dey, Thomas [RWTH Aachen University, Institute of Imaging and Computer Vision, Aachen (Germany); Backus, Barbra E.; Romijn, R.Leo [St. Antonius Hospital, Department of Nuclear Medicine, Nieuwegein (Netherlands); Wieczorek, Herfried [Philips Research, Eindhoven (Netherlands); Verzijlbergen, J.F. [St. Antonius Hospital, Department of Nuclear Medicine, Nieuwegein (Netherlands); Erasmus Medical Center, Department of Nuclear Medicine, Rotterdam (Netherlands)

    2014-03-15

    We developed and tested a single acquisition rest {sup 99m}Tc-sestamibi/stress {sup 201}Tl dual isotope protocol (SDI) with the intention of improving the clinical workflow and patient comfort of myocardial perfusion single photon emission computed tomography (SPECT). The technical feasibility of SDI was evaluated by a series of anthropomorphic phantom studies on a standard SPECT camera. The attenuation map was created by a moving transmission line source. Iterative reconstruction including attenuation correction, resolution recovery and Monte Carlo simulation of scatter was used for simultaneous reconstruction of dual tracer distribution. For clinical evaluation, patient studies were compared to stress {sup 99m}Tc and rest {sup 99m}Tc reference images acquired in a 2-day protocol. Clinical follow-up examinations like coronary angiography (CAG) and fractional flow reserve (FFR) were included in the assessment if available. Phantom studies demonstrated the technical feasibility of SDI. Artificial lesions inserted in the phantom mimicking ischaemia could be clearly identified. In 51/53 patients, the image quality was adequate for clinical evaluation. For the remaining two obese patients with body mass index > 32 the injected {sup 201}Tl dose of 74 MBq was insufficient for clinical assessment. In answer to this the {sup 201}Tl dose was adapted for obese patients in the rest of the study. In 31 patients, SDI and {sup 99m}Tc reference images resulted in equivalent clinical assessment. Significant differences were found in 20 patients. In 18 of these 20 patients additional examinations were available. In 15 patients the diagnosis based on the SDI images was confirmed by the results of CAG or FFR. In these patients the SDI images were more accurate than the {sup 99m}Tc reference study. In three patients minor ischaemic lesions were detected by SDI but were not confirmed by CAG. In one of these cases this was probably caused by pronounced apical thinning. For two patients

  11. Survey of protocols for the manual segmentation of the hippocampus: preparatory steps towards a joint EADC-ADNI harmonized protocol.

    Science.gov (United States)

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G; de Leon, Mony J; deToledo-Morrell, Leyla; Killiany, Ronald J; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C; Soininen, H; Watson, Craig; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B

    2011-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer's disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols' interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol.

  12. Comparison of pregnancy rates in pre-treatment male infertility and low total motile sperm count at insemination.

    Science.gov (United States)

    Xiao, Cheng Wei; Agbo, Chioma; Dahan, Michael H

    2016-01-01

    In intrauterine insemination (IUI), total motile sperm count (TMSC) is an important predictor of pregnancy. However, the clinical significance of a poor TMSC on the day of IUI in a patient with prior normal semen analysis (SA) is unclear. We performed this study to determine if these patients perform as poorly as those who had male factor infertility diagnosed prior to commencing treatment. 147 males with two abnormal SA based on the 2010 World Health Organization criteria underwent 356 IUI with controlled ovarian hyper-stimulation (COH). Their pregnancy rates were compared to 120 males who had abnormal TMSC at the time of 265 IUI with COH, in a retrospective university-based study. The two groups were comparable in female age (p = 0.11), duration of infertility (p = 0.17), previous pregnancies (p = 0.13), female basal serum FSH level (p = 0.54) and number of mature follicles on the day of ovulation trigger (p = 0.27). Despite better semen parameters on the day of IUI in the pre-treatment male factor infertility group (TMSC mean ± SD: 61 ± 30 million vs. 3.5 ± 2 million, p male factor infertility. More studies should be performed to confirm these findings.

  13. An Hourly Dose-Escalation Desensitization Protocol for Aspirin-Exacerbated Respiratory Disease.

    Science.gov (United States)

    Chen, Justin R; Buchmiller, Brett L; Khan, David A

    2015-01-01

    Aspirin desensitization followed by maintenance therapy effectively improves symptom control in patients with aspirin exacerbated respiratory disease (AERD). The majority of current desensitization protocols use 3-hour dosing intervals and often require 2 to 3 days to complete. We evaluated hourly dose escalations in a subset of patients with chronic rhinosinusitis, nasal polyps, and asthma who historically reacted to aspirin within 1 hour or were avoiding aspirin with the goal of developing a safe and efficient desensitization protocol. Fifty-seven aspirin desensitizations were performed under the hourly protocol. All patients had refractory nasal polyposis as an indication for aspirin desensitization. The clinical characteristics of each subject were analyzed in relation to aspects of his or her reactions during the procedure. Ninety-eight percent of study patients were successfully treated under the hourly protocol, including those with a history of severe reactions and intubation. None required further medication than is available in an outpatient allergy clinic. A total of 96% of reactors recorded a bronchial or naso-ocular reaction within 1 hour of the preceding dose. Of the total patients on this protocol, 40% were able to complete the procedure in a single day, and 60% within 2 days. Patients with AERD who have a history of symptoms less than 1 hour after aspirin exposure can be safely desensitized with a 1-hour dose-escalation protocol that can often be completed in a single day. Copyright © 2015 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  14. The Intolerance of Uncertainty Index: Replication and Extension with an English Sample

    Science.gov (United States)

    Carleton, R. Nicholas; Gosselin, Patrick; Asmundson, Gordon J. G.

    2010-01-01

    Intolerance of uncertainty (IU) is related to anxiety, depression, worry, and anxiety sensitivity. Precedent IU measures were criticized for psychometric instability and redundancy; alternative measures include the novel 45-item measure (Intolerance of Uncertainty Index; IUI). The IUI was developed in French with 2 parts, assessing general…

  15. Diagnosis of pulmonary artery embolism. Comparison of single-source CT and 3rd generation dual-source CT using a dual-energy protocol regarding image quality and radiation dose

    International Nuclear Information System (INIS)

    Petritsch, Bernhard; Kosmala, Aleksander; Gassenmeier, Tobias; Weng, Andreas Max; Veldhoen, Simon; Kunz, Andreas Steven; Bley, Thorsten Alexander

    2017-01-01

    To compare radiation dose, subjective and objective image quality of 3 rd generation dual-source CT (DSCT) and dual-energy CT (DECT) with conventional 64-slice single-source CT (SSCT) for pulmonary CTA. 180 pulmonary CTA studies were performed in three patient cohorts of 60 patients each. Group 1: conventional SSCT 120 kV (ref.); group 2: single-energy DSCT 100 kV (ref.); group 3: DECT 90/Sn150 kV. CTDIvol, DLP, effective radiation dose were reported, and CT attenuation (HU) was measured on three central and peripheral levels. The signal-to-noise-ratio (SNR) and contrast-to-noise-ratio (CNR) were calculated. Two readers assessed subjective image quality according to a five-point scale. Mean CTDIvol and DLP were significantly lower in the dual-energy group compared to the SSCT group (p < 0.001 [CTDIvol]; p < 0.001 [DLP]) and the DSCT group (p = 0.003 [CTDIvol]; p = 0.003 [DLP]), respectively. The effective dose in the DECT group was 2.79 ± 0.95 mSv and significantly smaller than in the SSCT group (4.60 ± 1.68 mSv, p < 0.001) and the DSCT group (4.24 ± 2.69 mSv, p = 0.003). The SNR and CNR were significantly higher in the DSCT group (p < 0.001). Subjective image quality did not differ significantly among the three protocols and was rated good to excellent in 75 % (135/180) of cases with an inter-observer agreement of 80 %. Dual-energy pulmonary CTA protocols of 3 rd generation dual-source scanners allow for significant reduction of radiation dose while providing excellent image quality and potential additional information by means of perfusion maps. Dual-energy CT with 90/Sn150 kV configuration allows for significant dose reduction in pulmonary CTA. Subjective image quality was similar among the three evaluated CT-protocols (64-slice SSCT, single-energy DSCT, 90/Sn150 kV DECT) and was rated good to excellent in 75% of cases. Dual-energy CT provides potential additional information by means of iodine distribution maps.

  16. Single-Step Affinity Purification for Fungal Proteomics ▿ †

    OpenAIRE

    Liu, Hui-Lin; Osmani, Aysha H.; Ukil, Leena; Son, Sunghun; Markossian, Sarine; Shen, Kuo-Fang; Govindaraghavan, Meera; Varadaraj, Archana; Hashmi, Shahr B.; De Souza, Colin P.; Osmani, Stephen A.

    2010-01-01

    A single-step protein affinity purification protocol using Aspergillus nidulans is described. Detailed protocols for cell breakage, affinity purification, and depending on the application, methods for protein release from affinity beads are provided. Examples defining the utility of the approaches, which should be widely applicable, are included.

  17. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  18. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  19. Protocol for a single-centre, randomised controlled study of a preoperative rehabilitation bundle in the frail and elderly undergoing abdominal surgery.

    Science.gov (United States)

    Abdullah, Hairil Rizal; Lien, Victoria Peixin; Ong, Hwee Kuan; Er, Pei Ling; Hao, Ying; Khan, Shariq Ali; Liu, Christopher Weiyang

    2017-08-04

    Frail patients have decreased physiological reserves and consequently, they are unable to recover as quickly from surgery. Frailty, as an entity, is a risk factor of increased morbidity and mortality. It is also associated with a longer time to discharge. This trial is undertaken to determine if a novel prehabilitation protocol (10-day bundle of interventions-physiotherapy, nutritional supplementation and cognitive training) can reduce the postoperative length of stay of frail patients who are undergoing elective abdominal surgery, compared with standard care. This is a prospective, single-centre, randomised controlled trial with two parallel arms. 62 patients who are frail and undergoing elective abdominal surgery will be recruited and randomised to receive either a novel prehabilitation protocol or standard care. Participants will receive telephone reminders preoperatively to encourage protocol compliance. Data will be collected for up to 30 days postoperatively. The primary outcome of the trial will be the postoperative length of stay and the secondary outcomes are the postoperative complications and functional recovery during the hospital admission. This study has been approved by the Singapore General Hospital Institutional Review Board (CIRB Ref: 2016/2584). The study is also listed on ClinicalTrials.gov (Trial number: NCT02921932). All participants will sign an informed consent form before randomisation and translators will be made available to non-English speaking patients. The results of this study will be published in peer-reviewed journals as well as national and international conferences. The data collected will also be made available in a public data repository. NCT02921932 (ClinicalTrials.gov). © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  20. Pituitary block with gonadotrophin-releasing hormone antagonist during intrauterine insemination cycles: a systematic review and meta-analysis of randomised controlled trials.

    Science.gov (United States)

    Vitagliano, A; Saccone, G; Noventa, M; Borini, A; Coccia, M E; Nardelli, G B; Saccardi, C; Bifulco, G; Litta, P S; Andrisani, A

    2018-06-03

    Several randomised controlled trials (RCTs) have investigated the usefulness of pituitary block with gonadotrophin-releasing hormone (GnRH) antagonists during intrauterine insemination (IUI) cycles, with conflicting results. The aim of the present systematic review and meta-analysis of RCTs was to evaluate the effectiveness of GnRH antagonist administration as an intervention to improve the success of IUI cycles. Electronic databases (MEDLINE, Scopus, EMBASE, Sciencedirect) and clinical registers were searched from their inception until October 2017. Randomised controlled trials of infertile women undergoing one or more IUI stimulated cycles with GnRH antagonists compared with a control group. The primary outcomes were ongoing pregnancy/live birth rate (OPR/LBR) and clinical pregnancy rate (CPR). Pooled results were expressed as odds ratio (OR) or mean differences with 95% confidence interval (95% CI). Sources of heterogeneity were investigated through sensitivity and subgroups analysis. The body of evidence was rated using GRADE methodology. Publication bias was assessed with funnel plot, Begg's and Egger's tests. Fifteen RCTs were included (3253 IUI cycles, 2345 participants). No differences in OPR/LBR (OR 1.14, 95% CI 0.82-1.57, P = 0.44) and CPR (OR 1.28, 95% CI 0.97-1.69, P = 0.08) were found. Sensitivity and subgroup analyses did not provide statistical changes in pooled results. The body of evidence was rated as low (GRADE 2/4). No publication bias was detected. Pituitary block with GnRH antagonists does not improve OPR/LBR and CPR in women undergoing IUI cycles. Pituitary block with GnRH antagonists does not improve the success of IUI cycles. © 2018 Royal College of Obstetricians and Gynaecologists.

  1. Hybrid quantum repeater protocol with fast local processing

    DEFF Research Database (Denmark)

    Borregaard, Johannes; Brask, Jonatan Bohr; Sørensen, Anders Søndberg

    2012-01-01

    -photon states are produced and grown into superpositions of coherent states, known as two-mode cat states. The entanglement is then distributed using homodyne detection. To improve the protocol, we replace the time-consuming nonlocal growth of cat states with local growth of single-mode cat states, eliminating...

  2. Endoleak detection using single-acquisition split-bolus dual-energy computer tomography (DECT)

    Energy Technology Data Exchange (ETDEWEB)

    Javor, D.; Wressnegger, A.; Unterhumer, S.; Kollndorfer, K.; Nolz, R.; Beitzke, D.; Loewe, C. [Medical University of Vienna, Department of Biomedical Imaging and Image-guided Therapy, Vienna (Austria)

    2017-04-15

    To assess a single-phase, dual-energy computed tomography (DECT) with a split-bolus technique and reconstruction of virtual non-enhanced images for the detection of endoleaks after endovascular aneurysm repair (EVAR). Fifty patients referred for routine follow-up post-EVAR CT and a history of at least one post-EVAR follow-up CT examination using our standard biphasic (arterial and venous phase) routine protocol (which was used as the reference standard) were included in this prospective trial. An in-patient comparison and an analysis of the split-bolus protocol and the previously used double-phase protocol were performed with regard to differences in diagnostic accuracy, radiation dose, and image quality. The analysis showed a significant reduction of radiation dose of up to 42 %, using the single-acquisition split-bolus protocol, while maintaining a comparable diagnostic accuracy (primary endoleak detection rate of 96 %). Image quality between the two protocols was comparable and only slightly inferior for the split-bolus scan (2.5 vs. 2.4). Using the single-acquisition, split-bolus approach allows for a significant dose reduction while maintaining high image quality, resulting in effective endoleak identification. (orig.)

  3. Contribution of semen trait selection, artificial insemination technique, and semen dose to the profitability of pig production systems: A simulation study.

    Science.gov (United States)

    Gonzalez-Pena, Dianelys; Knox, Robert V; Rodriguez-Zas, Sandra L

    2016-01-15

    The economic impact of selection for semen traits on pig production systems and potential interaction with artificial insemination (AI) technique and semen dose remains partially understood. The objectives of this study were to compare the financial indicators (gross return, net profit, cost) in a three-tier pig production system under one of two selection strategies: a traditional strategy including nine paternal and maternal traits (S9) and an advanced strategy that adds four semen traits (S13). Maternal traits included the number of pigs born alive, litter birth weight, adjusted 21-day litter weight, and the number of pigs at 21 days, and paternal traits included days to 113.5 kg, back fat, average daily gain, feed efficiency, and carcass lean percentage. The four semen traits included volume, concentration, progressive motility of spermatozoa, and abnormal spermatozoa. Simultaneously, the impact of two AI techniques and a range of fresh refrigerated semen doses including cervical AI with 3 × 10(9) (CAI3) and 2 × 10(9) (CAI2) sperm cells/dose, and intrauterine AI with 1.5 × 10(9) (IUI1.5), 0.75 × 10(9) (IUI0.75), and 0.5 × 10(9) (IUI0.5) sperm cells/dose were evaluated. These factors were also evaluated using a range of farrowing rates (60%-90%), litter sizes (8-14 live-born pigs), and a selected semen collection frequency. The financial impact of the factors was assessed through simulation of a three-way crossbreeding system (maternal nucleus lines A and B and paternal nucleus line C) using ZPLAN. The highest return on investment (profit/cost) of boars was observed at 2.33 collections/wk (three periods of 24 hours between collections). Under this schedule, a significant (P profit. The highest gross return was obtained under S13 with IUI0.75 and IUI0.5. The net profit of S13 was 34.37% higher than the traditional S9 (P profit favored IUI0.5 with relative differences of 4.13%, 2.41%, 1.72%, and 0.43% compared to CAI3, CAI2, IUI1.5, and IUI0

  4. Distributed Processing Using Single-chip Microcomputers

    National Research Council Canada - National Science Library

    Pritchett, William

    1996-01-01

    This project investigates the use of single-chip microprocessors as nodes in a token ring control network and explores the implementation of a protocol to manage communication across such a network...

  5. Author Details

    African Journals Online (AJOL)

    Implementation of an office-based semen preparation method (SEP-D Kit) for intra-uterine insemination (IUI): A controlled randomised study to compare the IUI pregnancy outcome between a routine (swim-up) and the SEP-D Kit method. Abstract PDF · Vol 18, No 3 (2012) - Articles Laparoscopic Strassman's metroplasty for ...

  6. Diagnosis of pulmonary artery embolism. Comparison of single-source CT and 3{sup rd} generation dual-source CT using a dual-energy protocol regarding image quality and radiation dose

    Energy Technology Data Exchange (ETDEWEB)

    Petritsch, Bernhard; Kosmala, Aleksander; Gassenmeier, Tobias; Weng, Andreas Max; Veldhoen, Simon; Kunz, Andreas Steven; Bley, Thorsten Alexander [Univ. Hospital Wuerzburg (Germany). Inst. of Diagnostic and Interventional Radiology

    2017-06-15

    To compare radiation dose, subjective and objective image quality of 3 rd generation dual-source CT (DSCT) and dual-energy CT (DECT) with conventional 64-slice single-source CT (SSCT) for pulmonary CTA. 180 pulmonary CTA studies were performed in three patient cohorts of 60 patients each. Group 1: conventional SSCT 120 kV (ref.); group 2: single-energy DSCT 100 kV (ref.); group 3: DECT 90/Sn150 kV. CTDIvol, DLP, effective radiation dose were reported, and CT attenuation (HU) was measured on three central and peripheral levels. The signal-to-noise-ratio (SNR) and contrast-to-noise-ratio (CNR) were calculated. Two readers assessed subjective image quality according to a five-point scale. Mean CTDIvol and DLP were significantly lower in the dual-energy group compared to the SSCT group (p < 0.001 [CTDIvol]; p < 0.001 [DLP]) and the DSCT group (p = 0.003 [CTDIvol]; p = 0.003 [DLP]), respectively. The effective dose in the DECT group was 2.79 ± 0.95 mSv and significantly smaller than in the SSCT group (4.60 ± 1.68 mSv, p < 0.001) and the DSCT group (4.24 ± 2.69 mSv, p = 0.003). The SNR and CNR were significantly higher in the DSCT group (p < 0.001). Subjective image quality did not differ significantly among the three protocols and was rated good to excellent in 75 % (135/180) of cases with an inter-observer agreement of 80 %. Dual-energy pulmonary CTA protocols of 3 rd generation dual-source scanners allow for significant reduction of radiation dose while providing excellent image quality and potential additional information by means of perfusion maps. Dual-energy CT with 90/Sn150 kV configuration allows for significant dose reduction in pulmonary CTA. Subjective image quality was similar among the three evaluated CT-protocols (64-slice SSCT, single-energy DSCT, 90/Sn150 kV DECT) and was rated good to excellent in 75% of cases. Dual-energy CT provides potential additional information by means of iodine distribution maps.

  7. Scaling HEP to Web size with RESTful protocols: The frontier example

    International Nuclear Information System (INIS)

    Dykstra, Dave

    2011-01-01

    The World-Wide-Web has scaled to an enormous size. The largest single contributor to its scalability is the HTTP protocol, particularly when used in conformity to REST (REpresentational State Transfer) principles. High Energy Physics (HEP) computing also has to scale to an enormous size, so it makes sense to base much of it on RESTful protocols. Frontier, which reads databases with an HTTP-based RESTful protocol, has successfully scaled to deliver production detector conditions data from both the CMS and ATLAS LHC detectors to hundreds of thousands of computer cores worldwide. Frontier is also able to re-use a large amount of standard software that runs the Web: on the clients, caches, and servers. I discuss the specific ways in which HTTP and REST enable high scalability for Frontier. I also briefly discuss another protocol used in HEP computing that is HTTP-based and RESTful, and another protocol that could benefit from it. My goal is to encourage HEP protocol designers to consider HTTP and REST whenever the same information is needed in many places.

  8. Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2014-07-01

    OSPF (Open Shortest Path First and EIGRP (Enhanced Interior Gateway Routing Protocol are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost and metric compared with the simulation results. The result can be OSPF and EIGRP redistribution process. Value delay redistribution 1% better than OSPF and EIGRP 2-3% under traffic density dependent. In calculating the trace route redistribution is done 2 calculations, the cost for OSPF area and the area of the EIGRP metric. Making primary and alternate paths based on the packet delivery rate and the cost of the smallest metric, it is proved by calculation and simulation. Keywords: OSPF, EIGRP, Redistribution, Delay, Cost, Metric.

  9. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chaojing; Zhang Quan

    2011-01-01

    It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function. (general)

  10. A False-name-Proof Double Auction Protocol for Arbitrary Evaluation Values

    Science.gov (United States)

    Sakurai, Yuko; Yokoo, Makoto

    We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategy-proofness by incorporating the possibility of false-name bids, e.g., bids submitted using multiple e-mail addresses. An existing protocol called TPD protocol is false-name-proof but can handle only the cases where marginal utilities of each agent always decrease, while our new GTPD protocol can handle arbitrary evaluation values. When marginal utilities can increase, some bids cannot be divided into a single unit (e.g., an all-or-nothing bid). Due to the existence of such indivisible bids, meeting supply/demand becomes difficult. Furthermore, a seller/buyer can submit a false-name-bid by pretending to be a potential buyer/seller to manipulate allocations and payments. In the GTPD protocol, the auctioneer is required to absorb the supply-demand imbalance up to a given upper-bound. Also, the GTPD incorporate a new false-name-proof one-sided auction protocol that is guaranteed to sell/buy a certain number of units. Simulation results show that when the threshold price is set appropriately, this protocol can obtain a good social surplus, and the number of absorbed units is much smaller than the given upper-bound.

  11. Two-party secret key distribution via a modified quantum secret sharing protocol.

    Science.gov (United States)

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  12. Guideline adherence is worth the effort: a cost-effectiveness analysis in intrauterine insemination care.

    Science.gov (United States)

    Haagen, E C; Nelen, W L D M; Adang, E M; Grol, R P T M; Hermens, R P M G; Kremer, J A M

    2013-02-01

    Is optimal adherence to guideline recommendations in intrauterine insemination (IUI) care cost-effective from a societal perspective when compared with suboptimal adherence to guideline recommendations? Optimal guideline adherence in IUI care has substantial economic benefits when compared with suboptimal guideline adherence. Fertility guidelines are tools to help health-care professionals, and patients make better decisions about clinically effective, safe and cost-effective care. Up to now, there has been limited published evidence about the association between guideline adherence and cost-effectiveness in fertility care. In a retrospective cohort study involving medical record analysis and a patient survey (n = 415), interviews with staff members (n = 13) and a review of hospitals' financial department reports and literature, data were obtained about patient characteristics, process aspects and clinical outcomes of IUI care and resources consumed. In the cost-effectiveness analyses, restricted to four relevant guideline recommendations, the ongoing pregnancy rate per couple (effectiveness), the average medical and non-medical costs of IUI care, possible additional IVF treatment, pregnancy, delivery and period from birth up to 6 weeks after birth for both mother and offspring per couple (costs) and the incremental net monetary benefits were calculated to investigate if optimal guideline adherence is cost-effective from a societal perspective when compared with suboptimal guideline adherence. Seven hundred and sixty five of 1100 randomly selected infertile couples from the databases of the fertility laboratories of 10 Dutch hospitals, including 1 large university hospital providing tertiary care and 9 public hospitals providing secondary care, were willing to participate, but 350 couples were excluded because of ovulatory disorders or the use of donated spermatozoa (n = 184), still ongoing IUI treatment (n = 143) or no access to their medical records (n = 23). As

  13. Therapeutic Efficacy of Endometrial Scratching in Repeated Controlled Ovarian Stimulation (COS) Failure Cycles

    Science.gov (United States)

    Wadhwa, Leena; Mishra, Mona

    2018-01-01

    Objective: The objective of the study was (1) “to evaluate the therapeutic efficacy of endometrial scratching in repeated controlled ovarian stimulation (COS) failure cycles.” And (2) “to compare differences in pregnancy outcome by endometrial scratching in early (D2–D4) and late follicular phases (D7–D9) of the same stimulation cycle.” Materials and Methods: Women attending infertility clinic in a tertiary care center and who have two or more repeated COS failure cycles and planned for COS with intrauterine insemination (IUI) were included in the study which is a prospective parallel, interventional, single-blinded, randomized control study, in 1:1 allocation ratio. A total of 165 patients were recruited and randomly allocated into three groups: Group A (n = 55) underwent endometrial scratching on D2–D4 of the same COS cycle, Group B (n = 55) on D7–D9, and Group C (n = 55) no intervention done. All the patients underwent COS according to standard protocol followed by IUI. Results: Clinical pregnancy rate was 12.73% (odds ratio [OR] =0.87 95% confidence interval [CI] =0.288–2.55, P = 1), 16.36% (OR = 1.15; 95% CI = 0.40–3.23, P = 1), and 14.54%, respectively, in Group A, B, and C, respectively (P = 0.86), as per intention to treat analysis. Using Chi-square test, P value between Group A and B was 0.787, between Group A and C was 1.000, and between Group B and C was 1.000. As per protocol analysis, clinical pregnancy rate was 13.46% (OR = 0.83; 95% CI = 0.27–2.5, P = 0.74), 19.57% (OR = 1.3 95%; CI = 0.45–3.73, P = 0.41), and 15.69%. Using Chi-square test, Pvalue between Group A and B was 0.588, between Group A and C was 0.967, and between Group B and C was 0.815. No abortions and multiple pregnancies occurred in either of the groups. Conclusion: The effect found was of good quantum in Group B as per protocol analysis which could be of clinical relevance if larger sample size would have been taken. Endometrial scratching is a cost

  14. Gated single-photon emission tomography imaging protocol to evaluate myocardial stunning after exercise

    International Nuclear Information System (INIS)

    Hashimoto, Jun; Kubo, Atsushi; Iwasaki, Ryuichiro; Iwanaga, Shiro; Mitamura, Hideo; Ogawa, Satoshi; Kosuda, Shigeru

    1999-01-01

    This study was designed to apply ECG-gating to stress myocardial perfusion single-photon emission tomography (SPET) for the evaluation of myocardial stunning after exercise. Technetium-99m sestamibi was selected as the perfusion agent and a rest/exercise 1-day protocol was employed. Fourteen patients without coronary stenosis and 33 patients with coronary stenosis were enrolled in the study. We carried out three data acquisitions with ECG-gating: a 15-min data acquisition starting 30 min after the rest injection (AC1), a 5-min acquisition starting 5 min after the stress injection (AC2) and a 15-min acquisition starting 20 min after the stress injection (AC3). Calculation of left ventricular ejection fraction (LVEF) values was performed by means of automatic determination of the endocardial surface for all gating intervals in the cardiac cycle. Measured global EF values in 14 patients without coronary stenosis were 52.3%±7.6% (AC1), 60.6%±8.9% (AC2) and 55.6%±5.6% (AC3), and those in 11 patients with severe ischaemia were 53.6%±8.0% (AC1), 45.6%±12.1% (AC2) and 49.7%±10.7%. The magnitude of the depression of post-stress LVEF relative to the rest LVEF correlated with the severity of ischaemia (r=0.594, P=0.002), and segments manifesting post-stress functional depression were associated with ischaemic segments showing reversible perfusion defects. Stress myocardial perfusion SPET with ECG-gating is a feasible method for the evaluation of myocardial stunning as well as exercise-induced ischaemia. (orig.)

  15. Feasibility of a single-stage tracheostomy decannulation protocol with endoscopy in adult patients.

    Science.gov (United States)

    Cohen, Oded; Tzelnick, Sharon; Lahav, Yonatan; Stavi, Dekel; Shoffel-Havakuk, Hagit; Hain, Moshe; Halperin, Doron; Adi, Nimrod

    2016-09-01

    Gradual decrease in tube size and tube capping are considered the standard of care for tracheostomy decannulation. Both of these actions result in increased airway resistance. Immediate decannulation may offer a more tolerable approach. To assess the feasibility of immediate tracheostomy decannulation compared with the traditional decannulation methods. This study is a single institute, case-control retrospective study of patients between the years 2009 to 2014. The study group included all patients who underwent immediate decannulation, whereas the control group comprised patients who underwent traditional staged decannulation. An immediate decannulation protocol included admission to the intensive care unit, a comprehensive evaluation, decannulation, 24 hours of monitoring, and observation until discharge. Twenty-nine patients were included in the study group and 20 in the control group. No significant statistical difference was found between the two groups in the patients' medical history and tracheostomy data, except for the Acute Physiology and Chronic Health Evaluation II score and duration of the deflated cuff, which were significantly higher in the control group. A significant difference was found in the complication rate between the groups. In the staged decannulation group, four patients failed decannulation and required reinsertion of the tracheostomy cannula, whereas there were no such failures in the immediate decannulation group. Hospitalization duration after decannulation of the study group patients was significantly shorter than that of the control group. Immediate decannulation may offer a safe alternative for weaning from tracheostomy. It may also reduce the duration of the weaning process and hospitalization. 3b Laryngoscope, 126:2057-2062, 2016. © 2015 The American Laryngological, Rhinological and Otological Society, Inc.

  16. A novel diagnostic protocol to identify patients suitable for discharge after a single high-sensitivity troponin

    Science.gov (United States)

    Carlton, Edward W; Cullen, Louise; Than, Martin; Gamble, James; Khattab, Ahmed; Greaves, Kim

    2015-01-01

    Objective To establish whether a novel accelerated diagnostic protocol (ADP) for suspected acute coronary syndrome (ACS) could successfully identify low-risk patients suitable for discharge after a single high-sensitivity troponin T (hs-cTnT) taken at presentation to the emergency department. We also compared the diagnostic accuracy of this ADP with strategies using initial undetectable hs-cTnT. Methods This prospective observational study evaluated the ability of the Triage Rule-out Using high-Sensitivity Troponin (TRUST) ADP to identify low-risk patients with suspected ACS. The ADP incorporated a single presentation hs-cTnT of <14 ng/L, a non-ischaemic ECG and a modified Goldman risk score. Diagnostic performance of the ADP was compared with the detection limit cut-offs of hs-cTnT (<5 ng/L and <3 ng/L). The primary end point was fatal/non-fatal acute myocardial infarction (AMI) within 30 days. Results 960 participants were recruited, mean age 58.0 years, 80 (8.3%) had an AMI. The TRUST ADP classified 382 (39.8%) as low-risk with a sensitivity for identifying AMI of 98.8% (95% CI 92.5% to 99.9%). hs-cTnT detection limits (<5 ng/L and <3 ng/L) had a sensitivity of 100% (94.3 to 100) and 100% (94.4 to 100), respectively. The TRUST ADP identified more patients suitable for early discharge at 39.8% vs 29.3% (<5 ng/L) and 7.9% (<3 ng/L) (p<0.001) with a lower false-positive rate for AMI detection; specificity 43.3% (95% CI 42.7% to 43.4%) vs 32.0% (95% CI 31.5% to 32.0%) and 8.6% (95% CI 8.1% to 8.6%), respectively. Conclusions The TRUST ADP, which incorporates structured risk-assessment and a single presentation hs-cTnT blood draw, has potential to allow early discharge in 40% of patients with suspected ACS and has greater clinical utility than undetectable hs-cTnT strategies. Trial registration number ISRCTN No. 21109279. PMID:25691511

  17. The crustal dynamics intelligent user interface anthology

    Science.gov (United States)

    Short, Nicholas M., Jr.; Campbell, William J.; Roelofs, Larry H.; Wattawa, Scott L.

    1987-01-01

    The National Space Science Data Center (NSSDC) has initiated an Intelligent Data Management (IDM) research effort which has, as one of its components, the development of an Intelligent User Interface (IUI). The intent of the IUI is to develop a friendly and intelligent user interface service based on expert systems and natural language processing technologies. The purpose of such a service is to support the large number of potential scientific and engineering users that have need of space and land-related research and technical data, but have little or no experience in query languages or understanding of the information content or architecture of the databases of interest. This document presents the design concepts, development approach and evaluation of the performance of a prototype IUI system for the Crustal Dynamics Project Database, which was developed using a microcomputer-based expert system tool (M. 1), the natural language query processor THEMIS, and the graphics software system GSS. The IUI design is based on a multiple view representation of a database from both the user and database perspective, with intelligent processes to translate between the views.

  18. Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol

    Directory of Open Access Journals (Sweden)

    Xing Hu

    2017-01-01

    Full Text Available In high diversity node situation, multichannel MAC protocol can improve the frequency efficiency, owing to fewer collisions compared with single-channel MAC protocol. And the performance of cyclic quorum-based multichannel (CQM MAC protocol is outstanding. Based on cyclic quorum system and channel slot allocation, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel-hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF, is proposed. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm. In addition, to improve the performance of CQM protocol in unsaturation situation, a dynamic channel slot allocation of CQM (DCQM protocol is proposed, based on wavelet neural network. Finally, the performance of CQM protocol and DCQM protocol is simulated by Qualnet platform. And the simulation results show that the analytic and simulation results match very well; the DCQM performs better in unsaturation situation.

  19. Single-phase dual-energy CT urography in the evaluation of haematuria

    International Nuclear Information System (INIS)

    Ascenti, G.; Mileto, A.; Gaeta, M.; Blandino, A.; Mazziotti, S.; Scribano, E.

    2013-01-01

    Aim: To assess the value of a single-phase dual-energy computed tomography (DECT) urography protocol with synchronous nephrographic–excretory phase enhancement and to calculate the potential dose reduction by omitting the unenhanced scan. Materials and methods: Eighty-four patients referred for haematuria underwent CT urography using a protocol that included single-energy unenhanced and dual-energy contrast-enhanced with synchronous nephrographic–excretory phase scans. DECT-based images [virtual unenhanced (VUE), weighted average, and colour-coded iodine overlay] were reconstructed. Opacification degree by contrast media of the upper urinary tract, and image quality of virtual unenhanced images were independently evaluated using a four-point scale. The diagnostic accuracy in detecting urothelial tumours on DECT-based images was determined. The dose of a theoretical dual-phase single-energy protocol was obtained by multiplying the effective dose of the unenhanced single-energy acquisition by two. Radiation dose saving by omitting the unenhanced scan was calculated. Results: The degree of opacification was scored as optimal or good in 86.9% of cases (k = 0.72); VUE image quality was excellent or good in 83.3% of cases (k = 0.82). Sensitivity, specificity, positive predictive value, and negative predictive value for urothelial tumours detection were 85.7, 98.6, 92.3, and 97.1%. Omission of the unenhanced scan led to a mean dose reduction of 42.7 ± 5%. Conclusion: Single-phase DECT urography with synchronous nephrographic–excretory phase enhancement represents an accurate “all-in-one’’ approach with a radiation dose saving up to 45% compared with a standard dual-phase protocol.

  20. Alveolar Bone Resorption Evaluation Around Single-piece Designed Bicortical Implants, Using Immediate Loading Protocol, Based on Orthopantomographs

    Directory of Open Access Journals (Sweden)

    Száva Dániel-Tamás

    2017-12-01

    Full Text Available Background: Inserting dental implants in severely atrophied jawbones is a great challenge for the dental practitioner. There are an increasing number of patients who choose dental implantanchored prosthetic restorations despite compromised bone quality and quantity. There have been numerous attempts in adapting implant design for the atrophic crestal bone. One-piece, needle-type basal implant design is a typical design for these cases. These implants are inserted in the remaining compact bone located in the basal aspect of the jawbones. If high primary stability is achieved, these implants are used for immediate loading protocol. From many points of view, this technique is based on contradictory principles compared to classic implant surgery and loading protocols. The aim of this study was to investigate the long-term success of basal one-piece short-diameter dental implants used for immediate loading protocol.

  1. Quantum broadcast communication and authentication protocol with a quantum one-time pad

    International Nuclear Information System (INIS)

    Chang Yan; Xu Chun-Xiang; Zhang Shi-Bin; Yan Li-Li

    2014-01-01

    A quantum broadcast communication and authentication protocol with a quantum one-time pad based on the Greenberger—Horne—Zeilinger state is proposed. A binary string is used to express the identity of the receiver, which is encoded as a single sequence of photons. The encoded photon sequence acts as a detection sequence and implements authentication. An XOR operation serves as a one-time pad and is used to ensure the security of the protocol. The binary string is reused even in a noisy channel and proves to be unconditionally secure. In contrast with the protocols proposed by Wang et al. [Chin. Phys. 16 1868 (2007)] and Yang et al. [Chin. Phys. B 19 070304 (2010)], the protocol in this study implements the identity authentication with a reusable binary string; no hash function or local unitary operation is used. The protocol in this study is also easier to implement and highly efficient without losing security. (general)

  2. Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2016-02-01

    Full Text Available Abstrak OSPF (Open Shortest Path First dan EIGRP (Enhanced Interior Gateway Routing Protocol adalah dua routing protokol yang banyak digunakan dalam jaringan komputer. Perbedaan karakteristik antar routing protokol menimbulkan masalah dalam pengiriman paket data. Teknik redistribution adalah solusi untuk melakukan komunikasi antar routing protokol. Dengan menggunakan software Cisco Packet Tracer 5.3 pada penelitian ini dibuat simulasi OSPF dan EIGRP yang dihubungkan oleh teknik redistribution, kemudian dibandingkan kualitasnya dengan single routing protokol EIGRP dan OSPF. Parameter pengujian dalam penelitian ini adalah nilai time delay dan trace route. Nilai trace route berdasarkan perhitungan langsung cost dan metric dibandingkan dengan hasil simulasi. Hasilnya dapat dilakukan proses redistribution OSPF dan EIGRP. Nilai delay redistribution lebih baik 1% dibanding OSPF dan 2-3% di bawah EIGRP tergantung kepadatan traffic. Dalam perhitungan trace route redistribution dilakukan 2 perhitungan, yaitu cost untuk area OSPF dan metric pada area EIGRP. Pengambilan jalur utama dan alternatif pengiriman paket berdasarkan nilai cost dan metric yang terkecil, hal ini terbukti berdasarkan perhitungan dan simulasi. Kata kunci: OSPF, EIGRP, Redistribution, Delay, Cost, Metric. Abstract OSPF (Open Shortest Path First and EIGRP (Enhanced Interior Gateway Routing Protocol are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost

  3. The RAPID protocol enhances patient recovery after both laparoscopic and open colorectal resections.

    LENUS (Irish Health Repository)

    Lloyd, G M

    2010-06-01

    Enhanced recovery after surgery (ERAS) programs can accelerate recovery and shorten the hospital stay after colorectal resections. The RAPID (remove, ambulate, postoperative analgesia, introduce diet) protocol is a simplified ERAS program that consists of a simplified, user-friendly single-page pro forma schedule. This study aimed to evaluate the impact of the RAPID protocol on patients undergoing both laparoscopic and open colorectal resections in two specialized colorectal units.

  4. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  5. Three-Stage Quantum Cryptography Protocol under Collective-Rotation Noise

    Directory of Open Access Journals (Sweden)

    Linsen Wu

    2015-05-01

    Full Text Available Information security is increasingly important as society migrates to the information age. Classical cryptography widely used nowadays is based on computational complexity, which means that it assumes that solving some particular mathematical problems is hard on a classical computer. With the development of supercomputers and, potentially, quantum computers, classical cryptography has more and more potential risks. Quantum cryptography provides a solution which is based on the Heisenberg uncertainty principle and no-cloning theorem. While BB84-based quantum protocols are only secure when a single photon is used in communication, the three-stage quantum protocol is multi-photon tolerant. However, existing analyses assume perfect noiseless channels. In this paper, a multi-photon analysis is performed for the three-stage quantum protocol under the collective-rotation noise model. The analysis provides insights into the impact of the noise level on a three-stage quantum cryptography system.

  6. Experimental protocol for packaging and encrypting multiple data

    International Nuclear Information System (INIS)

    Barrera, John Fredy; Trejos, Sorayda; Tebaldi, Myrian; Torroba, Roberto

    2013-01-01

    We present a novel single optical packaging and encryption (SOPE) procedure for multiple inputs. This procedure is based on a merging of a 2f scheme with a digital holographic technique to achieve efficient handling of multiple data. Through the 2f system with a random phase mask attached in its input plane, and the holographic technique, we obtain each processed input. A posteriori filtering and repositioning protocol on each hologram followed by an addition of all processed data, allows storing these data to form a single package. The final package is digitally multiplied by a second random phase mask acting as an encryption mask. In this way, the final user receives only one encrypted information unit and a single key, instead of a conventional multiple-image collecting method and several keys. Processing of individual images is cast into an optimization problem. The proposed optimization aims to simplify the handling and recovery of images while packing all of them into a single unit. The decoding process does not have the usual cross-talk or noise problems involved in other methods, as filtering and repositioning precedes the encryption step. All data are recovered in just one step at the same time by applying a simple Fourier transform operation and the decoding key. The proposed protocol takes advantage of optical processing and the versatility of the digital format. Experiments have been conducted using a Mach–Zehnder interferometer. An application is subsequently demonstrated to illustrate the feasibility of the SOPE procedure. (paper)

  7. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  8. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Beckers, Catherine; Hustinx, Roland

    2014-01-01

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  9. Efficient electronic entanglement concentration assisted by single mobile electrons

    International Nuclear Information System (INIS)

    Sheng Yu-Bo; Zhou Lan

    2013-01-01

    We present an efficient entanglement concentration protocol (ECP) for mobile electrons with charge detection. This protocol is quite different from other ECPs for one can obtain a maximally entangled pair from a pair of less-entangled state and a single mobile electron with a certain probability. With the help of charge detection, it can be repeated to reach a higher success probability. It also does not need to know the coefficient of the original less-entangled states. All these advantages may make this protocol useful in current distributed quantum information processing

  10. Experimental quantum tossing of a single coin

    International Nuclear Information System (INIS)

    Nguyen, A T; Frison, J; Massar, S; Huy, K Phan

    2008-01-01

    The cryptographic protocol of coin tossing consists of two parties, Alice and Bob, who do not trust each other, but want to generate a random bit. If the parties use a classical communication channel and have unlimited computational resources, one of them can always cheat perfectly. If the parties use a quantum communication channel, there exist protocols such that neither party can cheat perfectly, although they may be able to significantly bias the coin. Here, we analyze in detail how the performance of a quantum coin tossing experiment should be compared to classical protocols, taking into account the inevitable experimental imperfections. We then report an all-optical fiber experiment in which a single coin is tossed whose randomness is higher than achievable by any classical protocol and present some easily realizable cheating strategies by Alice and Bob

  11. Quantitative mouse brain phenotyping based on single and multispectral MR protocols

    Science.gov (United States)

    Badea, Alexandra; Gewalt, Sally; Avants, Brian B.; Cook, James J.; Johnson, G. Allan

    2013-01-01

    Sophisticated image analysis methods have been developed for the human brain, but such tools still need to be adapted and optimized for quantitative small animal imaging. We propose a framework for quantitative anatomical phenotyping in mouse models of neurological and psychiatric conditions. The framework encompasses an atlas space, image acquisition protocols, and software tools to register images into this space. We show that a suite of segmentation tools (Avants, Epstein et al., 2008) designed for human neuroimaging can be incorporated into a pipeline for segmenting mouse brain images acquired with multispectral magnetic resonance imaging (MR) protocols. We present a flexible approach for segmenting such hyperimages, optimizing registration, and identifying optimal combinations of image channels for particular structures. Brain imaging with T1, T2* and T2 contrasts yielded accuracy in the range of 83% for hippocampus and caudate putamen (Hc and CPu), but only 54% in white matter tracts, and 44% for the ventricles. The addition of diffusion tensor parameter images improved accuracy for large gray matter structures (by >5%), white matter (10%), and ventricles (15%). The use of Markov random field segmentation further improved overall accuracy in the C57BL/6 strain by 6%; so Dice coefficients for Hc and CPu reached 93%, for white matter 79%, for ventricles 68%, and for substantia nigra 80%. We demonstrate the segmentation pipeline for the widely used C57BL/6 strain, and two test strains (BXD29, APP/TTA). This approach appears promising for characterizing temporal changes in mouse models of human neurological and psychiatric conditions, and may provide anatomical constraints for other preclinical imaging, e.g. fMRI and molecular imaging. This is the first demonstration that multiple MR imaging modalities combined with multivariate segmentation methods lead to significant improvements in anatomical segmentation in the mouse brain. PMID:22836174

  12. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  13. Minimal sampling protocol for accurate estimation of urea production: a study with oral [13C]urea in fed and fasted piglets

    NARCIS (Netherlands)

    Oosterveld, Michiel J. S.; Gemke, Reinoud J. B. J.; Dainty, Jack R.; Kulik, Willem; Jakobs, Cornelis; de Meer, Kees

    2005-01-01

    An oral [13C]urea protocol may provide a simple method for measurement of urea production. The validity of single pool calculations in relation to a reduced sampling protocol was assessed. In eight fed and five fasted piglets, plasma urea enrichments from a 10 h sampling protocol were measured

  14. Single-tube library preparation for degraded DNA

    DEFF Research Database (Denmark)

    Carøe, Christian; Gopalakrishnan, Shyam; Vinner, Lasse

    2018-01-01

    these obstacles and enable higher throughput are therefore of interest to researchers working with degraded DNA. 2.In this study, we compare four Illumina library preparation protocols, including two “single-tube” methods developed for this study with the explicit aim of improving data quality and reducing...... of chemically damaged and highly fragmented DNA molecules. In particular, the enzymatic reactions and DNA purification steps during library preparation can result in DNA template loss and sequencing biases, affecting downstream analyses. The development of library preparation methods that circumvent...... preparation time and expenses. The methods are tested on grey wolf (Canis lupus) museum specimens. 3.We found single-tube protocols increase library complexity, yield more reads that map uniquely to the reference genome, reduce processing time, and may decrease laboratory costs by 90%. 4.Given the advantages...

  15. Authenticated multi-user quantum key distribution with single particles

    Science.gov (United States)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  16. Asynchronous transfer mode and Local Area Network emulation standards, protocols, and security implications

    OpenAIRE

    Kirwin, John P.

    1999-01-01

    A complex networking technology called Asynchronous Transfer Mode (ATM) and a networking protocol called Local Area Network Emulation (LANE) are being integrated into many naval networks without any security-driven naval configuration guidelines. No single publication is available that describes security issues of data delivery and signaling relating to the transition of Ethernet to LANE and ATM. The thesis' focus is to provide: (1) an overview and security analysis of standardized protocols ...

  17. Latency correction of event-related potentials between different experimental protocols

    Science.gov (United States)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  18. Single-phase dual-energy CT urography in the evaluation of haematuria.

    Science.gov (United States)

    Ascenti, G; Mileto, A; Gaeta, M; Blandino, A; Mazziotti, S; Scribano, E

    2013-02-01

    To assess the value of a single-phase dual-energy computed tomography (DECT) urography protocol with synchronous nephrographic-excretory phase enhancement and to calculate the potential dose reduction by omitting the unenhanced scan. Eighty-four patients referred for haematuria underwent CT urography using a protocol that included single-energy unenhanced and dual-energy contrast-enhanced with synchronous nephrographic-excretory phase scans. DECT-based images [virtual unenhanced (VUE), weighted average, and colour-coded iodine overlay] were reconstructed. Opacification degree by contrast media of the upper urinary tract, and image quality of virtual unenhanced images were independently evaluated using a four-point scale. The diagnostic accuracy in detecting urothelial tumours on DECT-based images was determined. The dose of a theoretical dual-phase single-energy protocol was obtained by multiplying the effective dose of the unenhanced single-energy acquisition by two. Radiation dose saving by omitting the unenhanced scan was calculated. The degree of opacification was scored as optimal or good in 86.9% of cases (k = 0.72); VUE image quality was excellent or good in 83.3% of cases (k = 0.82). Sensitivity, specificity, positive predictive value, and negative predictive value for urothelial tumours detection were 85.7, 98.6, 92.3, and 97.1%. Omission of the unenhanced scan led to a mean dose reduction of 42.7 ± 5%. Single-phase DECT urography with synchronous nephrographic-excretory phase enhancement represents an accurate "all-in-one'' approach with a radiation dose saving up to 45% compared with a standard dual-phase protocol. Copyright © 2012 The Royal College of Radiologists. All rights reserved.

  19. Design of a 1-chip IBM-3270 protocol handler

    NARCIS (Netherlands)

    Spaanenburg, L.

    1989-01-01

    The single-chip design of a 20MHz IBM-3270 coax protocol handler in a conventional 3 μ CMOS process-technology is discussed. The harmonious combination of CMOS circuit tricks and high-level design disciplines allows the 50k transistor design to be compiled and optimized into a 35 mm**2 chip in 4

  20. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Directory of Open Access Journals (Sweden)

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  1. Single-cell Hi-C for genome-wide detection of chromatin interactions that occur simultaneously in a single cell.

    Science.gov (United States)

    Nagano, Takashi; Lubling, Yaniv; Yaffe, Eitan; Wingett, Steven W; Dean, Wendy; Tanay, Amos; Fraser, Peter

    2015-12-01

    Hi-C is a powerful method that provides pairwise information on genomic regions in spatial proximity in the nucleus. Hi-C requires millions of cells as input and, as genome organization varies from cell to cell, a limitation of Hi-C is that it only provides a population average of genome conformations. We developed single-cell Hi-C to create snapshots of thousands of chromatin interactions that occur simultaneously in a single cell. To adapt Hi-C to single-cell analysis, we modified the protocol to include in-nucleus ligation. This enables the isolation of single nuclei carrying Hi-C-ligated DNA into separate tubes, followed by reversal of cross-links, capture of biotinylated ligation junctions on streptavidin-coated magnetic beads and PCR amplification of single-cell Hi-C libraries. The entire laboratory protocol can be carried out in 1 week, and although we have demonstrated its use in mouse T helper (TH1) cells, it should be applicable to any cell type or species for which standard Hi-C has been successful. We also developed an analysis pipeline to filter noise and assess the quality of data sets in a few hours. Although the interactome maps produced by single-cell Hi-C are sparse, the data provide useful information to understand cellular variability in nuclear genome organization and chromosome structure. Standard wet and dry laboratory skills in molecular biology and computational analysis are required.

  2. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed

    2012-04-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network\\'s transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  3. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed; Abed-Meraim, Karim; Alouini, Mohamed-Slim

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network's transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  4. Gamma camera performance: technical assessment protocol

    International Nuclear Information System (INIS)

    Bolster, A.A.; Waddington, W.A.

    1996-01-01

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera's computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author)

  5. Gamma camera performance: technical assessment protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bolster, A.A. [West Glasgow Hospitals NHS Trust, London (United Kingdom). Dept. of Clinical Physics; Waddington, W.A. [University College London Hospitals NHS Trust, London (United Kingdom). Inst. of Nuclear Medicine

    1996-12-31

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera`s computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author).

  6. Relationships of clinical protocols and reconstruction kernels with image quality and radiation dose in a 128-slice CT scanner: Study with an anthropomorphic and water phantom

    International Nuclear Information System (INIS)

    Paul, Jijo; Krauss, B.; Banckwitz, R.; Maentele, W.; Bauer, R.W.; Vogl, T.J.

    2012-01-01

    Research highlights: ► Clinical protocol, reconstruction kernel, reconstructed slice thickness, phantom diameter or the density of material it contains directly affects the image quality of DSCT. ► Dual energy protocol shows the lowest DLP compared to all other protocols examined. ► Dual-energy fused images show excellent image quality and the noise is same as that of single- or high-pitch mode protocol images. ► Advanced CT technology improves image quality and considerably reduce radiation dose. ► An important finding is the comparatively higher DLP of the dual-source high-pitch protocol compared to other single- or dual-energy protocols. - Abstract: Purpose: The aim of this study was to explore the relationship of scanning parameters (clinical protocols), reconstruction kernels and slice thickness with image quality and radiation dose in a DSCT. Materials and methods: The chest of an anthropomorphic phantom was scanned on a DSCT scanner (Siemens Somatom Definition flash) using different clinical protocols, including single- and dual-energy modes. Four scan protocols were investigated: 1) single-source 120 kV, 110 mA s, 2) single-source 100 kV, 180 mA s, 3) high-pitch 120 kV, 130 mA s and 4) dual-energy with 100/Sn140 kV, eff.mA s 89, 76. The automatic exposure control was switched off for all the scans and the CTDIvol selected was in between 7.12 and 7.37 mGy. The raw data were reconstructed using the reconstruction kernels B31f, B80f and B70f, and slice thicknesses were 1.0 mm and 5.0 mm. Finally, the same parameters and procedures were used for the scanning of water phantom. Friedman test and Wilcoxon-Matched-Pair test were used for statistical analysis. Results: The DLP based on the given CTDIvol values showed significantly lower exposure for protocol 4, when compared to protocol 1 (percent difference 5.18%), protocol 2 (percent diff. 4.51%), and protocol 3 (percent diff. 8.81%). The highest change in Hounsfield Units was observed with dual

  7. Comparison of The Effects of A Positive Reappraisal Coping Intervention and Problem-Solving Skills Training on Depression during The Waiting Period of The Result of Intrauterine Insemination Treatment: A Randomized Control Trial.

    Science.gov (United States)

    Ghasemi Gojani, Marzieh; Kordi, Masoumeh; Asgharipour, Negar; Esmaeili, Habibollah

    2018-04-01

    The outcomes of fertility treatments are unpredictable, and levels of depressive symptoms increase in patients during the waiting period of the result of intrauterine insemination (IUI) treatment. The aim of this study was to compare the effects of a positive reappraisal coping intervention (PRCI) and problem-solving skills training (PSS) on depression during the waiting period of the result of IUI Treatment. This randomized control clinical trial was done among 108 women undergoing IUI treatment. In the control group, the women received routine care. In the PRCI group, women attended two training sessions and were asked to complete coping thoughts cards and fill out daily monitoring forms during the waiting period. In the PSS group, PSS were taught over three sessions. The depression was measured by the beck depression inventory. On the 10 th th day of the IUI waiting period, there were significant differences between the control group (21.42 ± 11.42) and the PSS group (12.52 ± 8.05) and PRCI groups (13.14 ± 9.7) (P<0.001), but no significant difference between the PRCI group and the PSS group. According to the results of this randomized control trial there is no difference between a PRCI and PSS on depression during the waiting period of the result of IUI treatment. This suggests that both interventions can be used to help infertile women combat depression during the waiting period of the result of fertility treatments (Registration number: IRCT2016020926490N1). Copyright© by Royan Institute. All rights reserved.

  8. Comparison of The Effects of A Positive Reappraisal Coping Intervention and Problem-Solving Skills Training on Depression during The Waiting Period of The Result of Intrauterine Insemination Treatment: A Randomized Control Trial

    Directory of Open Access Journals (Sweden)

    Marzieh Ghasemi gojani, , ,

    2018-01-01

    Full Text Available Background The outcomes of fertility treatments are unpredictable, and levels of depressive symptoms increase in patients during the waiting period of the result of intrauterine insemination (IUI treatment. The aim of this study was to compare the effects of a positive reappraisal coping intervention (PRCI and problem-solving skills training (PSS on depression during the waiting period of the result of IUI Treatment. Materials and Methods This randomized control clinical trial was done among 108 women undergoing IUI treat- ment. In the control group, the women received routine care. In the PRCI group, women attended two training sessions and were asked to complete coping thoughts cards and fill out daily monitoring forms during the waiting period. In the PSS group, PSS were taught over three sessions. The depression was measured by the beck depression inventory. Results On the 10th day of the IUI waiting period, there were significant differences between the control group (21.42 ± 11.42 and the PSS group (12.52 ± 8.05 and PRCI groups (13.14 ± 9.7 (P<0.001, but no significant difference between the PRCI group and the PSS group. Conclusion According to the results of this randomized control trial there is no difference between a PRCI and PSS on depression during the waiting period of the result of IUI treatment. This suggests that both interventions can be used to help infertile women combat depression during the waiting period of the result of fertility treatments (Registration number: IRCT2016020926490N1.

  9. High-dimensional quantum key distribution with the entangled single-photon-added coherent state

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yang [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Bao, Wan-Su, E-mail: 2010thzz@sina.com [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Bao, Hai-Ze; Zhou, Chun; Jiang, Mu-Sheng; Li, Hong-Wei [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China)

    2017-04-25

    High-dimensional quantum key distribution (HD-QKD) can generate more secure bits for one detection event so that it can achieve long distance key distribution with a high secret key capacity. In this Letter, we present a decoy state HD-QKD scheme with the entangled single-photon-added coherent state (ESPACS) source. We present two tight formulas to estimate the single-photon fraction of postselected events and Eve's Holevo information and derive lower bounds on the secret key capacity and the secret key rate of our protocol. We also present finite-key analysis for our protocol by using the Chernoff bound. Our numerical results show that our protocol using one decoy state can perform better than that of previous HD-QKD protocol with the spontaneous parametric down conversion (SPDC) using two decoy states. Moreover, when considering finite resources, the advantage is more obvious. - Highlights: • Implement the single-photon-added coherent state source into the high-dimensional quantum key distribution. • Enhance both the secret key capacity and the secret key rate compared with previous schemes. • Show an excellent performance in view of statistical fluctuations.

  10. High-dimensional quantum key distribution with the entangled single-photon-added coherent state

    International Nuclear Information System (INIS)

    Wang, Yang; Bao, Wan-Su; Bao, Hai-Ze; Zhou, Chun; Jiang, Mu-Sheng; Li, Hong-Wei

    2017-01-01

    High-dimensional quantum key distribution (HD-QKD) can generate more secure bits for one detection event so that it can achieve long distance key distribution with a high secret key capacity. In this Letter, we present a decoy state HD-QKD scheme with the entangled single-photon-added coherent state (ESPACS) source. We present two tight formulas to estimate the single-photon fraction of postselected events and Eve's Holevo information and derive lower bounds on the secret key capacity and the secret key rate of our protocol. We also present finite-key analysis for our protocol by using the Chernoff bound. Our numerical results show that our protocol using one decoy state can perform better than that of previous HD-QKD protocol with the spontaneous parametric down conversion (SPDC) using two decoy states. Moreover, when considering finite resources, the advantage is more obvious. - Highlights: • Implement the single-photon-added coherent state source into the high-dimensional quantum key distribution. • Enhance both the secret key capacity and the secret key rate compared with previous schemes. • Show an excellent performance in view of statistical fluctuations.

  11. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  12. Assisted reproductive technology and intrauterine inseminations in Europe, 2005: results generated from European registers by ESHRE: ESHRE. The European IVF Monitoring Programme (EIM), for the European Society of Human Reproduction and Embryology (ESHRE).

    Science.gov (United States)

    Nyboe Andersen, A; Goossens, V; Bhattacharya, S; Ferraretti, A P; Kupka, M S; de Mouzon, J; Nygren, K G

    2009-06-01

    Results of assisted reproductive techniques from treatments initiated in Europe during 2005 are presented in this ninth report. Data were mainly collected from existing national registers. From 30 countries, 923 clinics reported 418 111 treatment cycles including: IVF (118 074), ICSI (203 329), frozen embryo replacement (79 140), oocyte donation (ED, 11 475), preimplantation genetic diagnosis/screening (5846) and in vitro maturation (247). Overall, this represents a 13.6% increase since 2004, partly due to inclusion of 28 417 cycles from Turkey. European data on intrauterine insemination using husband/partner's semen (IUI-H) and donor semen (IUI-D) were reported from 21 countries and included 128 908 IUI-H and 20 568 IUI-D cycles. In 16 countries where all clinics reported to the IVF register, 1115 cycles were performed per million inhabitants. For IVF, the clinical pregnancy rates per aspiration and per transfer were 26.9% and 30.3%, respectively. For ICSI, the corresponding rates were 28.5% and 30.9%. After IUI-H, the clinical pregnancy rate was 12.6% per insemination in women IVF and ICSI, the distribution of transfer of one, two, three and four or more embryos was 20.0%, 56.1%, 21.5% and 2.3%, respectively. Huge differences exist between countries. The distribution of singleton, twin and triplet deliveries after IVF and ICSI was 78.2%, 21.0% and 0.8%, respectively. This gives a total multiple delivery rate of 21.8% compared with 22.7% in 2004 and 23.1% in 2003. In women <40 years of age, IUI-H was associated with a twin and triplet pregnancy rate of 11.0% and 1.1%, respectively. Compared with earlier years, there was an increase in the reported number of ART cycles in Europe. Although fewer embryos were transferred per treatment, there was a marginal increase in pregnancy rates and a reduction in multiple deliveries.

  13. On the ARQ protocols over the Z-interference channels: Diversity-multiplexing-delay tradeoff

    KAUST Repository

    Nafea, Mohamed S.; Hamza, D.; Seddik, Karim G.; Nafie, Mohamed; Gamal, Hesham El

    2012-01-01

    We characterize the achievable three-dimensional tradeoff between diversity, multiplexing, and delay of the single antenna Automatic Retransmission reQuest (ARQ) Z-interference channel. Non-cooperative and cooperative ARQ protocols are adopted under

  14. Reliable single cell array CGH for clinical samples.

    Directory of Open Access Journals (Sweden)

    Zbigniew T Czyż

    Full Text Available BACKGROUND: Disseminated cancer cells (DCCs and circulating tumor cells (CTCs are extremely rare, but comprise the precursors cells of distant metastases or therapy resistant cells. The detailed molecular analysis of these cells may help to identify key events of cancer cell dissemination, metastatic colony formation and systemic therapy escape. METHODOLOGY/PRINCIPAL FINDINGS: Using the Ampli1™ whole genome amplification (WGA technology and high-resolution oligonucleotide aCGH microarrays we optimized conditions for the analysis of structural copy number changes. The protocol presented here enables reliable detection of numerical genomic alterations as small as 0.1 Mb in a single cell. Analysis of single cells from well-characterized cell lines and single normal cells confirmed the stringent quantitative nature of the amplification and hybridization protocol. Importantly, fixation and staining procedures used to detect DCCs showed no significant impact on the outcome of the analysis, proving the clinical usability of our method. In a proof-of-principle study we tracked the chromosomal changes of single DCCs over a full course of high-dose chemotherapy treatment by isolating and analyzing DCCs of an individual breast cancer patient at four different time points. CONCLUSIONS/SIGNIFICANCE: The protocol enables detailed genome analysis of DCCs and thereby assessment of the clonal evolution during the natural course of the disease and under selection pressures. The results from an exemplary patient provide evidence that DCCs surviving selective therapeutic conditions may be recruited from a pool of genomically less advanced cells, which display a stable subset of specific genomic alterations.

  15. Efficacy of the motile sperm organelle morphology examination (MSOME in predicting pregnancy after intrauterine insemination

    Directory of Open Access Journals (Sweden)

    Mauri Ana L

    2011-08-01

    Full Text Available Abstract Background Although the motile sperm organelle morphology examination (MSOME was developed merely as a selection criterion, its application as a method for classifying sperm morphology may represent an improvement in the evaluation of semen quality. The aim of this study was to determine the prognostic value of normal sperm morphology using MSOME with regard to clinical pregnancy (CP after intrauterine insemination (IUI. Methods A total of 156 IUI cycles that were performed in 111 couples were prospectively analysed. Each subject received 75 IU of recombinant FSH every second day from the third day of the cycle. Beginning on the 10th day of the cycle, follicular development was monitored by vaginal ultrasound. When one or two follicles measuring at least 17 mm were observed, recombinant hCG was administered, and IUI was performed 12-14 h and 36-40 h after hCG treatment. Prior to the IUI procedure, sperm samples were analysed by MSOME at 8400× magnification using an inverted microscope that was equipped with DIC/Nomarski differential interference contrast optics. A minimum of 200 motile spermatozoa per semen sample were evaluated, and the percentage of normal spermatozoa in each sample was determined. Results Pregnancy occurred in 34 IUI cycles (CP rate per cycle: 21.8%, per patient: 30.6%. Based on the MSOME criteria, a significantly higher percentage of normal spermatozoa was found in the group of men in which the IUI cycles resulted in pregnancy (2.6+/-3.1% compared to the group that did not achieve pregnancy (1.2+/-1.7%; P = 0.019. Logistic regression showed that the percentage of normal cells in the MSOME was a determining factor for the likelihood of clinical pregnancy (OR: 1.28; 95% CI: 1.08 to 1.51; P = 0.003. The ROC curve revealed an area under the curve of 0.63 and an optimum cut-off point of 2% of normal sperm morphology. At this cut-off threshold, using the percentage of normal sperm morphology by MSOME to predict pregnancy

  16. Quantification of platelets obtained by different centrifugation protocols in SHR rats

    OpenAIRE

    João Alberto Yazigi Junior; João Baptista Gomes dos Santos; Bruno Rodrigues Xavier; Marcela Fernandes; Sandra Gomes Valente; Vilnei Mattiolli Leite

    2015-01-01

    ABSTRACT OBJECTIVE: To quantify the platelet concentration in the blood of SHR rats, by means of different centrifugation protocols, and to evaluate what the most effective method for obtaining platelets is. METHODS: We used 40 male rats of the isogenic SHR lineage. The animals were divided into three groups: control, using whole blood without centrifugation; single centrifugation, using whole blood subjected to a single centrifugation at 200 × gand 400 × g; and double centrifugation, usin...

  17. Enhancing network performance under single link failure with AS-disjoint BGP extension

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Romeral, S.; Ruepp, Sarah Renée

    2009-01-01

    In this paper we propose an enhancement of the BGP protocol for obtaining AS-disjoint paths in GMPLS multi-domain networks. We evaluate the benefits of having AS-disjoint paths under single inter-domain link failure for two main applications: routing of future connection requests during routing...... protocol re-convergence and applying multi-domain restoration as survivability mechanism in case of a single link failure. The proposed BGP modification is a simple and effective solution for disjoint path selection in connection-oriented multi-domain networks. Our results show that applying the proper...

  18. Evaluation of Two Estrus Synchronization Protocols in Dairy Cattle at North Shoa Zone Ethiopia

    OpenAIRE

    Chanyalew, Yeshimebet; Zewde, Tesfaye; Gatew, Hulunim; Girma, Lina; Kassa, Getachew; Demis, Chekol; Bihon, Amare; Tsegaye, Yeshak

    2017-01-01

    This study was initiated to change the hesitation of the farmer on the effectiveness of estrus synchronization under their (Ethiopian small holder) livestock management system using two synchronization protocols. Non-pregnant animals with normal reproductive tract and that fulfilled the preconditions for estrus synchronization were considered for treatment & assigned into two synchronization protocols (single PGF2α injection; and double PGF2α injection). Among 94 (27 heifer and 67 cows) synch...

  19. Single-Molecule Analysis of Pre-mRNA Splicing with Colocalization Single-Molecule Spectroscopy (CoSMoS).

    Science.gov (United States)

    Braun, Joerg E; Serebrov, Victor

    2017-01-01

    Recent development of single-molecule techniques to study pre-mRNA splicing has provided insights into the dynamic nature of the spliceosome. Colocalization single-molecule spectroscopy (CoSMoS) allows following spliceosome assembly in real time at single-molecule resolution in the full complexity of cellular extracts. A detailed protocol of CoSMoS has been published previously (Anderson and Hoskins, Methods Mol Biol 1126:217-241, 2014). Here, we provide an update on the technical advances since the first CoSMoS studies including slide surface treatment, data processing, and representation. We describe various labeling strategies to generate RNA reporters with multiple dyes (or other moieties) at specific locations.

  20. A robust method to analyze copy number alterations of less than 100 kb in single cells using oligonucleotide array CGH.

    Directory of Open Access Journals (Sweden)

    Birte Möhlendick

    Full Text Available Comprehensive genome wide analyses of single cells became increasingly important in cancer research, but remain to be a technically challenging task. Here, we provide a protocol for array comparative genomic hybridization (aCGH of single cells. The protocol is based on an established adapter-linker PCR (WGAM and allowed us to detect copy number alterations as small as 56 kb in single cells. In addition we report on factors influencing the success of single cell aCGH downstream of the amplification method, including the characteristics of the reference DNA, the labeling technique, the amount of input DNA, reamplification, the aCGH resolution, and data analysis. In comparison with two other commercially available non-linear single cell amplification methods, WGAM showed a very good performance in aCGH experiments. Finally, we demonstrate that cancer cells that were processed and identified by the CellSearch® System and that were subsequently isolated from the CellSearch® cartridge as single cells by fluorescence activated cell sorting (FACS could be successfully analyzed using our WGAM-aCGH protocol. We believe that even in the era of next-generation sequencing, our single cell aCGH protocol will be a useful and (cost- effective approach to study copy number alterations in single cells at resolution comparable to those reported currently for single cell digital karyotyping based on next generation sequencing data.

  1. Desensitization to Mycofenolate Mofetil: a novel 12 step protocol.

    Science.gov (United States)

    Smith, M; Gonzalez-Estrada, A; Fernandez, J; Subramanian, A

    2016-07-01

    The use of MMF has become standard practice in many solid organ transplant recipients due its efficacy and favorable risk profile compared to other immunosuppressants. There has been a single case report of successful MMF desensitization. However, this protocol did not follow current Drug practice parameters. We report a successful desensitization to MMF in a double heart-kidney transplant recipient.

  2. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.

    Science.gov (United States)

    Scarani, Valerio; Renner, Renato

    2008-05-23

    We derive a bound for the security of quantum key distribution with finite resources under one-way postprocessing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, unconditional security follows immediately for standard protocols such as Bennett-Brassard 1984 and six-states protocol. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least N approximately 10(5) signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates.

  3. A simple and effective protocol for fast isolation of human Tenon's fibroblasts from a single trabeculectomy biopsy - a comparison of cell behaviour in different culture media.

    Science.gov (United States)

    Przekora, Agata; Zarnowski, Tomasz; Ginalska, Grazyna

    2017-01-01

    Human Tenon's fibroblasts (HTFs) play a crucial role in wound healing. They cause postoperative scarring of the filtering bleb and are thus responsible for trabeculectomy failure. This study aimed to find an effective and fast protocol for HTF isolation from trabeculectomy biopsies. The protocol was compared with the commonly recommended HTF isolation procedure, which uses Dulbecco's modified Eagle's medium (DMEM). We used Eagle's minimum essential medium (EMEM) enriched with fibroblast growth factor (FGF), which selectively promoted the proliferation of HTF cells. A secondary goal was to compare HTF morphology, metabolism and growth during parallel cultivation of the isolated cells in FGF-enriched EMEM and DMEM. Standard procedures for HTF isolation from tissue biopsies require a 20- to 30-day culture of the explants to obtain the first monolayer. Our protocol yielded the first monolayer after approx. 15 days. More importantly, the majority of the cells were fibroblasts with only individual epithelium-derived cells present. Using FGF-enriched EMEM allowed 1.3 × 10 6 vimentin-positive fibroblasts to be obtained from a single biopsy within approx. 25 days. Using DMEM resulted in isolation failure and required exchange to FGF-enriched medium to recover the fibroblast culture. HTFs maintained in FGF-enriched EMEM also showed faster proliferation and a different type I collagen production ability compared to HTFs cultured in DMEM. Thus, FGF-enriched EMEM is recommended for fast propagation of HTFs unless the aim of the study is to assess the effect of a tested agent on proliferation ability or type I collagen production. Our fast protocol for HTF isolation allows easy setup of cell banks by researchers under laboratory conditions and could be very useful during testing of novel ophthalmologic anti-fibrotic agents in vitro. Molecular analysis of HTFs isolated from patients with known treatment histories may provide valuable information on the effects of some

  4. Performance Analysis of a Cluster-Based MAC Protocol for Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jesús Alonso-Zárate

    2010-01-01

    Full Text Available An analytical model to evaluate the non-saturated performance of the Distributed Queuing Medium Access Control Protocol for Ad Hoc Networks (DQMANs in single-hop networks is presented in this paper. DQMAN is comprised of a spontaneous, temporary, and dynamic clustering mechanism integrated with a near-optimum distributed queuing Medium Access Control (MAC protocol. Clustering is executed in a distributed manner using a mechanism inspired by the Distributed Coordination Function (DCF of the IEEE 802.11. Once a station seizes the channel, it becomes the temporary clusterhead of a spontaneous cluster and it coordinates the peer-to-peer communications between the clustermembers. Within each cluster, a near-optimum distributed queuing MAC protocol is executed. The theoretical performance analysis of DQMAN in single-hop networks under non-saturation conditions is presented in this paper. The approach integrates the analysis of the clustering mechanism into the MAC layer model. Up to the knowledge of the authors, this approach is novel in the literature. In addition, the performance of an ad hoc network using DQMAN is compared to that obtained when using the DCF of the IEEE 802.11, as a benchmark reference.

  5. Efficient generation of single and entangled photons on a silicon photonic integrated chip

    International Nuclear Information System (INIS)

    Mower, Jacob; Englund, Dirk

    2011-01-01

    We present a protocol for generating on-demand, indistinguishable single photons on a silicon photonic integrated chip. The source is a time-multiplexed spontaneous parametric down-conversion element that allows optimization of single-photon versus multiphoton emission while realizing high output rate and indistinguishability. We minimize both the scaling of active elements and the scaling of active element loss with multiplexing. We then discuss detection strategies and data processing to further optimize the procedure. We simulate an improvement in single-photon-generation efficiency over previous time-multiplexing protocols, assuming existing fabrication capabilities. We then apply this system to generate heralded Bell states. The generation efficiency of both nonclassical states could be increased substantially with improved fabrication procedures.

  6. Clinical methods for single-shot instant MR imaging of the heart

    International Nuclear Information System (INIS)

    Cohen, M.S.; Weisskoff, R.; Rzedzian, R.

    1989-01-01

    The authors have compared cardiac protocols for instant MR methods that acquire complete images in 32 msec. Four protocols are compared: continuous scanning at a fixed TR with retrospective reordering; pseudogating by using a TR 50 msec greater than the R-R interval; progressive time delay (PTD), in which the delay from the R wave is electronically advanced; and real-time (RT) imaging at 16 images/sec, which enabled complete movies to be obtained in a single heartbeat. Spin-echo techniques have been used for the first three protocols; the RT method used gradient echoes

  7. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  8. Update protocols for evaluating nuclear cardiology and management of coronary heart disease. Chilean Society of Cardiology and Cardiovascular Surgery

    International Nuclear Information System (INIS)

    Massardo, Teresa; Jaimovich, Rodrigo; Canessa, Jose; Castro, Gabriel; Soto, Juan Ramon

    2010-01-01

    Protocols are reviewed nuclear cardiology present, with emphasis on imaging studies Single photon ( S PECT ) myocardial perfusion mainly in assessment of coronary heart disease (EC). The indications and protocols used are detailed as well as the literature review relevant both to clinical use as a quality control and interpretation of studies

  9. Current protocols in the management of oral submucous fibrosis: An update.

    Science.gov (United States)

    Arakeri, Gururaj; Rai, Kirthi Kumar; Boraks, George; Patil, Shekar Gowda; Aljabab, Abdulsalam S; Merkx, M A W; Carrozzo, Marco; Brennan, Peter A

    2017-07-01

    Oral submucous fibrosis (OSMF) is a debilitating condition of oral cavity which has significant potential for malignant transformation. In spite of over 20 years of research, the pathogenesis of the condition is still obscure and no single management modality is effective. Many OSMF treatment protocols have been proposed to alleviate the signs and symptoms of the disorder and there is overwhelming evidence that as areca nut is primary cause, stopping its use may have a considerable effect on symptoms rather than reversing pre-existing fibrosis. We present a review of the current protocols for managing OSMF. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  10. Effect of endometrial biopsy on intrauterine insemination outcome in controlled ovarian stimulation cycle

    OpenAIRE

    Wadhwa, Leena; Pritam, Amrita; Gupta, Taru; Gupta, Sangeeta; Arora, Sarika; Chandoke, Rajkumar

    2015-01-01

    OBJECTIVE: The objective was to evaluate the effect of endometrial biopsy (EB) on intrauterine insemination (IUI) outcome in controlled ovarian stimulation (COS) cycle. DESIGN: Prospective randomized control study. SETTING: Tertiary care center. MATERIALS AND METHODS: A total of 251 subjects were enrolled in the study. Subjects undergoing COS with IUI were randomly allocated into three groups. Group A: EB was taken between D19 and 24 of the spontaneous menstrual cycles that precedes the ferti...

  11. Single-track handshake signaling with application to micropipelines and handshake circuits

    NARCIS (Netherlands)

    Berkel, van C.H.; Bink, A.J.

    1996-01-01

    Single-track handshake signaling is using the same wire for request and acknowledge signaling. After each 2-phase handshake the wire is back in its initial state. A sequence of three protocol definitions suggests both a design method for single-track circuits and a trade-off between their robustness

  12. Lyceum: A Multi-Protocol Digital Library Gateway

    Science.gov (United States)

    Maa, Ming-Hokng; Nelson, Michael L.; Esler, Sandra L.

    1997-01-01

    Lyceum is a prototype scalable query gateway that provides a logically central interface to multi-protocol and physically distributed, digital libraries of scientific and technical information. Lyceum processes queries to multiple syntactically distinct search engines used by various distributed information servers from a single logically central interface without modification of the remote search engines. A working prototype (http://www.larc.nasa.gov/lyceum/) demonstrates the capabilities, potentials, and advantages of this type of meta-search engine by providing access to over 50 servers covering over 20 disciplines.

  13. Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier

    Science.gov (United States)

    Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-03-01

    In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.

  14. Nickel-Titanium Single-file System in Endodontics.

    Science.gov (United States)

    Dagna, Alberto

    2015-10-01

    This work describes clinical cases treated with a innovative single-use and single-file nickel-titanium (NiTi) system used in continuous rotation. Nickel-titanium files are commonly used for root canal treatment but they tend to break because of bending stresses and torsional stresses. Today new instruments used only for one treatment have been introduced. They help the clinician to make the root canal shaping easier and safer because they do not require sterilization and after use have to be discarded. A new sterile instrument is used for each treatment in order to reduce the possibility of fracture inside the canal. The new One Shape NiTi single-file instrument belongs to this group. One Shape is used for complete shaping of root canal after an adequate preflaring. Its protocol is simple and some clinical cases are presented. It is helpful for easy cases and reliable for difficult canals. After 2 years of clinical practice, One Shape seems to be helpful for the treatment of most of the root canals, with low risk of separation. After each treatment, the instrument is discarded and not sterilized in autoclave or re-used. This single-use file simplifies the endodontic therapy, because only one instrument is required for canal shaping of many cases. The respect of clinical protocol guarantees predictable good results.

  15. Modified classification and single-stage microsurgical repair of posttraumatic infected massive bone defects in lower extremities.

    Science.gov (United States)

    Yang, Yun-fa; Xu, Zhong-he; Zhang, Guang-ming; Wang, Jian-wei; Hu, Si-wang; Hou, Zhi-qi; Xu, Da-chuan

    2013-11-01

    Posttraumatic infected massive bone defects in lower extremities are difficult to repair because they frequently exhibit massive bone and/or soft tissue defects, serious bone infection, and excessive scar proliferation. This study aimed to determine whether these defects could be classified and repaired at a single stage. A total of 51 cases of posttraumatic infected massive bone defect in lower extremity were included in this study. They were classified into four types on the basis of the conditions of the bone defects, soft tissue defects, and injured limb length, including Type A (without soft tissue defects), Type B (with soft tissue defects of 10 × 20 cm or less), Type C (with soft tissue defects of 10 × 20 cm or more), and Type D (with the limb shortening of 3 cm or more). Four types of single-stage microsurgical repair protocols were planned accordingly and implemented respectively. These protocols included the following: Protocol A, where vascularized fibular graft was implemented for Type A; Protocol B, where vascularized fibular osteoseptocutaneous graft was implemented for Type B; Protocol C, where vascularized fibular graft and anterior lateral thigh flap were used for Type C; and Protocol D, where limb lengthening and Protocols A, B, or C were used for Type D. There were 12, 33, 4, and 2 cases of Types A, B, C, and D, respectively, according to this classification. During the surgery, three cases of planned Protocol B had to be shifted into Protocol C; however, all microsurgical repairs were completed. With reference to Johner-Wruhs evaluation method, the total percentage of excellent and good results was 82.35% after 6 to 41 months of follow-up. It was concluded that posttraumatic massive bone defects could be accurately classified into four types on the basis of the conditions of bone defects, soft tissue coverage, and injured limb length, and successfully repaired with the single-stage repair protocols after thorough debridement. Thieme Medical

  16. The Dana Farber consortium protocol (DFCP) vs. classic Hyper-CVAD for treatment of acute lymphoblastic leukemia in patients <50 Y. Single institution experience.

    Science.gov (United States)

    Alabdulwahab, Amal S; Elsayed, Hussein G; Sherisher, Mohamed A; Zeeneldin, Ahmed; Alghamdi, Khalofa; Elbjeirami, Wafaa M

    2017-09-01

    The use of intensive pediatric protocols for the treatment of ALL is being extended to older adults. Analysis of the efficacy and toxicity results of pediatric DFCP vs. classic Hyper-CVAD protocol for the treatment of patients with ALL Hyper-CVAD for first line treatment of patients with ALL Hyper-CVAD protocol. CR rate was 90.7% for DFCP vs. 83.7 for Hyper-CVAD (p 0.7). 3 Y Leukemia free survival was 57.4% (70.9% for DFCP vs. 41.6% Hyper-CVAD P 0.1) while 3Y OS was 62.6%% for the whole group, 72.6% DFCP vs. 48.5% Hyper-CVAD, P 0.04. Those with age Hyper-CVAD related to gall stones. Osteonecrosis affected 5 patients on DFCP. pediatric protocols are feasible in patients younger than 50 Y and they are more active than classic adult protocols. Although modifications of adult protocols may improve their results, this had to be investigated in randomized controlled trials. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. RT-based memory detection : Item saliency effects in the single-probe and the multiple-probe protocol

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.; Theocharidou, K.

    RT-based memory detection may provide an efficient means to assess recognition of concealed information. There is, however, considerable heterogeneity in detection rates, and we explored two potential moderators: item saliency and test protocol. Participants tried to conceal low salient (e.g.,

  18. A protocol is not enough to implement an enhanced recovery programme for colorectal resection

    DEFF Research Database (Denmark)

    Maessen, J; Dejong, C.H.C.; Hausel, J

    2007-01-01

    BACKGROUND: Single-centre studies have suggested that enhanced recovery can be achieved with multimodal perioperative care protocols. This international observational study evaluated the implementation of an enhanced recovery programme in five European centres and examined the determinants...... with a shorter hospital stay. CONCLUSION: Functional recovery in 3 days after colorectal resection could be achieved in daily practice. A protocol is not enough to enable discharge of patients on the day of functional recovery; more experience and better organization of care may be required. Copyright (c) 2006...

  19. Abbreviated Combined MR Protocol: A New Faster Strategy for Characterizing Breast Lesions.

    Science.gov (United States)

    Moschetta, Marco; Telegrafo, Michele; Rella, Leonarda; Stabile Ianora, Amato Antonio; Angelelli, Giuseppe

    2016-06-01

    The use of an abbreviated magnetic resonance (MR) protocol has been recently proposed for cancer screening. The aim of our study is to evaluate the diagnostic accuracy of an abbreviated MR protocol combining short TI inversion recovery (STIR), turbo-spin-echo (TSE)-T2 sequences, a pre-contrast T1, and a single intermediate (3 minutes after contrast injection) post-contrast T1 sequence for characterizing breast lesions. A total of 470 patients underwent breast MR examination for screening, problem solving, or preoperative staging. Two experienced radiologists evaluated both standard and abbreviated protocols in consensus. Sensitivity, specificity, positive predictive value (PPV), negative predictive value (NPV), and diagnostic accuracy for both protocols were calculated (with the histological findings and 6-month ultrasound follow-up as the reference standard) and compared with the McNemar test. The post-processing and interpretation times for the MR images were compared with the paired t test. In 177 of 470 (38%) patients, the MR sequences detected 185 breast lesions. Standard and abbreviated protocols obtained sensitivity, specificity, diagnostic accuracy, PPV, and NPV values respectively of 92%, 92%, 92%, 68%, and 98% and of 89%, 91%, 91%, 64%, and 98% with no statistically significant difference (P < .0001). The mean post-processing and interpretation time were, respectively, 7 ± 1 minutes and 6 ± 3.2 minutes for the standard protocol and 1 ± 1.2 minutes and 2 ± 1.2 minutes for the abbreviated protocol, with a statistically significant difference (P < .01). An abbreviated combined MR protocol represents a time-saving tool for radiologists and patients with the same diagnostic potential as the standard protocol in patients undergoing breast MRI for screening, problem solving, or preoperative staging. Copyright © 2016 Elsevier Inc. All rights reserved.

  20. Evaluation of accuracy in implant site preparation performed in single- or multi-step drilling procedures.

    Science.gov (United States)

    Marheineke, Nadine; Scherer, Uta; Rücker, Martin; von See, Constantin; Rahlf, Björn; Gellrich, Nils-Claudius; Stoetzer, Marcus

    2018-06-01

    Dental implant failure and insufficient osseointegration are proven results of mechanical and thermal damage during the surgery process. We herein performed a comparative study of a less invasive single-step drilling preparation protocol and a conventional multiple drilling sequence. Accuracy of drilling holes was precisely analyzed and the influence of different levels of expertise of the handlers and additional use of drill template guidance was evaluated. Six experimental groups, deployed in an osseous study model, were representing template-guided and freehanded drilling actions in a stepwise drilling procedure in comparison to a single-drill protocol. Each experimental condition was studied by the drilling actions of respectively three persons without surgical knowledge as well as three highly experienced oral surgeons. Drilling actions were performed and diameters were recorded with a precision measuring instrument. Less experienced operators were able to significantly increase the drilling accuracy using a guiding template, especially when multi-step preparations are performed. Improved accuracy without template guidance was observed when experienced operators were executing single-step versus multi-step technique. Single-step drilling protocols have shown to produce more accurate results than multi-step procedures. The outcome of any protocol can be further improved by use of guiding templates. Operator experience can be a contributing factor. Single-step preparations are less invasive and are promoting osseointegration. Even highly experienced surgeons are achieving higher levels of accuracy by combining this technique with template guidance. Hereby template guidance enables a reduction of hands-on time and side effects during surgery and lead to a more predictable clinical diameter.

  1. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  2. Quality improvement initiative: Preventative Surgical Site Infection Protocol in Vascular Surgery.

    Science.gov (United States)

    Parizh, David; Ascher, Enrico; Raza Rizvi, Syed Ali; Hingorani, Anil; Amaturo, Michael; Johnson, Eric

    2018-02-01

    Objective A quality improvement initiative was employed to decrease single institution surgical site infection rate in open lower extremity revascularization procedures. In an attempt to lower patient morbidity, we developed and implemented the Preventative Surgical Site Infection Protocol in Vascular Surgery. Surgical site infections lead to prolonged hospital stays, adjunctive procedure, and additive costs. We employed targeted interventions to address the common risk factors that predispose patients to post-operative complications. Methods Retrospective review was performed between 2012 and 2016 for all surgical site infections after revascularization procedures of the lower extremity. A quality improvement protocol was initiated in January 2015. Primary outcome was the assessment of surgical site infection rate reduction in the pre-protocol vs. post-protocol era. Secondary outcomes evaluated patient demographics, closure method, perioperative antibiotic coverage, and management outcomes. Results Implementation of the protocol decreased the surgical site infection rate from 6.4% to 1.6% p = 0.0137). Patient demographics and comorbidities were assessed and failed to demonstrate a statistically significant difference among the infection and no-infection groups. Wound closure with monocryl suture vs. staple proved to be associated with decreased surgical site infection rate ( p site infections in the vascular surgery population are effective and necessary. Our data suggest that there may be benefit in the incorporation of MRSA and Gram-negative coverage as part of the Surgical Care Improvement Project perioperative guidelines.

  3. FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks.

    Science.gov (United States)

    Umar, Idris Abubakar; Mohd Hanapi, Zurina; Sali, A; Zulkarnain, Zuriati A

    2016-06-22

    Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.

  4. Detection of single-copy functional genes in prokaryotic cells by two-pass TSA-FISH with polynucleotide probes.

    Science.gov (United States)

    Kawakami, Shuji; Hasegawa, Takuya; Imachi, Hiroyuki; Yamaguchi, Takashi; Harada, Hideki; Ohashi, Akiyoshi; Kubota, Kengo

    2012-02-01

    In situ detection of functional genes with single-cell resolution is currently of interest to microbiologists. Here, we developed a two-pass tyramide signal amplification (TSA)-fluorescence in situ hybridization (FISH) protocol with PCR-derived polynucleotide probes for the detection of single-copy genes in prokaryotic cells. The mcrA gene and the apsA gene in methanogens and sulfate-reducing bacteria, respectively, were targeted. The protocol showed bright fluorescence with a good signal-to-noise ratio and achieved a high efficiency of detection (>98%). The discrimination threshold was approximately 82-89% sequence identity. Microorganisms possessing the mcrA or apsA gene in anaerobic sludge samples were successfully detected by two-pass TSA-FISH with polynucleotide probes. The developed protocol is useful for identifying single microbial cells based on functional gene sequences. Copyright © 2011 Elsevier B.V. All rights reserved.

  5. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crawford, Alasdair J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gourisetti, Sri Nikhil [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Viswanathan, Vilayanur [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ferreira, Summer Rhodes [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schoenwald, David A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rosewater, David Martin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-04-01

    This Protocol provides a set of “best practices” for characterizing energy storage systems (ESSs) and measuring and reporting their performance. It serves as a basis for assessing how an ESS will perform with respect to key performance attributes relevant to different applications. It is intended to provide a valid and accurate basis for the comparison of different ESSs. By achieving the stated purpose, the Protocol will enable more informed decision-making in the selection of ESSs for various stationary applications. The Protocol identifies general information and technical specifications relevant in describing an ESS and also defines a set of test, measurement, and evaluation criteria with which to express the performance of ESSs that are intended for energy-intensive and/or power-intensive stationary applications. An ESS includes a storage device, battery management system, and any power conversion systems installed with the storage device. The Protocol is agnostic with respect to the storage technology and the size and rating of the ESS. The Protocol does not apply to single-use storage devices and storage devices that are not coupled with power conversion systems, nor does it address safety, security, or operations and maintenance of ESSs, or provide any pass/fail criteria.

  6. The effectiveness of a single-stage versus traditional three-staged protocol of hospital disinfection at eradicating vancomycin-resistant Enterococci from frequently touched surfaces.

    Science.gov (United States)

    Friedman, N Deborah; Walton, Aaron L; Boyd, Sarah; Tremonti, Christopher; Low, Jillian; Styles, Kaylene; Harris, Owen; Alfredson, David; Athan, Eugene

    2013-03-01

    Environmental contamination is a reservoir for vancomycin-resistant enterococcus (VRE) in hospitals. Environmental sampling of surfaces was undertaken anytime before disinfection and 1 hour after disinfection utilizing a sodium dichloroisocyanurate-based, 3-staged protocol (phase 1) or benzalkonium chloride-based, single-stage clean (phase 2). VRE colonization and infection rates are presented from 2010 to 2011, and audits of cleaning completeness were also analyzed. Environmental samples collected before disinfection were significantly more likely to be contaminated with VRE during phase 1 than phase 2: 25.2% versus 4.6%, respectively; odds ratio (OR), 7.01 (P benzalkonium chloride-based product for disinfection. This reduction in VRE may be due to a new disinfection product, more attention to the thoroughness of cleaning, or other supplementary efforts in our institution. Copyright © 2013 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Mosby, Inc. All rights reserved.

  7. Unambiguous modification of nonorthogonal single- and two-photon polarization states

    International Nuclear Information System (INIS)

    Torres-Ruiz, F. A.; Aguirre, J.; Delgado, A.; Lima, G.; Neves, L.; Roa, L.; Saavedra, C.; Padua, S.

    2009-01-01

    In this paper we propose a probabilistic method which allows an unambiguous modification of two nonorthogonal quantum states. We experimentally implement this protocol by using two-photon polarization states generated in the process of spontaneous parametric down conversion. In the experiment, for codifying initial quantum states, we consider single-photon states and heralded detection. We show that the application of this protocol to entangled states allows a fine control of the amount of entanglement of the initial state.

  8. A markerless protocol for genetic analysis of Aggregatibacter actinomycetemcomitans

    Science.gov (United States)

    Cheng, Ya-An; Jee, Jason; Hsu, Genie; Huang, Yanyan; Chen, Casey; Lin, Chun-Pin

    2015-01-01

    Background/Purpose The genomes of different Aggregatibacter actinomycetemcomitans strains contain many strain-specific genes and genomic islands (defined as DNA found in some but not all strains) of unknown functions. Genetic analysis for the functions of these islands will be constrained by the limited availability of genetic markers and vectors for A. actinomycetemcomitans. In this study we tested a novel genetic approach of gene deletion and restoration in a naturally competent A. actinomycetemcomitans strain D7S-1. Methods Specific genes’ deletion mutants and mutants restored with the deleted genes were constructed by a markerless loxP/Cre system. In mutants with sequential deletion of multiple genes loxP with different spacer regions were used to avoid unwanted recombinations between loxP sites. Results Eight single-gene deletion mutants, four multiple-gene deletion mutants, and two mutants with restored genes were constructed. No unintended non-specific deletion mutants were generated by this protocol. The protocol did not negatively affect the growth and biofilm formation of A. actinomycetemcomitans. Conclusion The protocol described in this study is efficient and specific for genetic manipulation of A. actinomycetemcomitans, and will be amenable for functional analysis of multiple genes in A. actinomycetemcomitans. PMID:24530245

  9. Attacks on quantum key distribution protocols that employ non-ITS authentication

    Science.gov (United States)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  10. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  11. The comparison between Intrauterine Insemination and Fallopian Tube Sperm Perfusion Using FAST® System in Patients with Unexplained Infertility

    Directory of Open Access Journals (Sweden)

    Sepideh Peivandi

    2015-02-01

    Full Text Available Background: Controlled ovarian stimulation (COH with intrauterine insemination (IUI is commonly offered to infertile couples with patent fallopian tubes because it is simple, non-invasive and cost-effective technique. Another non-invasive method is fallopian tube sperm perfusion (FSP. This study was performed to compare the relative efficacy between FSP using fallopian sperm transfer (FAST system and standard IUI in patients with unexplained infertility. Materials and Methods: This prospective randomized study was conducted at the IVF Unit, Department of Gynecology and Obstetrics, Mazandaran University of Medical Sciences, Sari, Iran, from March 2011 to February 2012. A total of ninety patients with unexplained infertility underwent ovarian stimulation with clomiphene citrate and human menopausal gonadotropin (HMG. Patients were then randomly assigned into either group I (n=45 to undergo standard IUI or group II (n=45 to undergo FSP using FAST system. Results: The patients’ basic characteristics, including age, primary infertility and duration of infertility, were not significantly different between two study groups. In the group I, there were 9 pregnancies (a pregnancy rate per cycle of 20%, whereas in the group II, 8 pregnancies occurred (a pregnancy rate per cycle of 17.8%, p>0.05. Conclusion: FSP using FAST system offers no advantage over the standard IUI in order to increase pregnancy rate in patients with unexplained infertility.

  12. Single cell transcriptomics of neighboring hyphae of Aspergillus niger

    Science.gov (United States)

    2011-01-01

    Single cell profiling was performed to assess differences in RNA accumulation in neighboring hyphae of the fungus Aspergillus niger. A protocol was developed to isolate and amplify RNA from single hyphae or parts thereof. Microarray analysis resulted in a present call for 4 to 7% of the A. niger genes, of which 12% showed heterogeneous RNA levels. These genes belonged to a wide range of gene categories. PMID:21816052

  13. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    Science.gov (United States)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  14. Single-grain dating of young sediments using the pIRIR signal from feldspar

    DEFF Research Database (Denmark)

    Reimann, Tony; Thomsen, Kristina Jørkov; Jain, Mayank

    2012-01-01

    In this article we test for the first time the potential of single-grains of K-rich feldspar to date well-bleached and poorly bleached sediments using a post-IR IRSL (pIRIR) protocol. We measure natural dose distributions using K-rich feldspars from four coastal samples applying the pIRIR protocol.......5%.The analysis of the well-bleached samples shows that only the brightest 30% of the grains give pIRIR single-grain ages in agreement with the age control; this effect may arise from the suggested correlation between blue emission and potassium content of individual grains. Comparison of single......-grain quartz and feldspar dose distributions from the poorly bleached samples shows that quartz is relatively better bleached; nevertheless, selection of a reliable ‘minimum’ feldspar dose was achieved using two different statistical models....

  15. Indirect MR venography: contrast medium protocols, postprocessing and combination in diagnosing pulmonary emboli with MRI

    International Nuclear Information System (INIS)

    Kluge, A.; Bachmann, G.; Rominger, M.; Schoenburg, M.

    2004-01-01

    Purpose: Integration of MR venography in a comprehensive MR imaging protocol in patients with suspected pulmonary embolism (PE) and evaluation of contrast media dosage, timing and postprocessing for diagnostic accuracy. Materials and Methods: Fortyeight consecutive inpatients with suspected PE or deep vein thrombosis were examined by MR venography according to one of the following protocols: protocol I: MR venography only, 0.25 mmol/kg bodyweight (BW) Gadopentate dimeglumine(Gd-DTPA) as single dose, bolus timing; protocol II: MR angiography of pulmonary arteries with a cumulative dosage of 0.25 mmol/kg contrast media, modification of coil setting for MR venography without further contrast media application; protocol III: as protocol II but with 0.125 mmol/kg BW, followed by MR venography. Signal-to-noise ratio, contrast-to-noise ratio, number of definable vascular segments and image quality were evaluated. The results were compared to conventional bilateral venography. Results: All MR venography examinations were of diagnostic quality and the examination time was below 10 min. MR venography could be performed in all 48 patients comparted to 43 of 48 patients for conventional venography. Significantly more superficial and deep veins of the leg could be visualized by MR venography (94% compared to 83% for conventional venography). Sensitivity and specificity were 100% and 92%, respectively. Quality differed significantly between 0.125 mmol/kg (protocol III) and 0.25 mmol/kg Gd-DTPA (protocols I and II) while timing did not influence quality (protocol I vs. II). (orig.) [de

  16. A novel protocol for dispatcher assisted CPR improves CPR quality and motivation among rescuers-A randomized controlled simulation study.

    Science.gov (United States)

    Rasmussen, Stinne Eika; Nebsbjerg, Mette Amalie; Krogh, Lise Qvirin; Bjørnshave, Katrine; Krogh, Kristian; Povlsen, Jonas Agerlund; Riddervold, Ingunn Skogstad; Grøfte, Thorbjørn; Kirkegaard, Hans; Løfgren, Bo

    2017-01-01

    Emergency dispatchers use protocols to instruct bystanders in cardiopulmonary resuscitation (CPR). Studies changing one element in the dispatcher's protocol report improved CPR quality. Whether several changes interact is unknown and the effect of combining multiple changes previously reported to improve CPR quality into one protocol remains to be investigated. We hypothesize that a novel dispatch protocol, combining multiple beneficial elements improves CPR quality compared with a standard protocol. A novel dispatch protocol was designed including wording on chest compressions, using a metronome, regular encouragements and a 10-s rest each minute. In a simulated cardiac arrest scenario, laypersons were randomized to perform single-rescuer CPR guided with the novel or the standard protocol. a composite endpoint of time to first compression, hand position, compression depth and rate and hands-off time (maximum score: 22 points). Afterwards participants answered a questionnaire evaluating the dispatcher assistance. The novel protocol (n=61) improved CPR quality score compared with the standard protocol (n=64) (mean (SD): 18.6 (1.4)) points vs. 17.5 (1.7) points, pCPR. A novel bundle of care protocol improved CPR quality score and motivation among rescuers. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  17. Hybrid entanglement concentration assisted with single coherent state

    International Nuclear Information System (INIS)

    Guo Rui; Zhou Lan; Sheng Yu-Bo; Gu Shi-Pu; Wang Xing-Fu

    2016-01-01

    Hybrid entangled state (HES) is a new type of entanglement, which combines the advantages of an entangled polarization state and an entangled coherent state. HES is widely discussed in the applications of quantum communication and computation. In this paper, we propose three entanglement concentration protocols (ECPs) for Bell-type HES, W-type HES, and cluster-type HES, respectively. After performing these ECPs, we can obtain the maximally entangled HES with some success probability. All the ECPs exploit the single coherent state to complete the concentration. These protocols are based on the linear optics, which are feasible in future experiments. (paper)

  18. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    : multiple tries with invalid passwords caused the expected error message (too many retries). but let the user nevertheless pass. Finally, security can be compromised by silly implementation bugs or design decisions. In a commercial VPN software, all calls to the encryption routines were incidentally replaced by stubs, probably during factory testing. The product worked nicely. and the error (an open VPN) would have gone undetected, if a team member had not inspected the low-level traffic out of curiosity. Also, the use secret proprietary encryption routines can backfire, because such algorithms often exhibit weaknesses which can be exploited easily (see e.g., DVD encoding). Summarizing, there is large number of possibilities to make errors which can compromise the security of a protocol. In today s world with short time-to-market and the use of security protocols in open and hostile networks for safety-critical applications (e.g., power or air-traffic control), such slips could lead to catastrophic situations. Thus, formal methods and automatic reasoning techniques should not be used just for the formal proof of absence of an attack, but they ought to be used to provide an end-to-end tool-supported framework for security software. With such an approach all required artifacts (code, documentation, test cases) , formal analyses, and reliable certification will be generated automatically, given a single, high level specification. By a combination of program synthesis, formal protocol analysis, certification; and proof-carrying code, this goal is within practical reach, since all the important technologies for such an approach actually exist and only need to be assembled in the right way.

  19. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  20. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  1. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  2. Effect of Acetylcholinesterase and Butyrylcholinesterase on Intrauterine Insemination, Contribution to Inflammations, Oxidative Stress and Antioxidant Status; A Preliminary Report

    Science.gov (United States)

    Haghnazari, Lida; Vaisi-Raygani, Asad; Keshvarzi, Farahnaz; Ferdowsi, Farivar; Goodarzi, Massoud; Rahimi, Zohreh; Baniamerian, Hossin; Tavilani, Haidar; Vaisi-Raygani, Hadis; Vaisi-Raygani, Hessam; Pourmotabbed, Tayehbeh

    2016-01-01

    Background: Oxidative stress affects women fertility and influences on the sperm quality by alterating activities of cholinesterases, a molecular marker of stress-related infertility. The aim of the present study was to investigate the role of acetyl-cholinesterase (AChE), butyrylcholinesterase (BuChE) activities and phenotypes in patients with unexplained infertility (idiopathic). It’s possible association with inflammation marker C-reactive protein (CRP) and other oxidative stress markers, i.e. before and after intra uterine insemination (IUI). Methods: In this study, blood samples of 60 patients with unexplained infertility were collected the day before and 24 hr after IUI (between 8 AM and 9 AM after the overnight fasting) and activities of BuChE, AChE, catalase (CAT), superoxide dismutase (SOD) and glutathione peroxidase (GpX) and serum levels of thiol proteins (TP), C-reactive protein (CRP), total antioxidant capacity (TAC) were measured. Statistical significance was assumed at poxidative stress and inflammation and reduction in fertility rates by IUI. PMID:27478769

  3. Interface Assignment-Based AODV Routing Protocol to Improve Reliability in Multi-Interface Multichannel Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2015-01-01

    Full Text Available The utilization of wireless mesh networks (WMNs has greatly increased, and the multi-interface multichannel (MIMC technic has been widely used for the backbone network. Unfortunately, the ad hoc on-demand distance vector (AODV routing protocol defined in the IEEE 802.11s standard was designed for WMNs using the single-interface single-channel technic. So, we define a problem that happens when the legacy AODV is used in MIMC WMNs and propose an interface assignment-based AODV (IA-AODV in order to resolve that problem. IA-AODV, which is based on multitarget path request, consists of the PREQ prediction scheme, the PREQ loss recovery scheme, and the PREQ sender assignment scheme. A detailed operation according to various network conditions and services is introduced, and the routing efficiency and network reliability of a network using IA-AODV are analyzed over the presented system model. Finally, after a real-world test-bed for MIMC WMNs using the IA-AODV routing protocol is implemented, the various indicators of the network are evaluated through experiments. When the proposed routing protocol is compared with the existing AODV routing protocol, it performs the path update using only 14.33% of the management frames, completely removes the routing malfunction, and reduces the UDP packet loss ratio by 0.0012%.

  4. Optimized workflow and imaging protocols for whole-body oncologic PET/MRI.

    Science.gov (United States)

    Ishii, Shirou; Hara, Takamitsu; Nanbu, Takeyuki; Suenaga, Hiroki; Sugawara, Shigeyasu; Kuroiwa, Daichi; Sekino, Hirofumi; Miyajima, Masayuki; Kubo, Hitoshi; Oriuchi, Noboru; Ito, Hiroshi

    2016-11-01

    Although PET/MRI has the advantages of a simultaneous acquisition of PET and MRI, high soft-tissue contrast of the MRI images, and reduction of radiation exposure, its low profitability and long acquisition time are significant problems in clinical settings. Thus, MRI protocols that meet oncological purposes need to be used in order to reduce examination time while securing detectability. Currently, half-Fourier acquisition single-shot turbo spin echo and 3D-T1 volumetric interpolated breath-hold examination may be the most commonly used sequences for whole-body imaging due to their shorter acquisition time and higher diagnostic accuracy. Although there have been several reports that adding diffusion weighted image (DWI) to PET/MRI protocol has had no effect on tumor detection to date, in cases of liver, kidney, bladder, and prostate cancer, the use of DWI may be beneficial in detecting lesions. Another possible option is to scan each region with different MRI sequences instead of scanning the whole body using one sequence continuously. We herein report a workflow and imaging protocols for whole-body oncologic PET/MRI using an integrated system in the clinical routine, designed for the detection, for example by cancer screening, of metastatic lesions, in order to help future users optimize their workflow and imaging protocols.

  5. Efficient generation of monoclonal antibodies from single rhesus macaque antibody secreting cells.

    Science.gov (United States)

    Meng, Weixu; Li, Leike; Xiong, Wei; Fan, Xuejun; Deng, Hui; Bett, Andrew J; Chen, Zhifeng; Tang, Aimin; Cox, Kara S; Joyce, Joseph G; Freed, Daniel C; Thoryk, Elizabeth; Fu, Tong-Ming; Casimiro, Danilo R; Zhang, Ningyan; A Vora, Kalpit; An, Zhiqiang

    2015-01-01

    Nonhuman primates (NHPs) are used as a preclinical model for vaccine development, and the antibody profiles to experimental vaccines in NHPs can provide critical information for both vaccine design and translation to clinical efficacy. However, an efficient protocol for generating monoclonal antibodies from single antibody secreting cells of NHPs is currently lacking. In this study we established a robust protocol for cloning immunoglobulin (IG) variable domain genes from single rhesus macaque (Macaca mulatta) antibody secreting cells. A sorting strategy was developed using a panel of molecular markers (CD3, CD19, CD20, surface IgG, intracellular IgG, CD27, Ki67 and CD38) to identify the kinetics of B cell response after vaccination. Specific primers for the rhesus macaque IG genes were designed and validated using cDNA isolated from macaque peripheral blood mononuclear cells. Cloning efficiency was averaged at 90% for variable heavy (VH) and light (VL) domains, and 78.5% of the clones (n = 335) were matched VH and VL pairs. Sequence analysis revealed that diverse IGHV subgroups (for VH) and IGKV and IGLV subgroups (for VL) were represented in the cloned antibodies. The protocol was tested in a study using an experimental dengue vaccine candidate. About 26.6% of the monoclonal antibodies cloned from the vaccinated rhesus macaques react with the dengue vaccine antigens. These results validate the protocol for cloning monoclonal antibodies in response to vaccination from single macaque antibody secreting cells, which have general applicability for determining monoclonal antibody profiles in response to other immunogens or vaccine studies of interest in NHPs.

  6. Process tomography via sequential measurements on a single quantum system

    CSIR Research Space (South Africa)

    Bassa, H

    2015-09-01

    Full Text Available The authors utilize a discrete (sequential) measurement protocol to investigate quantum process tomography of a single two-level quantum system, with an unknown initial state, undergoing Rabi oscillations. The ignorance of the dynamical parameters...

  7. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  8. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  9. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  10. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  11. Control protocol: large scale implementation at the CERN PS complex - a first assessment

    International Nuclear Information System (INIS)

    Abie, H.; Benincasa, G.; Coudert, G.; Davydenko, Y.; Dehavay, C.; Gavaggio, R.; Gelato, G.; Heinze, W.; Legras, M.; Lustig, H.; Merard, L.; Pearson, T.; Strubin, P.; Tedesco, J.

    1994-01-01

    The Control Protocol is a model-based, uniform access procedure from a control system to accelerator equipment. It was proposed at CERN about 5 years ago and prototypes were developed in the following years. More recently, this procedure has been finalized and implemented at a large scale in the PS Complex. More than 300 pieces of equipment are now using this protocol in normal operation and another 300 are under implementation. These include power converters, vacuum systems, beam instrumentation devices, RF equipment, etc. This paper describes how the single general procedure is applied to the different kinds of equipment. The advantages obtained are also discussed. ((orig.))

  12. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  13. Dual-energy compared to single-energy CT in pediatric imaging: a phantom study for DECT clinical guidance

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Xiaowei; Servaes, Sabah; Darge, Kassa [The Children' s Hospital of Philadelphia, Department of Radiology, Philadelphia, PA (United States); University of Pennsylvania, The Perelman School of Medicine, Philadelphia, PA (United States); McCullough, William P. [University of Virginia Health System, Department of Radiology and Medical Imaging, Charlottesville, VA (United States); Mecca, Patricia [The Children' s Hospital of Philadelphia, Department of Radiology, Philadelphia, PA (United States)

    2016-11-15

    Dual-energy CT technology is available on scanners from several vendors and offers significant advantages over classic single-energy CT technology in multiple clinical applications. Many studies have detailed dual-energy CT applications in adults and several have evaluated the relative radiation dose performance of dual-energy CT in adult imaging. However, little has been published on dual-energy CT imaging in the pediatric population, and the relative dose performance of dual-energy CT imaging in the pediatric population is not well described. When evaluating dual-energy CT technology for implementation into a routine clinical pediatric imaging practice, the radiation dose implications must be considered, and when comparing relative CT dose performance, image quality must also be evaluated. Therefore the purpose of this study is to develop dual-energy CT scan protocols based on our optimized single-energy scan protocols and compare the dose. We scanned the head, chest and abdomen regions of pediatric-size anthropomorphic phantoms with contrast inserts, using our optimized single-energy clinical imaging protocols on a Siemens Flash {sup registered} CT scanner. We then scanned the phantoms in dual-energy mode using matching image-quality reference settings. The effective CT dose index volume (CTDI{sub vol}) of the scans was used as a surrogate for relative dose in comparing the single- and dual-energy scans. Additionally, we evaluated image quality using visual assessment and contrast-to-noise ratio. Dual-energy CT scans of the head and abdomen were dose-neutral for all three phantoms. Dual-energy CT scans of the chest showed a relative dose increase over the single-energy scan for 1- and 5-year-old child-based age-equivalent phantoms, ranging 11-20%. Quantitative analysis of image quality showed no statistically significant difference in image quality between the single-energy and dual-energy scans. There was no clinically significant difference in image quality by

  14. Single Photon Sources in Silicon Carbide

    International Nuclear Information System (INIS)

    Brett Johnson

    2014-01-01

    Single photon sources in semiconductors are highly sought after as they constitute the building blocks of a diverse range of emerging technologies such as integrated quantum information processing, quantum metrology and quantum photonics. In this presentation, we show the first observation of single photon emission from deep level defects in silicon carbide (SiC). The single photon emission is photo-stable at room temperature and surprisingly bright. This represents an exciting alternative to diamond color centers since SiC possesses well-established growth and device engineering protocols. The defect is assigned to the carbon vacancy-antisite pair which gives rise to the AB photoluminescence lines. We discuss its photo-physical properties and their fabrication via electron irradiation. Preliminary measurements on 3C SiC nano-structures will also be discussed. (author)

  15. Single reading with computer-aided detection performed by selected radiologists in a breast cancer screening program

    Energy Technology Data Exchange (ETDEWEB)

    Bargalló, Xavier, E-mail: xbarga@clinic.cat [Department of Radiology (CDIC), Hospital Clínic de Barcelona, C/ Villarroel, 170, 08036 Barcelona (Spain); Santamaría, Gorane; Amo, Montse del; Arguis, Pedro [Department of Radiology (CDIC), Hospital Clínic de Barcelona, C/ Villarroel, 170, 08036 Barcelona (Spain); Ríos, José [Biostatistics and Data Management Core Facility, IDIBAPS, (Hospital Clinic) C/ Mallorca, 183. Floor -1. Office #60. 08036 Barcelona (Spain); Grau, Jaume [Preventive Medicine and Epidemiology Unit, Hospital Clínic de Barcelona, C/ Villarroel, 170, 08036 Barcelona (Spain); Burrel, Marta; Cores, Enrique; Velasco, Martín [Department of Radiology (CDIC), Hospital Clínic de Barcelona, C/ Villarroel, 170, 08036 Barcelona (Spain)

    2014-11-15

    Highlights: • 1-The cancer detection rate of the screening program improved using a single reading protocol by experienced radiologists assisted by CAD. • 2-The cancer detection rate improved at the cost of increasing recall rate. • 3-CAD, used by breast radiologists, did not help to detect more cancers. - Abstract: Objectives: To assess the impact of shifting from a standard double reading plus arbitration protocol to a single reading by experienced radiologists assisted by computer-aided detection (CAD) in a breast cancer screening program. Methods: This was a prospective study approved by the ethics committee. Data from 21,321 consecutive screening mammograms in incident rounds (2010–2012) were read following a single reading plus CAD protocol and compared with data from 47,462 consecutive screening mammograms in incident rounds (2004–2010) that were interpreted following a double reading plus arbitration protocol. For the single reading, radiologists were selected on the basis of the appraisement of their previous performance. Results: Period 2010–2012 vs. period 2004–2010: Cancer detection rate (CDR): 6.1‰ (95% confidence interval: 5.1–7.2) vs. 5.25‰; Recall rate (RR): 7.02% (95% confidence interval: 6.7–7.4) vs. 7.24% (selected readers before arbitration) and vs. 3.94 (all readers after arbitration); Predictive positive value of recall: 8.69% vs. 13.32%. Average size of invasive cancers: 14.6 ± 9.5 mm vs. 14.3 ± 9.5 mm. Stage: 0 (22.3/26.1%); I (59.2/50.8%); II (19.2/17.1%); III (3.1/3.3%); IV (0/1.9%). Specialized breast radiologists performed better than general radiologists. Conclusions: The cancer detection rate of the screening program improved using a single reading protocol by experienced radiologists assisted by CAD, at the cost of a moderate increase of the recall rate mainly related to the lack of arbitration.

  16. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  17. Repurposing a Benchtop Centrifuge for High-Throughput Single-Molecule Force Spectroscopy.

    Science.gov (United States)

    Yang, Darren; Wong, Wesley P

    2018-01-01

    We present high-throughput single-molecule manipulation using a benchtop centrifuge, overcoming limitations common in other single-molecule approaches such as high cost, low throughput, technical difficulty, and strict infrastructure requirements. An inexpensive and compact Centrifuge Force Microscope (CFM) adapted to a commercial centrifuge enables use by nonspecialists, and integration with DNA nanoswitches facilitates both reliable measurements and repeated molecular interrogation. Here, we provide detailed protocols for constructing the CFM, creating DNA nanoswitch samples, and carrying out single-molecule force measurements.

  18. The Effect of Nicotine Administration on Physical and Psychological Signs of Withdrawal Syndrome Induced by Single or Frequent Doses of Morphine in Rats

    OpenAIRE

    Mohammad Allahtavakoli; Fatemeh Amin; Elham Hakimizadeh; Ali Roohbakhsh; Sayed Ali Haeri Rohani; Ahmad Taghavi Rafsanjani; Abbas Haghparast; Ali Shamsizadeh

    2012-01-01

    Introduction. Morphine addiction and morphine withdrawal syndrome are the two main problems of today’s human society. The present study has investigated the effects of nicotine on the strength of physical and psychological dependency in single and repeated doses morphine administrated rats. Materials and methods. Male Wistar rats were subjected to morphine consumption with single or frequent dose protocols. In the single dose protocol, rats received only one dose of morphine and 24hrs later t...

  19. Comparison of absorbed dose of two protocols of tomographic scanning in PET/CT exams

    International Nuclear Information System (INIS)

    Paiva, F.G.

    2017-01-01

    Positron Emission Tomography (PET) associated with Computed Tomography (CT) allows the fusion of functional and anatomical images. When compared to other diagnostic techniques, PET-CT subjects patients to higher levels of radiation, because two modalities are used in a single exam. In this study, the doses absorbed in 19 patient organs from the tomographic scan were evaluated. Radiochromic films were correctly positioned in the Alderson anthropomorphic simulator, male version. For evaluation, two whole body scan protocols were compared. For evaluation, two whole body scan protocols were compared. An increase of up to 600% in the absorbed dose in the pituitary was observed when the protocols were compared, with the lowest observed increase of approximately 160% for the liver. It is concluded that the dose from CT in patients submitted to PET-CT scanning is higher in the protocol used for diagnosis. Considering the high cost of PET-CT exam, in many cases it is preferable that the CT examination is of diagnostic quality, and not only for anatomical mapping, an argument based on the Principle of Justification

  20. Cost effectiveness of a protocol using palivizumab in preterm infants

    Directory of Open Access Journals (Sweden)

    Yolanda Hernández-Gago

    2017-03-01

    Full Text Available Objective: The main objective was to evaluate the cost-effectiveness of protocol use of palivizumab in premature established by consensus in our Hospital comparing it based on the recommendations of various Scientific Societies. As a secondary objective risk factors and severity of hospitalized patients attending the established protocol in our Hospital were analyzed. Methods: The study period was 4 seasons with the expanded protocol (retrospective data versus 2 with restricted or agreed protocol (prospective data. The perspective of the study was the Health System, including the costs of hospitalization and palivizumab our center. The calculation of the effectiveness was determined with the admission rate of premature patients stratified by weeks of gestational age <29, <32; and <35. For the analysis of risk factors and severity in patients admitted seasons with the new protocol are collected prospectively clinical data and environmental and social factors. Results: In the range of gestational age <29 years old and <32 greater effectiveness of the extended protocol was not demonstrated against the consensus. Only more effective for EG <35 in the accumulated data and comparing seasons 12/13 and 08/09 to 13/14 for individual data was observed. This range has an associated incremental cost effectiveness ratio of € 53 250,07 (range: € 14 793,39 to € 90 446,47 for singles data and € 50 525,53 (€ 28 688.22 to € 211 575,65 for accumulated. The establishment of this protocol in our center meant an average saving per season € 169 911,51. A cost- effectiveness of the extended protocol appropriate relationship is found if the cost of palivizumab per patient was less than € 1 206,67 (calculated for maximum use of the vial and a higher rate of hospitalization of 9.21%. Children entering the season with the new protocol (season 12/13 and 13/14 are 63.4% in children under 3 months and 90% are term infants who do not belong to any population at

  1. Displacement-enhanced entanglement distillation of single-mode-squeezed entangled states

    DEFF Research Database (Denmark)

    Tipsmark, Anders; Neergaard-Nielsen, Jonas Schou; Andersen, Ulrik Lund

    2013-01-01

    It has been shown that entanglement distillation of Gaussian entangled states by means of local photon subtraction can be improved by local Gaussian transformations. Here we show that a similar effect can be expected for the distillation of an asymmetric Gaussian entangled state that is produced...... by a single squeezed beam. We show that for low initial entanglement, our largely simplified protocol generates more entanglement than previous proposed protocols. Furthermore, we show that the distillation scheme also works efficiently on decohered entangled states as well as with a practical photon...

  2. Online evolution reconstruction from a single measurement record with random time intervals for quantum communication

    Science.gov (United States)

    Zhou, Hua; Su, Yang; Wang, Rong; Zhu, Yong; Shen, Huiping; Pu, Tao; Wu, Chuanxin; Zhao, Jiyong; Zhang, Baofu; Xu, Zhiyong

    2017-10-01

    Online reconstruction of a time-variant quantum state from the encoding/decoding results of quantum communication is addressed by developing a method of evolution reconstruction from a single measurement record with random time intervals. A time-variant two-dimensional state is reconstructed on the basis of recovering its expectation value functions of three nonorthogonal projectors from a random single measurement record, which is composed from the discarded qubits of the six-state protocol. The simulated results prove that our method is robust to typical metro quantum channels. Our work extends the Fourier-based method of evolution reconstruction from the version for a regular single measurement record with equal time intervals to a unified one, which can be applied to arbitrary single measurement records. The proposed protocol of evolution reconstruction runs concurrently with the one of quantum communication, which can facilitate the online quantum tomography.

  3. Comparison of Channel Estimation Protocols for Coherent AF Relaying Networks in the Presence of Additive Noise and LO Phase Noise

    Directory of Open Access Journals (Sweden)

    Stefan Berger

    2010-01-01

    Full Text Available Channel estimation protocols for wireless two-hop networks with amplify-and-forward (AF relays are compared. We consider multiuser relaying networks, where the gain factors are chosen such that the signals from all relays add up coherently at the destinations. While the destinations require channel knowledge in order to decode, our focus lies on the channel estimates that are used to calculate the relay gains. Since knowledge of the compound two-hop channels is generally not sufficient to do this, the protocols considered here measure all single-hop coefficients in the network. We start from the observation that the direction in which the channels are measured determines (1 the number of channel uses required to estimate all coefficient and (2 the need for global carrier phase reference. Four protocols are identified that differ in the direction in which the first-hop and the second-hop channels are measured. We derive a sensible measure for the accuracy of the channel estimates in the presence of additive noise and phase noise and compare the protocols based on this measure. Finally, we provide a quantitative performance comparison for a simple single-user application example. It is important to note that the results can be used to compare the channel estimation protocols for any two-hop network configuration and gain allocation scheme.

  4. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  5. Is IVF-served two different ways-more cost-effective than IUI with controlled ovarian hyperstimulation?

    NARCIS (Netherlands)

    Tjon-Kon-Fat, R. I.; Bensdorp, A. J.; Bossuyt, P. M. M.; Koks, C.; Oosterhuis, G. J. E.; Hoek, A.; Hompes, P.; Broekmans, F. J.; Verhoeve, H. R.; de Bruin, J. P.; van Golde, R.; Repping, S.; Cohlen, B. J.; Lambers, M. D. A.; van Bommel, P. F.; Slappendel, E.; Perquin, D.; Smeenk, J.; Pelinck, M. J.; Gianotten, J.; Hoozemans, D. A.; Maas, J. W. M.; Groen, H.; Eijkemans, M. J. C.; van der Veen, F.; Mol, B. W. J.; van Wely, M.

    2015-01-01

    STUDY QUESTION: What is the cost-effectiveness of in vitro fertilization(IVF) with conventional ovarian stimulation, single embryotransfer (SET) and subsequent cryocycles or IVF in a modified natural cycle (MNC) compared with intrauterine insemination with controlled ovarian hyperstimulation

  6. Standardized Duplex Ultrasound-Based Protocol for Early Diagnosis of Transplant Renal Artery Stenosis: Results of a Single-Institution Retrospective Cohort Study

    Directory of Open Access Journals (Sweden)

    Vincenzo Li Marzi

    2018-01-01

    Full Text Available Transplant renal artery stenosis (TRAS is the most frequent vascular complication after kidney transplantation (KT and has been associated with potentially reversible refractory hypertension, graft dysfunction, and reduced patient survival. The aim of the study is to describe the outcomes of a standardized Duplex Ultrasound- (DU- based screening protocol for early diagnosis of TRAS and for selection of patients potentially requiring endovascular intervention. We retrospectively reviewed our prospectively collected database of KT from January 1998 to select patients diagnosed with TRAS. The follow-up protocol was based on a risk-adapted, dynamic subdivision of eligible KT patients in different risk categories (RC with different protocol strategies (PS. Of 598 patients included in the study, 52 (9% patients had hemodynamically significant TRAS and underwent percutaneous angioplasty (PTA and stent placement. Technical and clinical success rates were 97% and 90%, respectively. 7 cases of restenosis were recorded at follow-up and treated with re-PTA plus stenting. Both DU imaging and clinical parameters improved after stent placement. Prospective high-quality studies are needed to test the efficacy and safety of our protocol in larger series. Accurate trial design and standardized reporting of patient outcomes will be key to address the current clinical needs.

  7. Augmented Quadruple-Phase Contrast Media Administration and Triphasic Scan Protocol Increases Image Quality at Reduced Radiation Dose During Computed Tomography Urography.

    Science.gov (United States)

    Saade, Charbel; Mohamad, May; Kerek, Racha; Hamieh, Nadine; Alsheikh Deeb, Ibrahim; El-Achkar, Bassam; Tamim, Hani; Abdul Razzak, Farah; Haddad, Maurice; Abi-Ghanem, Alain S; El-Merhi, Fadi

    The aim of this article was to investigate the opacification of the renal vasculature and the urogenital system during computed tomography urography by using a quadruple-phase contrast media in a triphasic scan protocol. A total of 200 patients with possible urinary tract abnormalities were equally divided between 2 protocols. Protocol A used the conventional single bolus and quadruple-phase scan protocol (pre, arterial, venous, and delayed), retrospectively. Protocol B included a quadruple-phase contrast media injection with a triphasic scan protocol (pre, arterial and combined venous, and delayed), prospectively. Each protocol used 100 mL contrast and saline at a flow rate of 4.5 mL. Attenuation profiles and contrast-to-noise ratio of the renal arteries, veins, and urogenital tract were measured. Effective radiation dose calculation, data analysis by independent sample t test, receiver operating characteristic, and visual grading characteristic analyses were performed. In arterial circulation, only the inferior interlobular arteries in both protocols showed a statistical significance (P contrast-to-noise ratio than protocol A (protocol B: 22.68 ± 13.72; protocol A: 14.75 ± 5.76; P contrast media and triphasic scan protocol usage increases the image quality at a reduced radiation dose.

  8. Next generation internet protocol marks shattered in Internet2 land speed record competition

    CERN Multimedia

    2003-01-01

    "An international team set new Internet2 Land Speed Records using next generation Internet Protocols (IPv6) by achieving 983 megabits-per-second with a single IPv6 stream for more than an hour across a distance of 7,067 kilometers (more than 4,000 miles) from Geneva, Switzerland to Chicago, Ill." (1 page).

  9. Is IVF-served two different ways-more cost-effective than IUI with controlled ovarian hyperstimulation?

    NARCIS (Netherlands)

    Tjon-Kon-Fat, R. I.; Bensdorp, A. J.; Bossuyt, P. M M; Koks, C.; Oosterhuis, G. J E; Hoek, A.; Hompes, P.; Broekmans, F. J.; Verhoeve, H. R.; De Bruin, J. P.; Van Golde, R.; Repping, S.; Cohlen, B. J.; Lambers, M. D A; Van Bommel, P. F.; Slappendel, E.; Perquin, D.; Smeenk, J.; Pelinck, M. J.; Gianotten, J.; Hoozemans, D. A.; Maas, J. W M; Groen, H.; Eijkemans, M. J C; Van Der Veen, F.; Mol, B. W J; Van Wely, M.

    2015-01-01

    STUDY QUESTION What is the cost-effectiveness of in vitro fertilization (IVF) with conventional ovarian stimulation, single embryo transfer (SET) and subsequent cryocycles or IVF in a modified natural cycle (MNC) compared with intrauterine insemination with controlled ovarian hyperstimulation

  10. Early Loaded Single Implant Reinforced Mandibular Overdenture

    Directory of Open Access Journals (Sweden)

    K. Nischal

    2016-01-01

    Full Text Available Rehabilitating atrophied mandible with two-implant supported denture is a common treatment modality for implant retained removable overdenture in mandible. This paper aims to design a treatment modality where single implant reinforced overdenture is fabricated for a severely atrophied mandibular ridge with early loading protocol. Results of studies have shown that a single implant mandibular overdenture significantly increases the satisfaction and quality of life of patients with edentulism. Midline fracture of the prosthesis is the most common complication related to single implant and two-implant retained mandibular overdentures. To manage such complication, a thin metal mesh is used to reinforce the overdenture and also to make the prostheses lighter and cost effective as compared to conventional cast metal framework.

  11. Improved detection of fill-in using sublingual nitroglycerin in technetium-99m tetrofosmin exercise/rest single photon emission computed tomography one day protocol for old myocardial infarction

    International Nuclear Information System (INIS)

    Miyanaga, Hajime; Kunieda, Yasufumi; Oguni, Atsuhiko; Kamitani, Tadaaki; Kawasaki, Shingo; Takahashi, Toru

    1999-01-01

    Twenty-one patients with old myocardial infarction underwent repeated 99m Tc-tetrofosmin ( 99m Tc) exercise/rest same day protocols with and without the administration of sublingual nitroglycerin (NTG) 5 min before the second injection of 99m Tc for rest SPECT. Twelve of these patients also underwent ordinary exercise/redistribution 201 Tl SPECT. The control study protocol images showed decreased uptake of 99m Tc on exercise in 157 of 420 segments and the presence of fill-in at rest in 58 segments. Images obtained with administration of NTG showed decreased uptake of 99m Tc on exercise in 163 of 420 segments and fill-in in 74 segments at rest. The frequency of fill-in was greater in the NTG protocol than in the control protocol. The segments were scored as different grades according to 99m Tc uptake between 2 protocols. Fill-in was only present or more remarkable in 31 segments in the NTG protocol than in the control protocol. Fill-in was only present or more remarkable in 10 segments in the control protocol than in the NTG protocol. In the NTG protocol, the mean defect score of the exercise images, calculated from the bull's eye image automatically, was higher than that of the rest images. The mean severity score of the exercise images, also calculated from the bull's eye image automatically, was likewise higher than that of the rest images, whereas the mean severity score of the stress images and rest images in the control protocol was not significantly different. Moreover, the mean defect score and severity score of the rest images from the NTG protocol were significantly lower than those obtained from the control protocol. Sublingual NTG administration before the injection of 99m Tc-tetrofosmin at the rest study in the one day exercise/rest studies enhanced fill-in, so may enhance the detection of viable myocardium, allowing more informed decisions regarding cardiac revascularization in patients with chronic coronary artery disease. (K.H.)

  12. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.

    Science.gov (United States)

    Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan

    2018-03-02

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.

  13. Capturing Three-Dimensional Genome Organization in Individual Cells by Single-Cell Hi-C.

    Science.gov (United States)

    Nagano, Takashi; Wingett, Steven W; Fraser, Peter

    2017-01-01

    Hi-C is a powerful method to investigate genome-wide, higher-order chromatin and chromosome conformations averaged from a population of cells. To expand the potential of Hi-C for single-cell analysis, we developed single-cell Hi-C. Similar to the existing "ensemble" Hi-C method, single-cell Hi-C detects proximity-dependent ligation events between cross-linked and restriction-digested chromatin fragments in cells. A major difference between the single-cell Hi-C and ensemble Hi-C protocol is that the proximity-dependent ligation is carried out in the nucleus. This allows the isolation of individual cells in which nearly the entire Hi-C procedure has been carried out, enabling the production of a Hi-C library and data from individual cells. With this new method, we studied genome conformations and found evidence for conserved topological domain organization from cell to cell, but highly variable interdomain contacts and chromosome folding genome wide. In addition, we found that the single-cell Hi-C protocol provided cleaner results with less technical noise suggesting it could be used to improve the ensemble Hi-C technique.

  14. Latest Advances in the Generation of Single Photons in Silicon Carbide

    Directory of Open Access Journals (Sweden)

    Albert Boretti

    2016-06-01

    Full Text Available The major barrier for optical quantum information technologies is the absence of reliable single photons sources providing non-classical light states on demand which can be easily and reliably integrated with standard processing protocols for quantum device fabrication. New methods of generation at room temperature of single photons are therefore needed. Heralded single photon sources are presently being sought based on different methods built on different materials. Silicon Carbide (SiC has the potentials to serve as the preferred material for quantum applications. Here, we review the latest advances in single photon generation at room temperatures based on SiC.

  15. Effects of Modification of Pain Protocol on Incidence of Post Operative Nausea and Vomiting.

    Science.gov (United States)

    Schwarzkopf, Ran; Snir, Nimrod; Sharfman, Zachary T; Rinehart, Joseph B; Calderon, Michael-David; Bahn, Esther; Harrington, Brian; Ahn, Kyle

    2016-01-01

    A Perioperative Surgical Home (PSH) care model applies a standardized multidisciplinary approach to patient care using evidence-based medicine to modify and improve protocols. Analysis of patient outcome measures, such as postoperative nausea and vomiting (PONV), allows for refinement of existing protocols to improve patient care. We aim to compare the incidence of PONV in patients who underwent primary total joint arthroplasty before and after modification of our PSH pain protocol. All total joint replacement PSH (TJR-PSH) patients who underwent primary THA (n=149) or TKA (n=212) in the study period were included. The modified protocol added a single dose of intravenous (IV) ketorolac given in the operating room and oxycodone immediate release orally instead of IV Hydromorphone in the Post Anesthesia Care Unit (PACU). The outcomes were (1) incidence of PONV and (2) average pain score in the PACU. We also examined the effect of primary anesthetic (spinal vs . GA) on these outcomes. The groups were compared using chi-square tests of proportions. The incidence of post-operative nausea in the PACU decreased significantly with the modified protocol (27.4% vs . 38.1%, p=0.0442). There was no difference in PONV based on choice of anesthetic or procedure. Average PACU pain scores did not differ significantly between the two protocols. Simple modifications to TJR-PSH multimodal pain management protocol, with decrease in IV narcotic use, resulted in a lower incidence of postoperative nausea, without compromising average PACU pain scores. This report demonstrates the need for continuous monitoring of PSH pathways and implementation of revisions as needed.

  16. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  17. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  18. MeshTree: A Delay optimised Overlay Multicast Tree Building Protocol

    OpenAIRE

    Tan, Su-Wei; Waters, A. Gill; Crawford, John

    2005-01-01

    We study decentralised low delay degree-constrained overlay multicast tree construction for single source real-time applications. This optimisation problem is NP-hard even if computed centrally. We identify two problems in traditional distributed solutions, namely the greedy problem and delay-cost trade-off. By offering solutions to these problems, we propose a new self-organising distributed tree building protocol called MeshTree. The main idea is to embed the delivery tree in a degree-bound...

  19. Energy efficient medium access protocol for wireless medical body area sensor networks.

    Science.gov (United States)

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process.

  20. Performance analysis of signaling protocols on OBS switches

    Science.gov (United States)

    Kirci, Pinar; Zaim, A. Halim

    2005-10-01

    In this paper, Just-In-Time (JIT), Just-Enough-Time (JET) and Horizon signalling schemes for Optical Burst Switched Networks (OBS) are presented. These signaling schemes run over a core dWDM network and a network architecture based on Optical Burst Switches (OBS) is proposed to support IP, ATM and Burst traffic. In IP and ATM traffic several packets are assembled in a single packet called burst and the burst contention is handled by burst dropping. The burst length distribution in IP traffic is arbitrary between 0 and 1, and is fixed in ATM traffic at 0,5. Burst traffic on the other hand is arbitrary between 1 and 5. The Setup and Setup ack length distributions are arbitrary. We apply the Poisson model with rate λ and Self-Similar model with pareto distribution rate α to identify inter-arrival times in these protocols. We consider a communication between a source client node and a destination client node over an ingress and one or more multiple intermediate switches.We use buffering only in the ingress node. The communication is based on single burst connections in which, the connection is set up just before sending a burst and then closed as soon as the burst is sent. Our analysis accounts for several important parameters, including the burst setup, burst setup ack, keepalive messages and the optical switching protocol. We compare the performance of the three signalling schemes on the network under as burst dropping probability under a range of network scenarios.

  1. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  2. Blockchain protocols in clinical trials: Transparency and traceability of consent

    Science.gov (United States)

    Benchoufi, Mehdi; Porcher, Raphael; Ravaud, Philippe

    2018-01-01

    Clinical trial consent for protocols and their revisions should be transparent for patients and traceable for stakeholders. Our goal is to implement a process allowing for collection of patients’ informed consent, which is bound to protocol revisions, storing and tracking the consent in a secure, unfalsifiable and publicly verifiable way, and enabling the sharing of this information in real time. For that, we build a consent workflow using a trending technology called Blockchain. This is a distributed technology that brings a built-in layer of transparency and traceability. From a more general and prospective point of view, we believe Blockchain technology brings a paradigmatical shift to the entire clinical research field. We designed a Proof-of-Concept protocol consisting of time-stamping each step of the patient’s consent collection using Blockchain, thus archiving and historicising the consent through cryptographic validation in a securely unfalsifiable and transparent way. For each protocol revision, consent was sought again.  We obtained a single document, in an open format, that accounted for the whole consent collection process: a time-stamped consent status regarding each version of the protocol. This document cannot be corrupted and can be checked on any dedicated public website. It should be considered a robust proof of data. However, in a live clinical trial, the authentication system should be strengthened to remove the need for third parties, here trial stakeholders, and give participative control to the peer users. In the future, the complex data flow of a clinical trial could be tracked by using Blockchain, which core functionality, named Smart Contract, could help prevent clinical trial events not occurring in the correct chronological order, for example including patients before they consented or analysing case report form data before freezing the database. Globally, Blockchain could help with reliability, security, transparency and could be

  3. Blockchain protocols in clinical trials: Transparency and traceability of consent.

    Science.gov (United States)

    Benchoufi, Mehdi; Porcher, Raphael; Ravaud, Philippe

    2017-01-01

    Clinical trial consent for protocols and their revisions should be transparent for patients and traceable for stakeholders. Our goal is to implement a process allowing for collection of patients' informed consent, which is bound to protocol revisions, storing and tracking the consent in a secure, unfalsifiable and publicly verifiable way, and enabling the sharing of this information in real time. For that, we build a consent workflow using a trending technology called Blockchain. This is a distributed technology that brings a built-in layer of transparency and traceability. From a more general and prospective point of view, we believe Blockchain technology brings a paradigmatical shift to the entire clinical research field. We designed a Proof-of-Concept protocol consisting of time-stamping each step of the patient's consent collection using Blockchain, thus archiving and historicising the consent through cryptographic validation in a securely unfalsifiable and transparent way. For each protocol revision, consent was sought again.  We obtained a single document, in an open format, that accounted for the whole consent collection process: a time-stamped consent status regarding each version of the protocol. This document cannot be corrupted and can be checked on any dedicated public website. It should be considered a robust proof of data. However, in a live clinical trial, the authentication system should be strengthened to remove the need for third parties, here trial stakeholders, and give participative control to the peer users. In the future, the complex data flow of a clinical trial could be tracked by using Blockchain, which core functionality, named Smart Contract, could help prevent clinical trial events not occurring in the correct chronological order, for example including patients before they consented or analysing case report form data before freezing the database. Globally, Blockchain could help with reliability, security, transparency and could be a

  4. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  5. Retrospective study of factors affecting intrauterine insemination pregnancy outcome: The impact of male habits and working environment

    Directory of Open Access Journals (Sweden)

    Matheswari Govindarajan

    2017-01-01

    Full Text Available Aims: This study is aimed at determining the prognostic factors influencing successful pregnancy following intrauterine insemination (IUI. Settings and design: Retrospective analysis. Materials and Methods: A total of 2123 cycles undergone by 871 couples during the period of 5 years (2011–2015 were retrospectively studied. Statistical Analysis Used: Each of the factors was compared with pregnancy outcome (PO using statistical analysis with a confidence interval of 95% in SPSS software version 19. Chi-square test and logistic regression analysis method were used to determine the significance of each factor with the PO. Results: Among the various factors included in our study population, male habits (P = 0.004, male occupational environment (P = 0.025, male age (P = 0.002, and female age (P = 0.001 were found to significantly influence the PO following IUI. Conclusion: Our results indicate that avoiding smoking and alcohol consuming prior and during the IUI treatment along with working in low-heat-generating environment might lead to better success following the treatment.

  6. Computer-Assisted Sperm Analysis (CASA) parameters and their evolution during preparation as predictors of pregnancy in intrauterine insemination with frozen-thawed donor semen cycles.

    Science.gov (United States)

    Fréour, Thomas; Jean, Miguel; Mirallié, Sophie; Dubourdieu, Sophie; Barrière, Paul

    2010-04-01

    To study the potential of CASA parameters in frozen-thawed donor semen before and after preparation on silica gradient as predictors of pregnancy in IUI with donor semen cycles. CASA parameters were measured in thawed donor semen before and after preparation on a silica gradient in 132 couples undergoing 168 IUI cycles with donor semen. The evolution of these parameters throughout this process was calculated. The relationship with cycle outcome was then studied. Clinical pregnancy rate was 18.4% per cycle. CASA parameters on donor semen before or after preparation were not significantly different between pregnancy and failure groups. However, amplitude of lateral head displacement (ALH) of spermatozoa improved in all cycles where pregnancy occurred, thus predicting pregnancy with a sensitivity of 100% and a specificity of 20%. Even if CASA parameters do not seem to predict pregnancy in IUI with donor semen cycles, their evolution during the preparation process should be evaluated, especially for ALH. However, the link between ALH improvement during preparation process and pregnancy remains to be explored. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  7. Dual-energy compared to single-energy CT in pediatric imaging: a phantom study for DECT clinical guidance

    International Nuclear Information System (INIS)

    Zhu, Xiaowei; Servaes, Sabah; Darge, Kassa; McCullough, William P.; Mecca, Patricia

    2016-01-01

    Dual-energy CT technology is available on scanners from several vendors and offers significant advantages over classic single-energy CT technology in multiple clinical applications. Many studies have detailed dual-energy CT applications in adults and several have evaluated the relative radiation dose performance of dual-energy CT in adult imaging. However, little has been published on dual-energy CT imaging in the pediatric population, and the relative dose performance of dual-energy CT imaging in the pediatric population is not well described. When evaluating dual-energy CT technology for implementation into a routine clinical pediatric imaging practice, the radiation dose implications must be considered, and when comparing relative CT dose performance, image quality must also be evaluated. Therefore the purpose of this study is to develop dual-energy CT scan protocols based on our optimized single-energy scan protocols and compare the dose. We scanned the head, chest and abdomen regions of pediatric-size anthropomorphic phantoms with contrast inserts, using our optimized single-energy clinical imaging protocols on a Siemens Flash "r"e"g"i"s"t"e"r"e"d CT scanner. We then scanned the phantoms in dual-energy mode using matching image-quality reference settings. The effective CT dose index volume (CTDI_v_o_l) of the scans was used as a surrogate for relative dose in comparing the single- and dual-energy scans. Additionally, we evaluated image quality using visual assessment and contrast-to-noise ratio. Dual-energy CT scans of the head and abdomen were dose-neutral for all three phantoms. Dual-energy CT scans of the chest showed a relative dose increase over the single-energy scan for 1- and 5-year-old child-based age-equivalent phantoms, ranging 11-20%. Quantitative analysis of image quality showed no statistically significant difference in image quality between the single-energy and dual-energy scans. There was no clinically significant difference in image quality

  8. Carboplatin Hypersensitivity Reactions in Pediatric Low Grade Glioma Are Protocol Specific and Desensitization Shows Poor Efficacy.

    Science.gov (United States)

    Dodgshun, Andrew J; Hansford, Jordan R; Cole, Theresa; Choo, Sharon; Sullivan, Michael J

    2016-01-01

    The use of carboplatin for the treatment of pediatric low grade gliomas (PLGG) is often limited by the development of carboplatin hypersensitivity. Reported rates of carboplatin hypersensitivity reactions vary between 6% and 32% in these patients. Here we report the frequency of carboplatin hypersensitivity reactions depending on the treatment regimen used, and outcomes of carboplatin desensitization. The records of all patients in a single institution who were treated with carboplatin for PLGG were accessed and all patients receiving more than one dose of carboplatin are reported. Thirty four patients with PLGG were treated with carboplatin according to one of the two different regimens. Carboplatin hypersensitivity was documented in 47% of patients, but the frequency differed by treatment protocol. Those patients treated with 4-weekly single agent carboplatin had carboplatin allergy in 8% of cases whereas 68% of those treated with combined carboplatin and vincristine (every three weeks, according to the SIOP 2004 low grade glioma protocol) had carboplatin reactions (OR 23.6, P Desensitization was only successful in two out of 10 patients in whom it was attempted. Hypersensitivity reactions to carboplatin are more common in this cohort than previously reported and rates are protocol-dependent. Desensitization showed limited effectiveness in this cohort. © 2015 Wiley Periodicals, Inc.

  9. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  10. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  11. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  12. Projecting the potential impact of the Cap-Score™ on clinical pregnancy, live births, and medical costs in couples with unexplained infertility.

    Science.gov (United States)

    Babigumira, Joseph B; Sharara, Fady I; Garrison, Louis P

    2018-01-01

    The Cap-Score™ was developed to assess the capacitation status of men, thereby enabling personalized management of unexplained infertility by choosing timed intrauterine insemination (IUI), versus immediate in vitro fertilization (IVF) or intracytoplasmic sperm injection (ICSI) in individuals with a low Cap-Score™. The objective of this study was to estimate the differences in outcomes and costs comparing the use of the Cap-Score™ with timed IUI (CS-TI) and the standard of care (SOC), which was assumed to be three IUI cycles followed by three IVF-ICSI cycles. We developed and parameterized a decision-analytic model of management of unexplained infertility for women based on data from the published literature. We calculated the clinical pregnancy rates, live birth rates, and medical costs comparing CS-TI and SOC. We used Monte Carlo simulation to quantify uncertainty in projected estimates and performed univariate sensitivity analysis. Compared to SOC, CS-TI was projected to increase the pregnancy rate by 1-26%, marginally reduce live birth rates by 1-3% in couples with women below 40 years, increase live birth rates by 3-7% in couples with women over 40 years, reduce mean medical costs by $4000-$19,200, reduce IUI costs by $600-$1370, and reduce IVF costs by $3400-$17,800, depending on the woman's age. The Cap-Score™ is a potentially valuable clinical tool for management of unexplained infertility because it is projected to improve clinical pregnancy rates, save money, and, depending on the price of the test, increase access to treatment for infertility.

  13. Sperm quality after swim up and density gradient centrifugation sperm preparation with supplementation of alpha lipoic acid (ALA): A preliminary study

    Science.gov (United States)

    Lestari, Silvia W.; Lestari, Sarah H.; Pujianto, Dwi A.

    2018-02-01

    Intra uterine insemination (IUI) as one of the treatment for infertility, persists low success rate. A factor that contributes to the unsuccessful of IUI is sperm preparation, performed through Swim-up (SU) and Density Gradient Centrifugation (DGC) methods. Furthermore, studies have shown that Alpha Lipoic Acid (ALA) is a potent antioxidant that could enhance the sperm motility and protect the DNA integrity of the sperm [1]. This study is aimed to re-evaluate the efficiency of the DGC and SU methods in selecting sperm before being transferred for IUI by the supplementation of ALA based on the sperm DNA integrity. Semen samples were obtained from 13 men from partners of women who are infertile (normozoospermia) and underwent IUI. Semen analysis based on the guideline of World Health Organization (WHO) 2010 was performed to measure the sperm motility and velocity, before and after sperm preparation. Then, samples were incubated with Alpha Lipoic Acid (ALA) in 0.625 mg (ALA 1), 1.25 mg (ALA 2) and 2.5 mg (ALA 3). The Sperm Chromatin Dispersion (SCD) test was performed to evaluate the sperm DNA Fragmentation Index (DFI). The percentage of motile sperm was higher in prepared sperm (post-DGC and post-SU) than in whole semen. Furthermore, the percentage of motile sperm was higher in post-DGC compared to post-SU. The level of DFI after the supplementation of ALA was decreased in prepared sperm compared to the whole semen. ALA was proved capable to select the better sperm quality with decreased sperm DNA fragmentation of prepared sperm in the all of DFI category.

  14. Assisted reproductive medicine in Poland --Fertility and Sterility Special Interest Group of the Polish Gynaecological Society (SPiN PTG) 2012 report.

    Science.gov (United States)

    Janicka, Anna; Spaczyńiski, Robert Z; Kurzawa, Rafał

    2015-12-01

    The aim of this report is to present data concerning results and complications related to infertility treatment using assisted reproductive technology (ART) and insemination (IUI) in Poland in 2012. The report was prepared by the Fertility and Sterility Special Interest Group of the Polish Gynaecological Society (SPiN PTG), based on individual data provided by fertility clinics. Reporting was voluntary data were not subject to external verification. The report presents the availability and the structure of infertility treatment services, the number of procedures performed, their effectiveness and the most common complications. In 2014, 34 Polish fertility clinics provided information to the report, presenting data from 2012. The total number of reported treatment cycles using ART was 17,116 (incl. 10,714 fresh IVF/ICSI) and 14,727 IUI. The clinical pregnancy rate per cycle was on average 33.7% for fresh IVF/ICSI and 13.3% for IUI. The prevalence of multiple births was 15.7% and 6.2%, in case of IVF/ICSI and IUI methods respectively The most frequent complication in the course of treatment using ART was ovarian hyperstimulation syndrome (OHSS)--severe OHSS constituted 0.68% of all stimulated cycles. The SPiN PTG report shows the average effectiveness and safety of ART and was the only proof of responsibility and due diligence of fertility centres in Poland. However, due to the lack of a central register of fertility clinics, facultative participation in the report as well as incomplete information on pregnancy and delivery rate, the collected data do not reflect the full spectrum of Polish reproductive medicine.

  15. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  16. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  17. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  18. Quality and dose optimized CT trauma protocol. Recommendation from a university level-I trauma center

    Energy Technology Data Exchange (ETDEWEB)

    Kahn, Johannes; Boening, Georg; Rotzinger, Roman; Freyhardt, Patrick; Streitparth, Florian [Charite School of Medicine and Univ. Hospital Berlin (Germany). Dept. of Radiology; Kaul, David [Charite School of Medicine and Univ. Hospital Berlin (Germany). Dept. of Radiation Oncology; Schwabe, Philipp [Charite School of Medicine and Univ. Hospital Berlin (Germany). Dept. of Trauma Surgery; Maurer, Martin H. [Inselspital Bern (Switzerland). Dept. of Diagnostic, Interventional and Pediatric Radiology; Renz, Diane Miriam [Univ. Hospital Jena (Germany). Inst. of Diagnostic and Interventional Radiology

    2017-09-15

    As a supra-regional level-I trauma center, we evaluated computed tomography (CT) acquisitions of polytraumatized patients for quality and dose optimization purposes. Adapted statistical iterative reconstruction [(AS)IR] levels, tube voltage reduction as well as a split-bolus contrast agent (CA) protocol were applied. Materials and Methods 61 patients were split into 3 different groups that differed with respect to tube voltage (120 - 140 kVp) and level of applied ASIR reconstruction (ASIR 20 - 50%). The CT protocol included a native acquisition of the head followed by a single contrast-enhanced acquisition of the whole body (64-MSCT). CA (350 mg/ml iodine) was administered as a split bolus injection of 100 ml (2 ml/s), 20 ml NaCl (1 ml/s), 60 ml (4 ml/s), 40 ml NaCl (4 ml/s) with a scan delay of 85s to detect injuries of both the arterial system and parenchymal organs in a single acquisition. Both the quantitative (SNR/CNR) and qualitative (5-point Likert scale) image quality was evaluated in parenchymal organs that are often injured in trauma patients. Radiation exposure was assessed. The use of IR combined with a reduction of tube voltage resulted in good qualitative and quantitative image quality and a significant reduction in radiation exposure of more than 40% (DLP 1087 vs. 647 mGy x cm). Image quality could be improved due to a dedicated protocol that included different levels of IR adapted to different slice thicknesses, kernels and the examined area for the evaluation of head, lung, body and bone injury patterns. In synopsis of our results, we recommend the implementation of a polytrauma protocol with a tube voltage of 120 kVp and the following IR levels: cCT 5mm: ASIR 20; cCT 0.625 mm: ASIR 40; lung 2.5 mm: ASIR 30, body 5 mm: ASIR 40; body 1.25 mm: ASIR 50; body 0.625 mm: ASIR 0. A dedicated adaptation of the CT trauma protocol (level of reduction of tube voltage and of IR) according to the examined body region (head, lung, body, bone) combined with a

  19. Quality and dose optimized CT trauma protocol. Recommendation from a university level-I trauma center

    International Nuclear Information System (INIS)

    Kahn, Johannes; Boening, Georg; Rotzinger, Roman; Freyhardt, Patrick; Streitparth, Florian; Kaul, David; Schwabe, Philipp; Maurer, Martin H.; Renz, Diane Miriam

    2017-01-01

    As a supra-regional level-I trauma center, we evaluated computed tomography (CT) acquisitions of polytraumatized patients for quality and dose optimization purposes. Adapted statistical iterative reconstruction [(AS)IR] levels, tube voltage reduction as well as a split-bolus contrast agent (CA) protocol were applied. Materials and Methods 61 patients were split into 3 different groups that differed with respect to tube voltage (120 - 140 kVp) and level of applied ASIR reconstruction (ASIR 20 - 50%). The CT protocol included a native acquisition of the head followed by a single contrast-enhanced acquisition of the whole body (64-MSCT). CA (350 mg/ml iodine) was administered as a split bolus injection of 100 ml (2 ml/s), 20 ml NaCl (1 ml/s), 60 ml (4 ml/s), 40 ml NaCl (4 ml/s) with a scan delay of 85s to detect injuries of both the arterial system and parenchymal organs in a single acquisition. Both the quantitative (SNR/CNR) and qualitative (5-point Likert scale) image quality was evaluated in parenchymal organs that are often injured in trauma patients. Radiation exposure was assessed. The use of IR combined with a reduction of tube voltage resulted in good qualitative and quantitative image quality and a significant reduction in radiation exposure of more than 40% (DLP 1087 vs. 647 mGy x cm). Image quality could be improved due to a dedicated protocol that included different levels of IR adapted to different slice thicknesses, kernels and the examined area for the evaluation of head, lung, body and bone injury patterns. In synopsis of our results, we recommend the implementation of a polytrauma protocol with a tube voltage of 120 kVp and the following IR levels: cCT 5mm: ASIR 20; cCT 0.625 mm: ASIR 40; lung 2.5 mm: ASIR 30, body 5 mm: ASIR 40; body 1.25 mm: ASIR 50; body 0.625 mm: ASIR 0. A dedicated adaptation of the CT trauma protocol (level of reduction of tube voltage and of IR) according to the examined body region (head, lung, body, bone) combined with a

  20. Protocol for Short- and Longer-term Spatial Learning and Memory in Mice

    Directory of Open Access Journals (Sweden)

    Emily F. Willis

    2017-10-01

    Full Text Available Studies on the role of the hippocampus in higher cognitive functions such as spatial learning and memory in rodents are reliant upon robust and objective behavioral tests. This protocol describes one such test—the active place avoidance (APA task. This behavioral task involves the mouse continuously integrating visual cues to orientate itself within a rotating arena in order to actively avoid a shock zone, the location of which remains constant relative to the room. This protocol details the step-by-step procedures for a novel paradigm of the hippocampal-dependent APA task, measuring acquisition of spatial learning during a single 20-min trial (i.e., short-term memory, with spatial memory encoding and retrieval (i.e., long-term memory assessed by trials conducted over consecutive days. Using the APA task, cognitive flexibility can be assessed using the reversal learning paradigm, as this increases the cognitive load required for efficient performance in the task. In addition to a detailed experimental protocol, this paper also describes the range of its possible applications, the expected key results, as well as the analytical methods to assess the data, and the pitfalls/troubleshooting measures. The protocol described herein is highly robust and produces replicable results, thus presenting an important paradigm that enables the assessment of subtle short-term changes in spatial learning and memory, such as those observed for many experimental interventions.

  1. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  2. Abbreviated protocol for breast MRI: Are multiple sequences needed for cancer detection?

    International Nuclear Information System (INIS)

    Mango, Victoria L.; Morris, Elizabeth A.; David Dershaw, D.; Abramson, Andrea; Fry, Charles; Moskowitz, Chaya S.; Hughes, Mary; Kaplan, Jennifer; Jochelson, Maxine S.

    2015-01-01

    Highlights: • Abbreviated breast MR demonstrates high sensitivity for breast carcinoma detection. • Time to perform/interpret the abbreviated exam is shorter than a standard MRI exam. • An abbreviated breast MRI could reduce costs and make MRI screening more available. - Abstract: Objective: To evaluate the ability of an abbreviated breast magnetic resonance imaging (MRI) protocol, consisting of a precontrast T1 weighted (T1W) image and single early post-contrast T1W image, to detect breast carcinoma. Materials and methods: A HIPAA compliant Institutional Review Board approved review of 100 consecutive breast MRI examinations in patients with biopsy proven unicentric breast carcinoma. 79% were invasive carcinomas and 21% were ductal carcinoma in situ. Four experienced breast radiologists, blinded to carcinoma location, history and prior examinations, assessed the abbreviated protocol evaluating only the first post-contrast T1W image, post-processed subtracted first post-contrast and subtraction maximum intensity projection images. Detection and localization of tumor were compared to the standard full diagnostic examination consisting of 13 pre-contrast, post-contrast and post-processed sequences. Results: All 100 cancers were visualized on initial reading of the abbreviated protocol by at least one reader. The mean sensitivity for each sequence was 96% for the first post-contrast sequence, 96% for the first post-contrast subtraction sequence and 93% for the subtraction MIP sequence. Within each sequence, there was no significant difference between the sensitivities among the 4 readers (p = 0.471, p = 0.656, p = 0.139). Mean interpretation time was 44 s (range 11–167 s). The abbreviated imaging protocol could be performed in approximately 10–15 min, compared to 30–40 min for the standard protocol. Conclusion: An abbreviated breast MRI protocol allows detection of breast carcinoma. One pre and post-contrast T1W sequence may be adequate for detecting

  3. Abbreviated protocol for breast MRI: Are multiple sequences needed for cancer detection?

    Energy Technology Data Exchange (ETDEWEB)

    Mango, Victoria L., E-mail: vlm2125@columbia.edu [Columbia University Medical Center, Herbert Irving Pavilion, 161 Fort Washington Avenue, 10th Floor, New York, NY 10032 (United States); Memorial Sloan-Kettering Cancer Center, Breast and Imaging Center, 300 East 66th Street, New York, NY 10065 (United States); Morris, Elizabeth A., E-mail: morrise@mskcc.org [Memorial Sloan-Kettering Cancer Center, Breast and Imaging Center, 300 East 66th Street, New York, NY 10065 (United States); David Dershaw, D., E-mail: dershawd@mskcc.org [Memorial Sloan-Kettering Cancer Center, Breast and Imaging Center, 300 East 66th Street, New York, NY 10065 (United States); Abramson, Andrea, E-mail: abramsoa@mskcc.org [Memorial Sloan-Kettering Cancer Center, Breast and Imaging Center, 300 East 66th Street, New York, NY 10065 (United States); Fry, Charles, E-mail: charles_fry@nymc.edu [Memorial Sloan-Kettering Cancer Center, Breast and Imaging Center, 300 East 66th Street, New York, NY 10065 (United States); New York Medical College, 40 Sunshine Cottage Rd, Valhalla, NY 10595 (United States); Moskowitz, Chaya S. [Memorial Sloan-Kettering Cancer Center, Breast and Imaging Center, 300 East 66th Street, New York, NY 10065 (United States); Hughes, Mary, E-mail: hughesm@mskcc.org [Memorial Sloan-Kettering Cancer Center, Breast and Imaging Center, 300 East 66th Street, New York, NY 10065 (United States); Kaplan, Jennifer, E-mail: kaplanj@mskcc.org [Memorial Sloan-Kettering Cancer Center, Breast and Imaging Center, 300 East 66th Street, New York, NY 10065 (United States); Jochelson, Maxine S., E-mail: jochelsm@mskcc.org [Memorial Sloan-Kettering Cancer Center, Breast and Imaging Center, 300 East 66th Street, New York, NY 10065 (United States)

    2015-01-15

    Highlights: • Abbreviated breast MR demonstrates high sensitivity for breast carcinoma detection. • Time to perform/interpret the abbreviated exam is shorter than a standard MRI exam. • An abbreviated breast MRI could reduce costs and make MRI screening more available. - Abstract: Objective: To evaluate the ability of an abbreviated breast magnetic resonance imaging (MRI) protocol, consisting of a precontrast T1 weighted (T1W) image and single early post-contrast T1W image, to detect breast carcinoma. Materials and methods: A HIPAA compliant Institutional Review Board approved review of 100 consecutive breast MRI examinations in patients with biopsy proven unicentric breast carcinoma. 79% were invasive carcinomas and 21% were ductal carcinoma in situ. Four experienced breast radiologists, blinded to carcinoma location, history and prior examinations, assessed the abbreviated protocol evaluating only the first post-contrast T1W image, post-processed subtracted first post-contrast and subtraction maximum intensity projection images. Detection and localization of tumor were compared to the standard full diagnostic examination consisting of 13 pre-contrast, post-contrast and post-processed sequences. Results: All 100 cancers were visualized on initial reading of the abbreviated protocol by at least one reader. The mean sensitivity for each sequence was 96% for the first post-contrast sequence, 96% for the first post-contrast subtraction sequence and 93% for the subtraction MIP sequence. Within each sequence, there was no significant difference between the sensitivities among the 4 readers (p = 0.471, p = 0.656, p = 0.139). Mean interpretation time was 44 s (range 11–167 s). The abbreviated imaging protocol could be performed in approximately 10–15 min, compared to 30–40 min for the standard protocol. Conclusion: An abbreviated breast MRI protocol allows detection of breast carcinoma. One pre and post-contrast T1W sequence may be adequate for detecting

  4. P-02: Echocardiography Has Low Clinical Efficacy of Libyan Screening Protocol in Athletes

    Directory of Open Access Journals (Sweden)

    Salaheddin Sharif

    2017-03-01

    Full Text Available INTRODUCTIONPre-participation screening has been largely accepted as a means to identify those athletes at risk of cardiovascular diseases which are responsible for sudden cardiac death. The objectives of athlete screening are to reduce injuries and prevent sudden. However, there is no single commonly adopted protocol to screen athletes. Although the European Society of Cardiology and the American Heart Association recommend the routine screening of athletes to prevent sudden death, there is significant disagreement regarding use 12 lead ECG. FIFA has recommend the inclusion of an Echocardiography (ECHO in screening protocol.PURPOSEExplore the debate regarding differences between European and the USA pre-participation screening protocol for sudden death while also considering pre-competition medical assessment protocol used by the Libyan Football Federation. To provide evidence based recommendations on the best protocol to be used for pre-participation screening, and thus to standardize the screening method.MATERIALS and METHOD1236 male athletic received a medical history, general physical examination, cardiovascular and musculoskeletal examination, 12 lead ECG, blood laboratory test, and echocardiography.FINDINGS1235 athletics were found to be eligible to participate in sport and were given a full medical clearance. One athletic was diagnosed with second degree heart block by ECG while his medical history, physical examination, echocardiograph, and blood test were normal.DISCUSSIONEchocardiography alone do did not identify pathological condition and using echocardiography is still controversial and clinically not effective in young athletesCONCLUSIONThe Screening protocol should include a combination of medical history, physical examination and ECG due to the high sensitivity found, and thus it was able to identify all athletes at risk for the disease.

  5. ABO-Incompatible Adult Living Donor Liver Transplantation Under the Desensitization Protocol With Rituximab.

    Science.gov (United States)

    Song, G-W; Lee, S-G; Hwang, S; Kim, K-H; Ahn, C-S; Moon, D-B; Ha, T-Y; Jung, D-H; Park, G-C; Kim, W-J; Sin, M-H; Yoon, Y-I; Kang, W-H; Kim, S-H; Tak, E-Y

    2016-01-01

    ABO incompatibility is no longer considered a contraindication for adult living donor liver transplantation (ALDLT) due to various strategies to overcome the ABO blood group barrier. We report the largest single-center experience of ABO-incompatible (ABOi) ALDLT in 235 adult patients. The desensitization protocol included a single dose of rituximab and total plasma exchange. In addition, local graft infusion therapy, cyclophosphamide, or splenectomy was used for a certain time period, but these treatments were eventually discontinued due to adverse events. There were three cases (1.3%) of in-hospital mortality. The cumulative 3-year graft and patient survival rates were 89.2% and 92.3%, respectively, and were comparable to those of the ABO-compatible group (n = 1301). Despite promising survival outcomes, 17 patients (7.2%) experienced antibody-mediated rejection that manifested as diffuse intrahepatic biliary stricture; six cases required retransplantation, and three patients died. ABOi ALDLT is a feasible method for expanding a living liver donor pool, but the efficacy of the desensitization protocol in targeting B cell immunity should be optimized. © Copyright 2015 The American Society of Transplantation and the American Society of Transplant Surgeons.

  6. Single-dose radiation therapy for prevention of heterotopic ossification after total hip arthroplasty

    International Nuclear Information System (INIS)

    Healy, W.L.; Lo, T.C.; Covall, D.J.; Pfeifer, B.A.; Wasilewski, S.A.

    1990-01-01

    Single-dose radiation therapy was prospectively evaluated for its efficacy in prevention of heterotopic ossification in patients at high risk after total hip arthroplasty. Thirty-one patients (34 hips) were treated between 1981 and 1988. Risk factors for inclusion in the protocol included prior evidence of heterotopic ossification, ankylosing spondylitis, and diffuse idiopathic skeletal hyperostosis. Patients with hypertrophic osteoarthritis or traumatic arthritis with osteophytes were not included. Operations on 34 hips included 19 primary total and 11 revision total hip arthroplasties and 4 excisions of heterotopic ossification. All patients received radiotherapy to the hip after operation with a single dose of 700 centigray. Radiotherapy is recommended on the first postoperative day. After this single-dose radiation treatment, no patient had clinically significant heterotopic ossification. Recurrent disease developed in two hips (6%), as seen on radiography (grades 2 and 3). This series documents a 100% clinical success rate and a 94% radiographic success rate in preventing heterotopic ossification in patients at high risk after total hip arthroplasty. Single-dose radiotherapy is as effective as other radiation protocols in preventing heterotopic ossification after total hip arthroplasty. It is less expensive and easier to administer than multidose radiotherapy

  7. The self-describing data sets file protocol and Toolkit

    International Nuclear Information System (INIS)

    Borland, M.; Emery, L.

    1995-01-01

    The Self-Describing Data Sets (SDDS) file protocol continues to be used extensively in commissioning the Advanced Photon Source (APS) accelerator complex. SDDS protocol has proved useful primarily due to the existence of the SDDS Toolkit, a growing set of about 60 generic commandline programs that read and/or write SDDS files. The SDDS Toolkit is also used extensively for simulation postprocessing, giving physicists a single environment for experiment and simulation. With the Toolkit, new SDDS data is displayed and subjected to complex processing without developing new programs. Data from EPICS, lab instruments, simulation, and other sources are easily integrated. Because the SDDS tools are commandline-based, data processing scripts are readily written using the user's preferred shell language. Since users work within a UNIX shell rather than an application-specific shell or GUI, they may add SDDS-compliant programs and scripts to their personal toolkits without restriction or complication. The SDDS Toolkit has been run under UNIX on SUN OS4, HP-UX, and LINUX. Application of SDDS to accelerator operation is being pursued using Tcl/Tk to provide a GUI

  8. Does the accuracy of single reading with CAD (computer-aided detection) compare with that of double reading?: A review of the literature

    International Nuclear Information System (INIS)

    Bennett, R.L.; Blanks, R.G.; Moss, S.M.

    2006-01-01

    Aim: To examine current evidence to determine whether the accuracy of single reading with computed-aided detection (CAD) compares with that of double reading. Methods: We performed a literature review to identify studies where both protocols had been investigated and compared. We identified eight studies that compared single reading with CAD against double reading, of which six reported on comparisons of both sensitivity and specificity. Results: Of the six studies identified, three showed no differences in either sensitivity or specificity. One showed single reading with CAD had a higher sensitivity at the same specificity, another that single reading with CAD had a higher specificity at the same sensitivity. However, one study, in a real-life setting, showed that single reading with CAD had a higher sensitivity but a lower specificity. Conclusion: As the majority of the studies were not in a real-life setting, used test sets, lacked sufficient training in the use of CAD and simulated double reading (using a protocol of recall if one suggests), current evidence is therefore limited as to the accuracy, in terms of sensitivity and specificity, of single reading with CAD in comparison with the most common practice in the UK of double reading using a protocol of consensus or arbitration

  9. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  10. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  11. The SHIP: A SIP to HTTP Interaction Protocol

    Science.gov (United States)

    Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco

    IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.

  12. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  13. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  14. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  15. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  16. Retrospective analysis of 56 edentulous dental arches restored with 344 single-stage implants using an immediate loading fixed provisional protocol: statistical predictors of implant failure.

    Science.gov (United States)

    Kinsel, Richard P; Liss, Mindy

    2007-01-01

    The purpose of this retrospective study was to evaluate the effects of implant dimensions, surface treatment, location in the dental arch, numbers of supporting implant abutments, surgical technique, and generally recognized risk factors on the survival of a series of single-stage Straumann dental implants placed into edentulous arches using an immediate loading protocol. Each patient received between 4 and 18 implants in one or both dental arches. Periapical radiographs were obtained over a 2- to 10-year follow-up period to evaluate crestal bone loss following insertion of the definitive metal-ceramic fixed prostheses. Univariate tests for failure rates as a function of age ( or = 60 years), gender, smoking, bone grafting, dental arch, surface type, anterior versus posterior, number of implants per arch, and surgical technique were made using Fisher exact tests. The Cochran-Armitage test for trend was used to evaluate the presence of a linear trend in failure rates regarding implant length and implant diameter. Logistic regression modeling was used to determine which, if any, of the aforementioned factors would predict patient and implant failure. A significance criterion of P = .05 was utilized. Data were collected for 344 single-stage implants placed into 56 edentulous arches (39 maxillae and 17 mandibles) of 43 patients and immediately loaded with a 1-piece provisional fixed prosthesis. A total of 16 implants failed to successfully integrate, for a survival rate of 95.3%. Increased rates of failure were associated with reduced implant length, placement in the posterior region of the jaw, increased implant diameter, and surface treatment. Implant length emerged as the sole significant predictor of implant failure. In this retrospective analysis of 56 consecutively treated edentulous arches with multiple single-stage dental implants loaded immediately, reduced implant length was the sole significant predictor of failure.

  17. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  18. ASSESSMENT OF RIP-V1 AND OSPF-V2 PROTOCOL WITH CONSIDERATION OF CONVERGENCE CRITERIA AND SENDING PROTOCOLS TRAFFIC

    Directory of Open Access Journals (Sweden)

    Hamed Jelodar

    2014-03-01

    Full Text Available Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.

  19. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  20. A secure distributed logistic regression protocol for the detection of rare adverse drug events.

    Science.gov (United States)

    El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat

    2013-05-01

    There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through

  1. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  2. Improvement of the SEP protocol based on community structure of node degree

    Science.gov (United States)

    Li, Donglin; Wei, Suyuan

    2017-05-01

    Analyzing the Stable election protocol (SEP) in wireless sensor networks and aiming at the problem of inhomogeneous cluster-heads distribution and unreasonable cluster-heads selectivity and single hop transmission in the SEP, a SEP Protocol based on community structure of node degree (SEP-CSND) is proposed. In this algorithm, network node deployed by using grid deployment model, and the connection between nodes established by setting up the communication threshold. The community structure constructed by node degree, then cluster head is elected in the community structure. On the basis of SEP, the node's residual energy and node degree is added in cluster-heads election. The information is transmitted with mode of multiple hops between network nodes. The simulation experiments showed that compared to the classical LEACH and SEP, this algorithm balances the energy consumption of the entire network and significantly prolongs network lifetime.

  3. Results of ERAS protocol in patients with colorectal cancer

    Directory of Open Access Journals (Sweden)

    A. O. Rasulov

    2016-01-01

    Full Text Available Objective: explore the use of enhanced recovery after surgery (ERAS in the treatment of patients with colorectal cancer, evaluate its efficacy and safety.Materials and methods. Prospective, single-site, randomized study for the implementation of enhanced recovery after surgery in patients with colorectal cancer has been conducted from October 2014 till the present time. All patients after laparoscopic surgeries undergo treatment according to ERAS protocol, patients after open surgeries are randomized (1:1 in groups of the standard treatment or treatment according to ERAS protocol. The study included patients with localized and locally disseminated colorectal cancer aged from 18 to 75 years, ECOG score ≤ 2. The primary evaluated parameters were the following: the number of postoperative complications (according to Clavien– Dindo classification, postoperative hospital days, incidence of complications and mortality in the 30-day period, timing of activation.Results. Up to date, the study includes 105 patients: laparoscopic group – 51 patients, open-surgery group of patients treated by ERAS protocol – 27 patients, open-surgery group of patients with the standard post-op treatment – 26 patients. Complications requiring emergency surgery for anastomotic leak (p = 0.159 developed in 3.7 % of patients with the standard post-op treatment and in 3.9 % of patients after laparoscopic surgery, while 1 patient required repeat hospitalization. The total number of complications was significantly lower in opensurgery group of patients treated by ERAS protocol compared with the standard post-op treatment (p = 0.021. However, there were no differences between laparoscopic and open-surgery group with the standard post-op treatment (p = 0.159. An average hospitalization stay in patients with the standard post-op treatment was equal to 10 days compared to 7 days in patients treated by ERAS protocol (p = 0.067 and 6 days after laparoscopic

  4. Measurement and protocol for evaluating video and still stabilization systems

    Science.gov (United States)

    Cormier, Etienne; Cao, Frédéric; Guichard, Frédéric; Viard, Clément

    2013-01-01

    This article presents a system and a protocol to characterize image stabilization systems both for still images and videos. It uses a six axes platform, three being used for camera rotation and three for camera positioning. The platform is programmable and can reproduce complex motions that have been typically recorded by a gyroscope mounted on different types of cameras in different use cases. The measurement uses a single chart for still image and videos, the texture dead leaves chart. Although the proposed implementation of the protocol uses a motion platform, the measurement itself does not rely on any specific hardware. For still images, a modulation transfer function is measured in different directions and is weighted by a contrast sensitivity function (simulating the human visual system accuracy) to obtain an acutance. The sharpness improvement due to the image stabilization system is a good measurement of performance as recommended by a CIPA standard draft. For video, four markers on the chart are detected with sub-pixel accuracy to determine a homographic deformation between the current frame and a reference position. This model describes well the apparent global motion as translations, but also rotations along the optical axis and distortion due to the electronic rolling shutter equipping most CMOS sensors. The protocol is applied to all types of cameras such as DSC, DSLR and smartphones.

  5. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  6. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  7. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  8. A New Theoretical Approach to Single-Molecule Fluorescence Optical Studies of RNA Dynamics

    International Nuclear Information System (INIS)

    Zhao Xinghai; Shan Guangcun; Bao Shuying

    2011-01-01

    Single-molecule fluorescence spectroscopy in condensed phases has many important chemical and biological applications. The single-molecule fluorescence measurements contain information about conformational dynamics on a vast range of time scales. Based on the data analysis protocols methodology proposed by X. Sunney Xie, the theoretical study here mainly focuses on the single-molecule studies of single RNA with interconversions among different conformational states, to with a single FRET pair attached. We obtain analytical expressions for fluorescence lifetime correlation functions that relate changes in fluorescence lifetime to the distance-dependent FRET mechanism within the context of the Smoluchowski diffusion model. The present work establishes useful guideline for the single-molecule studies of biomolecules to reveal the complicated folding dynamics of single RNA molecules at nanometer scale.

  9. Evaluation of Human Adipose Tissue Stromal Heterogeneity in Metabolic Disease Using Single Cell RNA-Seq

    Science.gov (United States)

    2017-09-01

    AWARD NUMBER: W81XWH-15-1-0251 TITLE: “Evaluation of Human Adipose Tissue Stromal Heterogeneity in Metabolic Disease Using Single Cell RNA...Heterogeneity in Metabolic Disease Using Single- Cell RNA-Seq 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Linus Tzu-Yen...ABSTRACT We have developed a robust protocol to generate single cell transcriptional profiles from subcutaneous adipose tissue samples of both human

  10. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  11. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  12. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  13. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  14. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  15. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  16. Imaging algorithms and CT protocols in trauma patients: survey of Swiss emergency centers

    International Nuclear Information System (INIS)

    Hinzpeter, R.; Alkadhi, Hatem; Boehm, T.; Boll, D.; Constantin, C.; Del Grande, F.; Fretz, V.; Leschka, S.; Ohletz, T.; Broennimann, M.; Schmidt, S.; Treumann, T.; Poletti, P.A.

    2017-01-01

    To identify imaging algorithms and indications, CT protocols, and radiation doses in polytrauma patients in Swiss trauma centres. An online survey with multiple choice questions and free-text responses was sent to authorized level-I trauma centres in Switzerland. All centres responded and indicated that they have internal standardized imaging algorithms for polytrauma patients. Nine of 12 centres (75 %) perform whole-body CT (WBCT) after focused assessment with sonography for trauma (FAST) and conventional radiography; 3/12 (25 %) use WBCT for initial imaging. Indications for WBCT were similar across centres being based on trauma mechanisms, vital signs, and presence of multiple injuries. Seven of 12 centres (58 %) perform an arterial and venous phase of the abdomen in split-bolus technique. Six of 12 centres (50 %) use multiphase protocols of the head (n = 3) and abdomen (n = 4), whereas 6/12 (50 %) use single-phase protocols for WBCT. Arm position was on the patient's body during scanning (3/12, 25 %), alongside the body (2/12, 17 %), above the head (2/12, 17 %), or was changed during scanning (5/12, 42 %). Radiation doses showed large variations across centres ranging from 1268-3988 mGy*cm (DLP) per WBCT. Imaging algorithms in polytrauma patients are standardized within, but vary across Swiss trauma centres, similar to the individual WBCT protocols, resulting in large variations in associated radiation doses. (orig.)

  17. Imaging algorithms and CT protocols in trauma patients: survey of Swiss emergency centers

    Energy Technology Data Exchange (ETDEWEB)

    Hinzpeter, R.; Alkadhi, Hatem [University Hospital Zurich, Institute of Diagnostic and Interventional Radiology, Zurich (Switzerland); Boehm, T. [Kantonsspital Graubuenden, Department of Radiology, Chur (Switzerland); Boll, D. [University Hospital Basel, Department of Radiology and Nuclear Medicine, Basel (Switzerland); Constantin, C. [Spital Wallis, Department of Radiology, Visp (Switzerland); Del Grande, F. [Ospedale Regionale di Lugano, Department of Radiology, Lugano (Switzerland); Fretz, V. [Kantonsspital Winterthur, Institute of Radiology and Nuclear Medicine, Winterthur (Switzerland); Leschka, S. [Kantonsspital St Gallen, Division of Radiology and Nuclear Medicine, Gallen (Switzerland); Ohletz, T. [Kantonsspital Aarau, Department of Radiology, Aarau (Switzerland); Broennimann, M. [University Hospital Bern, Department of Diagnostic, Interventional and Pediatric Radiology, Bern (Switzerland); Schmidt, S. [Lausanne University Hospital, Department of Diagnostic and Interventional Radiology, Lausanne (Switzerland); Treumann, T. [Luzerner Kantonsspital, Institute of Radiology, Luzern 16 (Switzerland); Poletti, P.A. [Geneva University Hospital, Department of Radiology, Geneve (Switzerland)

    2017-05-15

    To identify imaging algorithms and indications, CT protocols, and radiation doses in polytrauma patients in Swiss trauma centres. An online survey with multiple choice questions and free-text responses was sent to authorized level-I trauma centres in Switzerland. All centres responded and indicated that they have internal standardized imaging algorithms for polytrauma patients. Nine of 12 centres (75 %) perform whole-body CT (WBCT) after focused assessment with sonography for trauma (FAST) and conventional radiography; 3/12 (25 %) use WBCT for initial imaging. Indications for WBCT were similar across centres being based on trauma mechanisms, vital signs, and presence of multiple injuries. Seven of 12 centres (58 %) perform an arterial and venous phase of the abdomen in split-bolus technique. Six of 12 centres (50 %) use multiphase protocols of the head (n = 3) and abdomen (n = 4), whereas 6/12 (50 %) use single-phase protocols for WBCT. Arm position was on the patient's body during scanning (3/12, 25 %), alongside the body (2/12, 17 %), above the head (2/12, 17 %), or was changed during scanning (5/12, 42 %). Radiation doses showed large variations across centres ranging from 1268-3988 mGy*cm (DLP) per WBCT. Imaging algorithms in polytrauma patients are standardized within, but vary across Swiss trauma centres, similar to the individual WBCT protocols, resulting in large variations in associated radiation doses. (orig.)

  18. The Effect of Nicotine Administration on Physical and Psychological Signs of Withdrawal Syndrome Induced by Single or Frequent Doses of Morphine in Rats

    Directory of Open Access Journals (Sweden)

    Mohammad Allahtavakoli

    2012-07-01

    Full Text Available Introduction. Morphine addiction and morphine withdrawal syndrome are the two main problems of today’s human society. The present study has investigated the effects of nicotine on the strength of physical and psychological dependency in single and repeated doses morphine administrated rats. Materials and methods. Male Wistar rats were subjected to morphine consumption with single or frequent dose protocols. In the single dose protocol, rats received only one dose of morphine and 24hrs later they also received one dose of nicotine 30 min prior to injection of naloxone. In the repeated dose protocol, rats received incremental doses of morphine for 7 days and 24hr after the last dose (the 8th day were given naloxone. However, the nicotine regimen of this group was injected 15 min before the morphine injection, for 4 days, from the 4th to the 7th day. Five minutes after naloxone injection, each rat′s behavior was captured for 30 min, and then physical and psychological signs of withdrawal syndrome were recorded. Data were analyzed by ANOVA followed by Tukey tests and p<0.05 was considered as significant difference. Findings. Results showed that the injection of frequent and single doses of morphine lead to morphine dependency. In single dose protocol, nicotine consumption attenuated the signs of withdrawal syndrome, especially weight of excrement and total withdrawal score. In frequent dose protocol, in addition to these effects, nicotine induced weight loss and place aversion. Conclusion. The inhibitory effects of nicotine on signs of withdrawal syndrome may involve a dopaminergic portion of the central nervous system and is mediated by central nicotinic receptors. There is also a cross-dependence between nicotine and morphine.

  19. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  20. A protocol for isolating insect mitochondrial genomes: a case study of NUMT in Melipona flavolineata (Hymenoptera: Apidae).

    Science.gov (United States)

    Françoso, Elaine; Gomes, Fernando; Arias, Maria Cristina

    2016-07-01

    Nuclear mitochondrial DNA insertions (NUMTs) are mitochondrial DNA sequences that have been transferred into the nucleus and are recognized by the presence of indels and stop codons. Although NUMTs have been identified in a diverse range of species, their discovery was frequently accidental. Here, our initial goal was to develop and standardize a simple method for isolating NUMTs from the nuclear genome of a single bee. Subsequently, we tested our new protocol by determining whether the indels and stop codons of the cytochrome c oxidase subunit I (COI) sequence of Melipona flavolineata are of nuclear origin. The new protocol successfully demonstrated the presence of a COI NUMT. In addition to NUMT investigations, the protocol described here will also be very useful for studying mitochondrial mutations related to diseases and for sequencing complete mitochondrial genomes with high read coverage by Next-Generation technology.

  1. [Assisted reproductive medicine in Poland, 2011--SPiN PTG report].

    Science.gov (United States)

    Janicka, Anna; Spaczyński, Robert Z; Kurzawa, Rafał

    2014-07-01

    The aim of this report is to present data concerning results and complications related to infertility treatment using assisted reproductive technology (ART) and insemination (IUI) in Poland in 2011. The report was prepared by the Fertility and Sterility Special Interest Group of the Polish Gynaecological Society (SPiN PTG), based on individual data provided by fertility clinics in Poland. Reporting was voluntary and the provided data was not subject to external control. The report presents the availability and the structure of infertility treatment services, the number of procedures performed, their effectiveness and the most common complications. In 2013, 33 Polish fertility clinics provided information to the SPiN PTG report, presenting data from the year 2011. The total number of reported treatment cycles using ART was 15,340 (incl. 10,011 IVF/ICSI procedures) and 15,627 IUI procedures. The rate of clinical pregnancies in terms of a cycle was 34.2% in case of IVF/ ICSI procedures and 13.4% in case of IUI. The prevalence of multiple births was 20.2% and 8.3% respectively in case of IVF/ICSI and IUI methods. The most frequent complication in the course of treatment using ART was ovarian hyperstimulation syndrome (OHSS). The SPiN PTG report allows to find out the average effectiveness and safety of assisted reproduction technologies and is currently the only proof of responsibility and due diligence of fertility centres in Poland. However due to the lack of a central register of fertility clinics, facultative participation in the report as well as incomplete information on pregnancy and delivery the collected data does not reflect the full spectrum of the Polish reproductive medicine.

  2. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  3. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  4. The effect of problem-solving skill training on mental health and the success of treatment of infertile women under intrauterine insemination treatment

    Science.gov (United States)

    Gojani, Marziyeh Ghasemi; Kordi, Masoume; Asgharipour, Negar; Esmaeili, Habibollah; Amirian, Maliheh; Eskandarnia, Elnaze

    2017-01-01

    INTRODUCTION: Using fertility treatment will cause high levels of anxiety and depression. The study was carried out with the objective of determining the effect of problem-solving skills (PSS) training on mental health and the success of treatment of infertile women under intrauterine insemination (IUI) treatment. MATERIALS AND METHODS: this randomized clinical trial was carried out on 72 women referring to Milad Infertility Center in Mashhad. Individuals were randomly assigned into control and intervention groups. PSS were taught in three sessions in the intervention group, and the control group received usual care. The success rate of therapy and the mean of anxiety and depression on the day of IUI operation were compared using the Beck Depression Inventory and Spielberger Anxiety Inventory in both groups. t-test, Mann–Whitney, paired t-test, Wilcoxon, and Chi-square tests were used to analyze the data. RESULTS: on the day of IUI operation, the mean score of state anxiety in the control group(5 0. 11 ± 8.51) and PSS (68.12 ± 11.49) was significant (P effect of problem-solving on reducing anxiety and depression, it is suggested that infertility center of this intervention should be used. PMID:29296608

  5. A Rare Case of Flare-Up of PID in Infertility Treatment

    Directory of Open Access Journals (Sweden)

    Leena Wadhwa

    2015-01-01

    Full Text Available Case Presentation. Mrs. X, 35 years old, case of primary infertility, was diagnosed to have genital tuberculosis on the basis of PCR positive and hysterolaparoscopy findings and received category I ATT for 6 months. Following ATT completion, her USG revealed no evidence of tuboovarian mass or hydrosalpinx. Since her tubes were patent, she underwent 3 cycles of ovulation induction and 2 cycles of IUI. The women presented with acute PID, five days after IUI, and was conservatively managed. She again presented 24 days after IUI with persistent low grade fever and abdominal pain. Suspecting relapse of genital tuberculosis, she was started on category II ATT. She had acute episodes of high grade fever with chills 2 weeks after starting ATT and MRI revealed bilateral TO masses suggestive of pyosalpinx. Emergency laparotomy was done, pus was drained, and cyst wall was removed and HPE was suggestive of chronic inflammation with few granulation tissues. ATT was continued for one year and the woman improved. Conclusion. The possibility of flare-up of PID (pelvic inflammatory disease in treated case of tuberculosis undergoing infertility management should be kept in mind and aggressive management should be done.

  6. Quality and Dose Optimized CT Trauma Protocol - Recommendation from a University Level-I Trauma Center.

    Science.gov (United States)

    Kahn, Johannes; Kaul, David; Böning, Georg; Rotzinger, Roman; Freyhardt, Patrick; Schwabe, Philipp; Maurer, Martin H; Renz, Diane Miriam; Streitparth, Florian

    2017-09-01

    Purpose  As a supra-regional level-I trauma center, we evaluated computed tomography (CT) acquisitions of polytraumatized patients for quality and dose optimization purposes. Adapted statistical iterative reconstruction [(AS)IR] levels, tube voltage reduction as well as a split-bolus contrast agent (CA) protocol were applied. Materials and Methods  61 patients were split into 3 different groups that differed with respect to tube voltage (120 - 140 kVp) and level of applied ASIR reconstruction (ASIR 20 - 50 %). The CT protocol included a native acquisition of the head followed by a single contrast-enhanced acquisition of the whole body (64-MSCT). CA (350 mg/ml iodine) was administered as a split bolus injection of 100 ml (2 ml/s), 20 ml NaCl (1 ml/s), 60 ml (4 ml/s), 40 ml NaCl (4 ml/s) with a scan delay of 85 s to detect injuries of both the arterial system and parenchymal organs in a single acquisition. Both the quantitative (SNR/CNR) and qualitative (5-point Likert scale) image quality was evaluated in parenchymal organs that are often injured in trauma patients. Radiation exposure was assessed. Results  The use of IR combined with a reduction of tube voltage resulted in good qualitative and quantitative image quality and a significant reduction in radiation exposure of more than 40 % (DLP 1087 vs. 647 mGyxcm). Image quality could be improved due to a dedicated protocol that included different levels of IR adapted to different slice thicknesses, kernels and the examined area for the evaluation of head, lung, body and bone injury patterns. In synopsis of our results, we recommend the implementation of a polytrauma protocol with a tube voltage of 120 kVp and the following IR levels: cCT 5mm: ASIR 20; cCT 0.625 mm: ASIR 40; lung 2.5 mm: ASIR 30, body 5 mm: ASIR 40; body 1.25 mm: ASIR 50; body 0.625 mm: ASIR 0. Conclusion  A dedicated adaptation of the CT trauma protocol (level of reduction of tube voltage and of IR

  7. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  8. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  9. Quantification of theobromine and caffeine in saliva, plasma and urine via liquid chromatography-tandem mass spectrometry: a single analytical protocol applicable to cocoa intervention studies.

    Science.gov (United States)

    Ptolemy, Adam S; Tzioumis, Emma; Thomke, Arjun; Rifai, Sami; Kellogg, Mark

    2010-02-01

    Targeted analyses of clinically relevant metabolites in human biofluids often require extensive sample preparation (e.g., desalting, protein removal and/or preconcentration) prior to quantitation. In this report, a single ultra-centrifugation based sample pretreatment combined with a designed liquid chromatography-tandem mass spectrometry (LC-MS/MS) protocol provides selective quantification of 3,7-dimethylxanthine (theobromine) and 1,3,7-trimethylxanthine (caffeine) in human saliva, plasma and urine samples. The optimized chromatography permitted elution of both analytes within 1.3 min of the applied gradient. Positive-mode electrospray ionization and a triple quadruple MS/MS instrument operated in multiple reaction mode were used for detection. (13)C(3) isotopically labeled caffeine was included as an internal standard to improve accuracy and precision. Implementing a 20-fold dilution of the isolated low MW biofluid fraction prior to injection effectively minimized the deleterious contributions of all three matrices to quantitation. The assay was linear over a 160-fold concentration range from 2.5 to 400 micromol L(-1) for both theobromine (average R(2) 0.9968) and caffeine (average R(2) 0.9997) respectively. Analyte peak area variations for 2.5 micromol L(-1) caffeine and theobromine in saliva, plasma and urine ranged from 5 and 10% (intra-day, N=10) to 9 and 13% (inter-day, N=25) respectively. The intra- and inter-day precision of theobromine and caffeine elution times were 3 and theobromine ranged from 114 to 118% and 99 to 105% at concentration levels of 10 and 300 micromol L(-1). This validated protocol also permitted the relative saliva, plasma and urine distribution of both theobromine and caffeine to be quantified following a cocoa intervention. 2009 Elsevier B.V. All rights reserved.

  10. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  11. MDCT of acute pancreatitis: Intraindividual comparison of single-phase versus dual-phase MDCT for initial assessment of acute pancreatitis using different CT scoring systems

    Energy Technology Data Exchange (ETDEWEB)

    Avanesov, Maxim, E-mail: m.avanesov@uke.de [Department of Diagnostic and Interventional Radiology and Nuclear Medicine, University Medical Center Hamburg-Eppendorf, Hamburg (Germany); Weinrich, Julius M.; Kraus, Thomas [Department of Diagnostic and Interventional Radiology and Nuclear Medicine, University Medical Center Hamburg-Eppendorf, Hamburg (Germany); Derlin, Thorsten [Department of Nuclear Medicine, Hannover Medical School (Germany); Adam, Gerhard; Yamamura, Jin [Department of Diagnostic and Interventional Radiology and Nuclear Medicine, University Medical Center Hamburg-Eppendorf, Hamburg (Germany); Karul, Murat [Department of Diagnostic and Interventional Radiology, Marienkrankenhaus Hamburg (Germany)

    2016-11-15

    Objectives: The purpose of the retrospective study was to evaluate the additional value of dual-phase multidetector computed tomography (MDCT) protocols over a single-phase protocol on initial MDCT in patients with acute pancreatitis using three CT-based pancreatitis severity scores with regard to radiation dose. Methods: In this retrospective, IRB approved study MDCT was performed in 102 consecutive patients (73 males; 55years, IQR48–64) with acute pancreatitis. Inclusion criteria were CT findings of interstitial edematous pancreatitis (IP) or necrotizing pancreatitis (NP) and a contrast-enhanced dual-phase (arterial phase and portal-venous phase) abdominal CT performed at ≥72 h after onset of symptoms. The severity of pancreatic and extrapancreatic changes was independently assessed by 2 observers using 3 validated CT-based scoring systems (CTSI, mCTSI, EPIC). All scores were applied to arterial phase and portal venous phase scans and compared to score results of portal venous phase scans, assessed ≥14 days after initial evaluation. For effective dose estimation, volume CT dose index (CTDIvol) and dose length product (DLP) were recorded in all examinations. Results: In neither of the CT severity scores a significant difference was observed after application of a dual-phase protocol compared with a single-phase protocol (IP: CTSI: 2.7 vs. 2.5, p = 0.25; mCTSI: 4.0 vs. 4.0, p = 0.10; EPIC: 2.0 vs. 2.0, p = 0.41; NP: CTSI: 8.0 vs. 7.0, p = 0.64; mCTSI: 8.0 vs. 8.0, p = 0.10; EPIC: 3.0 vs. 3.0, p = 0.06). The application of a single-phase CT protocol was associated with a median effective dose reduction of 36% (mean dose reduction 31%) compared to a dual-phase CT scan. Conclusions: An initial dual-phase abdominal CT after ≥72 h after onset of symptoms of acute pancreatitis was not superior to a single-phase protocol for evaluation of the severity of pancreatic and extrapancreatic changes. However, the effective radiation dose may be reduced by 36% using a

  12. ‌‌The effect of nicotine administration on physical and psychological signs of withdrawal syndrome induced by single or frequent doses of morphine in rats

    Directory of Open Access Journals (Sweden)

    Ali Shamsizadeh

    2012-07-01

    Full Text Available Introduction: Morphine addiction and morphine withdrawal syndrome are the two main problems of today’s human society. The present study has investigated the effects of nicotine on the strength of physical and psychological dependency in single and repeated doses morphine administrated rats. Methods: Male Wistar rats were subjected to morphine consumption with single or frequent dose protocols. In the single dose protocol, rats received only one dose of morphine and 24hrs later they also received one dose of nicotine 30 min prior to injection of naloxone. In the repeated dose protocol, rats received incremental doses of morphine for 7 days and 24hr after the last dose (the 8th day were given naloxone. However, the nicotine regimen of this group was injected 15 min before the morphine injection, for 4 days, from the 4th to the 7th day. Five minutes after naloxone injection, each rat′s behavior was captured for 30 min, and then physical and psychological signs of withdrawal syndrome were recorded. Data were analyzed by ANOVA followed by Tukey tests and p<0.05 was considered as significant difference. Results: Results showed that the injection of frequent and single doses of morphine lead to morphine dependency. In single dose protocol, nicotine consumption attenuated the signs of withdrawal syndrome, especially weight of excrement and total withdrawal score. In frequent dose protocol, in addition to these effects, nicotine induced weight loss and place aversion. Discussion: The inhibitory effects of nicotine on signs of withdrawal syndrome may involve a dopaminergic portion of the central nervous system and is mediated by central nicotinic receptors. There is also a cross-dependence between nicotine and morphine.

  13. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  14. Single-tube hydroponics as a novel idea for small-scale production of crop seed in a plant incubator.

    Science.gov (United States)

    Kuroda, Masaharu; Ikenaga, Sachiko

    2015-01-01

    We present a novel protocol for small-scale production of crop seed in a plant incubator termed "Single-tube hydroponics." Our protocol minimizes the materials and methods for cultivation whereby a large number of independent plants can be cultured in a limited space. This study may aid in the improvement of crop seed components, especially in the cultivation of transgenic plants.

  15. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  16. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  17. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  18. Single-Cell RNA Sequencing of the Bronchial Epithelium in Smokers with Lung Cancer

    Science.gov (United States)

    2017-07-01

    and to discuss library preparations protocols and data analysis techniques. The goal is to develop a single cell sequencing analysis toolkit . In...Research Support LUNGevity Career Development Award What other organizations were involved as partners? Organization Name: Broad Institute 19

  19. Unconditionally secure key distillation from multi-photons in a single-photon polarization based quantum key distribution

    CERN Document Server

    Tamaki, K

    2005-01-01

    In this presentation, we show some counter-examples to a naive belief that the security of QKD is based on no-cloning theorem. One example is shown by explicitly proving that one can indeed generate an unconditionally secure key from Alice's two-photon emission part in "SARG04 protocol" proposed by V. Scarani et al, in Phys. Rev. Lett. 92, 057901 (2004). This protocol differs from BB84 only in the classical communication. It is, thus, interesting to see how only the classical communication of QKD protocol might qualitatively change its security. We also show that one can generate an unconditionally secure key from the single to the four-photon part in a generalized SARG04 that uses six states. Finally, we also compare the bit error rate threshold of these protocols with the one in BB84 and the original six-state protocol assuming a depolarizing channel.

  20. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  1. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  2. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  3. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  4. Evaluation of Extraction Protocols for Simultaneous Polar and Non-Polar Yeast Metabolite Analysis Using Multivariate Projection Methods

    Directory of Open Access Journals (Sweden)

    Nicolas P. Tambellini

    2013-07-01

    Full Text Available Metabolomic and lipidomic approaches aim to measure metabolites or lipids in the cell. Metabolite extraction is a key step in obtaining useful and reliable data for successful metabolite studies. Significant efforts have been made to identify the optimal extraction protocol for various platforms and biological systems, for both polar and non-polar metabolites. Here we report an approach utilizing chemoinformatics for systematic comparison of protocols to extract both from a single sample of the model yeast organism Saccharomyces cerevisiae. Three chloroform/methanol/water partitioning based extraction protocols found in literature were evaluated for their effectiveness at reproducibly extracting both polar and non-polar metabolites. Fatty acid methyl esters and methoxyamine/trimethylsilyl derivatized aqueous compounds were analyzed by gas chromatography mass spectrometry to evaluate non-polar or polar metabolite analysis. The comparative breadth and amount of recovered metabolites was evaluated using multivariate projection methods. This approach identified an optimal protocol consisting of 64 identified polar metabolites from 105 ion hits and 12 fatty acids recovered, and will potentially attenuate the error and variation associated with combining metabolite profiles from different samples for untargeted analysis with both polar and non-polar analytes. It also confirmed the value of using multivariate projection methods to compare established extraction protocols.

  5. Photocleavable DNA Barcoding Antibodies for Multiplexed Protein Analysis in Single Cells.

    Science.gov (United States)

    Ullal, Adeeti V; Weissleder, Ralph

    2015-01-01

    We describe a DNA-barcoded antibody sensing technique for single cell protein analysis in which the barcodes are photocleaved and digitally detected without amplification steps (Ullal et al., Sci Transl Med 6:219, 2014). After photocleaving the unique ~70 mer DNA barcodes we use a fluorescent hybridization technology for detection, similar to what is commonly done for nucleic acid readouts. This protocol offers a simple method for multiplexed protein detection using 100+ antibodies and can be performed on clinical samples as well as single cells.

  6. Performance of various quantum-key-distribution systems using 1.55-μm up-conversion single-photon detectors

    International Nuclear Information System (INIS)

    Diamanti, Eleni; Takesue, Hiroki; Honjo, Toshimori; Inoue, Kyo; Yamamoto, Yoshihisa

    2005-01-01

    We compare the performance of various quantum-key-distribution (QKD) systems using a single-photon detector, which combines frequency up-conversion in a periodically poled lithium niobate waveguide and a silicon avalanche photodiode (APD). The comparison is based on the secure communication rate as a function of distance for three QKD protocols: the Bennett-Brassard 1984, the Bennett-Brassard-Mermin 1992, and the coherent differential-phase-shift keying protocols. We show that the up-conversion detector allows for higher communication rates and longer communication distances than the commonly used InGaAs/InP APD for all three QKD protocols

  7. Carboplatin hypersensitivity: evaluation and successful desensitization protocol.

    Science.gov (United States)

    Bruchim, Ilan; Goldberg, Arnon; Fishman, Ami; Confino-Cohen, Ronit

    2014-01-01

    Carboplatin-induced immediate hypersensitivity reactions are relatively common among patients with gynecological malignancies. Once this occurs, the patient might be at risk for future carboplatin-induced reactions. This study evaluated the efficacy of allergic consultation, carboplatin skin testing and desensitization as a single intervention strategy in this population. Patients with a well-documented immediate reaction to carboplatin were offered allergy consultation, carboplatin skin testing and a desensitization plan in a single visit between scheduled chemotherapy sessions. Fifty-five patients with an immediate reaction were evaluated. After allergist assessment, 44 (89%) of 49 patients skin tested had a positive result. A total of 207 carboplatin desensitization cycles were administered to 49 women. Among them, 10 patients had a mild immediate hypersensitivity reaction during desensitization. Five patients subsequently tolerated carboplatin administered in the prolonged desensitization protocol. In the data presented, we propose a strategy that is both cost effective and very convenient for the patient. The diagnostic procedure, including allergist consultation and skin test, can be completed in less than 2 h. In most cases where carboplatin is indispensable, desensitization can be administered without overnight hospitalization.

  8. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  9. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  10. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  11. Changes in co-contraction during stair descent after manual therapy protocol in knee osteoarthritis: A pilot, single-blind, randomized study.

    Science.gov (United States)

    Cruz-Montecinos, Carlos; Flores-Cartes, Rodrigo; Montt-Rodriguez, Agustín; Pozo, Esteban; Besoaín-Saldaña, Alvaro; Horment-Lara, Giselle

    2016-10-01

    Manual therapy has shown clinical results in patients with knee osteoarthritis. However, the biomechanical aspects during functional tasks have not been explored in depth. Through surface electromyography, the medial and lateral co-contractions of the knee were measured while descending stairs, prior and posterior to applying a manual therapy protocol in the knee, with emphasis on techniques of joint mobilization and soft-tissue management. Sixteen females with slight or moderate knee osteoarthritis were recruited (eight experimental, eight control). It was observed that the lateral co-contraction index of the experimental group, posterior to intervention, increased by 11.7% (p = 0.014). The application of a manual therapy protocol with emphasis on techniques of joint mobilization and soft-tissue management modified lateral co-contraction, which would have a protective effect on the joint. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  13. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  14. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  15. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  16. Optimal linear detectors for nonorthogonal amplify-and-forward protocol

    KAUST Repository

    Ahmed, Qasim Zeeshan; Park, Kihong; Alouini, Mohamed-Slim; Aissa, Sonia

    2013-01-01

    In this paper, we propose optimal linear detectors for non-orthogonal amplify-and-forward cooperative protocol when considering a single-relay scenario. Two types of detectors are proposed based on the principles of minimum mean square error (MMSE) and minimum bit error rate (MBER). The MMSE detector minimizes the mean square error, while the MBER minimizes the system bit error rate (BER). Both detectors exhibit excellent BER performance with relatively low complexity as compared to the maximal likelihood (ML) detector. The BER performance of both detectors is superior to the channel inversion, the maximal ratio combining, and the biased ML detectors. © 2013 IEEE.

  17. Optimal linear detectors for nonorthogonal amplify-and-forward protocol

    KAUST Repository

    Ahmed, Qasim Zeeshan

    2013-06-01

    In this paper, we propose optimal linear detectors for non-orthogonal amplify-and-forward cooperative protocol when considering a single-relay scenario. Two types of detectors are proposed based on the principles of minimum mean square error (MMSE) and minimum bit error rate (MBER). The MMSE detector minimizes the mean square error, while the MBER minimizes the system bit error rate (BER). Both detectors exhibit excellent BER performance with relatively low complexity as compared to the maximal likelihood (ML) detector. The BER performance of both detectors is superior to the channel inversion, the maximal ratio combining, and the biased ML detectors. © 2013 IEEE.

  18. Influence of experimental parameters inherent to optical fibers on Quantum Key Distribution, the protocol BB84

    Directory of Open Access Journals (Sweden)

    L. Bouchoucha

    2018-03-01

    Full Text Available In this work, we represent the principle of quantum cryptography (QC that is based on fundamental laws of quantum physics. QC or Quantum Key Distribution (QKD uses various protocols to exchange a secret key between two communicating parties. This research paper focuses and examines the quantum key distribution by using the protocol BB84 in the case of encoding on the single-photon polarization and shows the influence of optical components parameters on the quantum key distribution. We also introduce Quantum Bit Error Rate (QBER to better interpret our results and show its relationship with the intrusion of the eavesdropper called Eve on the optical channel to exploit these vulnerabilities.

  19. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  20. The influence of toxicity constraints in models of chemotherapeutic protocol escalation

    KAUST Repository

    Boston, E. A. J.

    2011-04-06

    The prospect of exploiting mathematical and computational models to gain insight into the influence of scheduling on cancer chemotherapeutic effectiveness is increasingly being considered. However, the question of whether such models are robust to the inclusion of additional tumour biology is relatively unexplored. In this paper, we consider a common strategy for improving protocol scheduling that has foundations in mathematical modelling, namely the concept of dose densification, whereby rest phases between drug administrations are reduced. To maintain a manageable scope in our studies, we focus on a single cell cycle phase-specific agent with uncomplicated pharmacokinetics, as motivated by 5-Fluorouracil-based adjuvant treatments of liver micrometastases. In particular, we explore predictions of the effectiveness of dose densification and other escalations of the protocol scheduling when the influence of toxicity constraints, cell cycle phase specificity and the evolution of drug resistance are all represented within the modelling. For our specific focus, we observe that the cell cycle and toxicity should not simply be neglected in modelling studies. Our explorations also reveal the prediction that dose densification is often, but not universally, effective. Furthermore, adjustments in the duration of drug administrations are predicted to be important, especially when dose densification in isolation does not yield improvements in protocol outcomes. © The author 2011. Published by Oxford University Press on behalf of the Institute of Mathematics and its Applications. All rights reserved.

  1. Analysis of gap formation at tooth-composite resin interface: effect of C-factor and light-curing protocol

    Directory of Open Access Journals (Sweden)

    Gustavo Oliveira dos Santos

    2007-08-01

    Full Text Available OBJECTIVE: The aim of this study was to evaluate the effect of C-factor and light-curing protocol on gap formation in composite resin restorations. Material and METHODS: Cylindrical cavities with 5.0 mm diameter and three different depths (A=1.0, B=2.0 and C=3.0 mm were prepared on the occlusal surface of 30 human molars and restored in a single increment with P 60. The composite resin was light-cured according to two protocols: standard - 850 mW/cm² / 20 s and gradual - 100 up to 1000 mW/cm² / 10 s + 1000 mW/cm² / 10 s. After storage in distilled water (37°C/7 days, the restorations were cut into three slices in a buccolingual direction and the gap widths were analyzed using a 3D-scanning system. The data were submitted to ANOVA and Student-Newman-Keuls test (alpha=0.05. RESULTS: ANOVA detected a significant influence for the C-factor and light-curing protocol as independent factors, and for the double interaction C-factor vs. light-curing protocol. Cavities with higher C-factor presented the highest gap formation. The gradual light-curing protocol led to smaller gap formation at cavity interfaces. CONCLUSIONS: The findings of this study suggest that the C-factor played an essential role in gap formation. The gradual light-curing protocol may allow relaxation of composite resin restoration during polymerization reaction.

  2. Optimized quantum sensing with a single electron spin using real-time adaptive measurements

    Science.gov (United States)

    Bonato, C.; Blok, M. S.; Dinani, H. T.; Berry, D. W.; Markham, M. L.; Twitchen, D. J.; Hanson, R.

    2016-03-01

    Quantum sensors based on single solid-state spins promise a unique combination of sensitivity and spatial resolution. The key challenge in sensing is to achieve minimum estimation uncertainty within a given time and with high dynamic range. Adaptive strategies have been proposed to achieve optimal performance, but their implementation in solid-state systems has been hindered by the demanding experimental requirements. Here, we realize adaptive d.c. sensing by combining single-shot readout of an electron spin in diamond with fast feedback. By adapting the spin readout basis in real time based on previous outcomes, we demonstrate a sensitivity in Ramsey interferometry surpassing the standard measurement limit. Furthermore, we find by simulations and experiments that adaptive protocols offer a distinctive advantage over the best known non-adaptive protocols when overhead and limited estimation time are taken into account. Using an optimized adaptive protocol we achieve a magnetic field sensitivity of 6.1 ± 1.7 nT Hz-1/2 over a wide range of 1.78 mT. These results open up a new class of experiments for solid-state sensors in which real-time knowledge of the measurement history is exploited to obtain optimal performance.

  3. Linear optical quantum computing in a single spatial mode.

    Science.gov (United States)

    Humphreys, Peter C; Metcalf, Benjamin J; Spring, Justin B; Moore, Merritt; Jin, Xian-Min; Barbieri, Marco; Kolthammer, W Steven; Walmsley, Ian A

    2013-10-11

    We present a scheme for linear optical quantum computing using time-bin-encoded qubits in a single spatial mode. We show methods for single-qubit operations and heralded controlled-phase (cphase) gates, providing a sufficient set of operations for universal quantum computing with the Knill-Laflamme-Milburn [Nature (London) 409, 46 (2001)] scheme. Our protocol is suited to currently available photonic devices and ideally allows arbitrary numbers of qubits to be encoded in the same spatial mode, demonstrating the potential for time-frequency modes to dramatically increase the quantum information capacity of fixed spatial resources. As a test of our scheme, we demonstrate the first entirely single spatial mode implementation of a two-qubit quantum gate and show its operation with an average fidelity of 0.84±0.07.

  4. iLAP: a workflow-driven software for experimental protocol development, data acquisition and analysis

    Directory of Open Access Journals (Sweden)

    McNally James

    2009-01-01

    Full Text Available Abstract Background In recent years, the genome biology community has expended considerable effort to confront the challenges of managing heterogeneous data in a structured and organized way and developed laboratory information management systems (LIMS for both raw and processed data. On the other hand, electronic notebooks were developed to record and manage scientific data, and facilitate data-sharing. Software which enables both, management of large datasets and digital recording of laboratory procedures would serve a real need in laboratories using medium and high-throughput techniques. Results We have developed iLAP (Laboratory data management, Analysis, and Protocol development, a workflow-driven information management system specifically designed to create and manage experimental protocols, and to analyze and share laboratory data. The system combines experimental protocol development, wizard-based data acquisition, and high-throughput data analysis into a single, integrated system. We demonstrate the power and the flexibility of the platform using a microscopy case study based on a combinatorial multiple fluorescence in situ hybridization (m-FISH protocol and 3D-image reconstruction. iLAP is freely available under the open source license AGPL from http://genome.tugraz.at/iLAP/. Conclusion iLAP is a flexible and versatile information management system, which has the potential to close the gap between electronic notebooks and LIMS and can therefore be of great value for a broad scientific community.

  5. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  6. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  7. Chest magnetic resonance imaging: a protocol suggestion

    Directory of Open Access Journals (Sweden)

    Bruno Hochhegger

    2015-12-01

    Full Text Available Abstract In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation.

  8. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  9. Comparison of carboplatin and doxorubicin-based chemotherapy protocols in 470 dogs after amputation for treatment of appendicular osteosarcoma.

    Science.gov (United States)

    Selmic, L E; Burton, J H; Thamm, D H; Withrow, S J; Lana, S E

    2014-01-01

    Many chemotherapy protocols have been reported for treatment of canine appendicular osteosarcoma (OSA), but outcome comparisons in a single population are lacking. To evaluate the effects of protocol and dose intensity (DI) on treatment outcomes for carboplatin and doxorubicin-based chemotherapy protocols. Four hundred and seventy dogs with appendicular OSA. A retrospective cohort study was performed comprising consecutive dogs treated (1997-2012) with amputation followed by 1 of 5 chemotherapy protocols: carboplatin 300 mg/m(2) IV q21d for 4 or 6 cycles (CARBO6), doxorubicin 30 mg/m(2) IV q14d or q21d for 5 cycles, and alternating carboplatin 300 mg/m(2) IV and doxorubicin 30 mg/m(2) IV q21d for 3 cycles. Adverse events (AE) and DI were evaluated. Kaplan-Meier survival curves and Cox proportional hazards regression were used to compare disease-free interval (DFI) and survival time (ST) among protocols. The overall median DFI and ST were 291 days and 284 days, respectively. A lower proportion of dogs prescribed CARBO6 experienced AEs compared to other protocols (48.4% versus 60.8-75.8%; P = .001). DI was not associated with development of metastases or death. After adjustment for baseline characteristics and prognostic factors, none of the protocols provided a significant reduction in risk of development of metastases or death. Although choice of protocol did not result in significant differences in DFI or ST, the CARBO6 protocol resulted in a lower proportion of dogs experiencing AEs, which could be advantageous in maintaining high quality of life during treatment. DI was not a prognostic indicator in this study. Copyright © 2014 by the American College of Veterinary Internal Medicine.

  10. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  11. Sinusoidal voltage protocols for rapid characterisation of ion channel kinetics.

    Science.gov (United States)

    Beattie, Kylie A; Hill, Adam P; Bardenet, Rémi; Cui, Yi; Vandenberg, Jamie I; Gavaghan, David J; de Boer, Teun P; Mirams, Gary R

    2018-03-24

    Ion current kinetics are commonly represented by current-voltage relationships, time constant-voltage relationships and subsequently mathematical models fitted to these. These experiments take substantial time, which means they are rarely performed in the same cell. Rather than traditional square-wave voltage clamps, we fitted a model to the current evoked by a novel sum-of-sinusoids voltage clamp that was only 8 s long. Short protocols that can be performed multiple times within a single cell will offer many new opportunities to measure how ion current kinetics are affected by changing conditions. The new model predicts the current under traditional square-wave protocols well, with better predictions of underlying currents than literature models. The current under a novel physiologically relevant series of action potential clamps is predicted extremely well. The short sinusoidal protocols allow a model to be fully fitted to individual cells, allowing us to examine cell-cell variability in current kinetics for the first time. Understanding the roles of ion currents is crucial to predict the action of pharmaceuticals and mutations in different scenarios, and thereby to guide clinical interventions in the heart, brain and other electrophysiological systems. Our ability to predict how ion currents contribute to cellular electrophysiology is in turn critically dependent on our characterisation of ion channel kinetics - the voltage-dependent rates of transition between open, closed and inactivated channel states. We present a new method for rapidly exploring and characterising ion channel kinetics, applying it to the hERG potassium channel as an example, with the aim of generating a quantitatively predictive representation of the ion current. We fitted a mathematical model to currents evoked by a novel 8 second sinusoidal voltage clamp in CHO cells overexpressing hERG1a. The model was then used to predict over 5 minutes of recordings in the same cell in response to

  12. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  13. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  14. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  15. Depression in Chinese men undergoing different assisted reproductive technique treatments: prevalence and risk factors.

    Science.gov (United States)

    Li, Li; Zhang, Yuanzhen; Zeng, Dan; Li, Fei; Cui, Dan

    2013-09-01

    To explore the prevalence and risk factors for depression in men undergoing different assisted reproductive technique (ART) treatments in Chinese population. This was a prospective study of 844 men undergoing ART treatments. All men were distributed to four groups, according to they received treatments. The treatments included IUI (intrauterine insemination), IVF(in vitro fertilization), ICSI(intra cytoplasmatic sperm injection) and TESA/PESA (percutaneous epididymal sperm aspiration/testicular sperm aspiration). Their symptoms of depression were measured with use of the Center for Epidemiologic Studies of Depression scale(CES-D). Data were collected about age, BMI, education, duration of marriage, duration of infertility, smoking, type of infertility, infertility causes, history of ejaculation failure, and financial burden of the treatment. We estimated the prevalence of depressive symptom in men undergoing different ART and used logistic regression models to identify risk factors for depression in different groups. The overall prevalence of depression was 13.3 % for men undergoing ART treatments: 14.5 % of IUI group, 12.4 % of IVF group, 19.2 % of ICSI group and 6.2 % of TESA/PESA group. Prevalence of depression among IUI group, IVF group and ICSI group were not significantly different. For IUI group, the factors were found to increase depression risk were treatment financial burden and duration of marriage, to decrease depression risk was age. For IVF group, the risk factors independently associated with depression were both male and female infertility, unexplained infertility, and history of ejaculation failure. In a sample of Chinese men undergoing ART treatments, the prevalence of depression was higher than other country. The risk factors for depression varied in different ART treatments groups. when routine screening to identify the sub-group of vulnerable men which need counselling before ART treatments, we should also consider which pattern of ART

  16. Outcomes after intrauterine insemination are independent of provider type

    Science.gov (United States)

    Goldman, Randi H.; Batsis, Maria; Hacker, Michele R.; Souter, Irene; Petrozza, John C.

    2015-01-01

    OBJECTIVE We sought to determine whether the success of intrauterine insemination (IUI) varies based on the type of health care provider performing the procedure. STUDY DESIGN This was a retrospective cohort study set at an infertility clinic at an academic institution. The patients who comprised this study were 1575 women who underwent 3475 IUI cycles from late 2003 through early 2012. Cycles were stratified into 3 groups according to the type of provider who performed the procedure: attending physician, fellow physician, or registered nurse (RN). The primary outcome was live birth. Additional outcomes of interest included positive pregnancy test and clinical pregnancy. Repeated measures log binomial regression was used to estimate the risk ratios (RR) and 95% confidence intervals (CI) for the outcomes and to evaluate the effect of potential confounders. All tests were 2-sided, and P values < .05 were considered statistically significant. RESULTS Of the 3475 IUI cycles, 2030 (58.4%) were gonadotropin stimulated, 929 (26.7%) were clomiphene citrate stimulated, and 516 (14.9%) were natural. The incidences of clinical pregnancy and live birth among all cycles were 11.8% and 8.8%, respectively. After adjusting for female age, male partner age, and cycle type, the incidence of live birth was similar for RNs compared with attending physicians (RR, 0.80; 95% CI, 0.58–1.1) and fellow physicians compared with attending physicians (RR, 0.84; 95% CI, 0.58–1.2). Similar results were seen for positive pregnancy test and clinical pregnancy. CONCLUSION There was no significant difference in live birth following IUI cycles in which the procedure was performed by a fellow physician or RN compared with an attending physician. PMID:24881820

  17. RareVar: A Framework for Detecting Low-Frequency Single-Nucleotide Variants.

    Science.gov (United States)

    Hao, Yangyang; Xuei, Xiaoling; Li, Lang; Nakshatri, Harikrishna; Edenberg, Howard J; Liu, Yunlong

    2017-07-01

    Accurate identification of low-frequency somatic point mutations in tumor samples has important clinical utilities. Although high-throughput sequencing technology enables capturing such variants while sequencing primary tumor samples, our ability for accurate detection is compromised when the variant frequency is close to the sequencer error rate. Most current experimental and bioinformatic strategies target mutations with ≥5% allele frequency, which limits our ability to understand the cancer etiology and tumor evolution. We present an experimental and computational modeling framework, RareVar, to reliably identify low-frequency single-nucleotide variants from high-throughput sequencing data under standard experimental protocols. RareVar protocol includes a benchmark design by pooling DNAs from already sequenced individuals at various concentrations to target variants at desired frequencies, 0.5%-3% in our case. By applying a generalized, linear model-based, position-specific error model, followed by machine-learning-based variant calibration, our approach outperforms existing methods. Our method can be applied on most capture and sequencing platforms without modifying the experimental protocol.

  18. Voice Over the Internet Protocol as a Medium for Delivering Reading Intervention

    Directory of Open Access Journals (Sweden)

    Craig Wright

    2011-10-01

    Full Text Available Voice Over the Internet Protocol (VoIP holds promise as a platform by which services can be delivered to students in rural and remote regions who have reading difficulties. VoIP is an Internet-based protocol that allows two or more individuals to videoconference from remote locations. This study used a single-case research design to investigate whether VoIP would produce significant gains in reading ability in BM, a 10-year-old with long-standing word-level reading problems. BM was provided with a theoretically motivated reading intervention 4 times weekly. The intervention was delivered remotely using the Apple iChat software. Substantial growth in regular- and nonword reading covaried with onset and removal of treatment. Treatment gains were maintained at 10-week follow-up. Meaningful gains were also seen in text-reading accuracy and reading comprehension. VoIP-based instruction represents an important avenue for future research and is a teaching method that holds much promise for rural and remote students.

  19. A comprehensive strategy for the analysis of acoustic compressibility and optical deformability on single cells

    DEFF Research Database (Denmark)

    Yang, Tie; Bragheri, Francesca; Nava, Giovanni

    2016-01-01

    We realized an integrated microfluidic chip that allows measuring both optical deformability and acoustic compressibility on single cells, by optical stretching and acoustophoresis experiments respectively. Additionally, we propose a measurement protocol that allows evaluating the experimental ap...

  20. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  1. Single-shot secure quantum network coding on butterfly network with free public communication

    Science.gov (United States)

    Owari, Masaki; Kato, Go; Hayashi, Masahito

    2018-01-01

    Quantum network coding on the butterfly network has been studied as a typical example of quantum multiple cast network. We propose a secure quantum network code for the butterfly network with free public classical communication in the multiple unicast setting under restricted eavesdropper’s power. This protocol certainly transmits quantum states when there is no attack. We also show the secrecy with shared randomness as additional resource when the eavesdropper wiretaps one of the channels in the butterfly network and also derives the information sending through public classical communication. Our protocol does not require verification process, which ensures single-shot security.

  2. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  3. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  4. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  5. Storage of multiple single-photon pulses emitted from a quantum dot in a solid-state quantum memory

    Science.gov (United States)

    Tang, Jian-Shun; Zhou, Zong-Quan; Wang, Yi-Tao; Li, Yu-Long; Liu, Xiao; Hua, Yi-Lin; Zou, Yang; Wang, Shuang; He, De-Yong; Chen, Geng; Sun, Yong-Nan; Yu, Ying; Li, Mi-Feng; Zha, Guo-Wei; Ni, Hai-Qiao; Niu, Zhi-Chuan; Li, Chuan-Feng; Guo, Guang-Can

    2015-01-01

    Quantum repeaters are critical components for distributing entanglement over long distances in presence of unavoidable optical losses during transmission. Stimulated by the Duan–Lukin–Cirac–Zoller protocol, many improved quantum repeater protocols based on quantum memories have been proposed, which commonly focus on the entanglement-distribution rate. Among these protocols, the elimination of multiple photons (or multiple photon-pairs) and the use of multimode quantum memory are demonstrated to have the ability to greatly improve the entanglement-distribution rate. Here, we demonstrate the storage of deterministic single photons emitted from a quantum dot in a polarization-maintaining solid-state quantum memory; in addition, multi-temporal-mode memory with 1, 20 and 100 narrow single-photon pulses is also demonstrated. Multi-photons are eliminated, and only one photon at most is contained in each pulse. Moreover, the solid-state properties of both sub-systems make this configuration more stable and easier to be scalable. Our work will be helpful in the construction of efficient quantum repeaters based on all-solid-state devices. PMID:26468996

  6. Single-Cell RNA Sequencing of Glioblastoma Cells.

    Science.gov (United States)

    Sen, Rajeev; Dolgalev, Igor; Bayin, N Sumru; Heguy, Adriana; Tsirigos, Aris; Placantonakis, Dimitris G

    2018-01-01

    Single-cell RNA sequencing (sc-RNASeq) is a recently developed technique used to evaluate the transcriptome of individual cells. As opposed to conventional RNASeq in which entire populations are sequenced in bulk, sc-RNASeq can be beneficial when trying to better understand gene expression patterns in markedly heterogeneous populations of cells or when trying to identify transcriptional signatures of rare cells that may be underrepresented when using conventional bulk RNASeq. In this method, we describe the generation and analysis of cDNA libraries from single patient-derived glioblastoma cells using the C1 Fluidigm system. The protocol details the use of the C1 integrated fluidics circuit (IFC) for capturing, imaging and lysing cells; performing reverse transcription; and generating cDNA libraries that are ready for sequencing and analysis.

  7. Self-Adaptive Context Aware Routing Protocol for Unicast Communication in Delay and Tolerant Network

    Directory of Open Access Journals (Sweden)

    Yunbo Chen

    2014-05-01

    Full Text Available At present, most of research works in mobile network focus on the network overhead of the known path which exists between the sender and the receiver. However, the trend of the current practical application demands is becoming increasingly distributed and decentralized. The Delay and Tolerant Network (DTN just comes out of such background of the conflicts between them. The DTN could effectively eliminate the gap between the mobile network and the practical application demands. In this paper, a Self-Adaptive Context Aware Routing Protocol (SACARP for the unicast communication in delay and tolerant networks is presented. Meanwhile, according to the real-time context information of DTN, the Kalman filter theory is introduced to predict the information state of mobility for the optional message ferrying node, and then gives the optimal selection strategy of the message ferrying nodes. The simulation experiments have shown that, compared to the familiar single- copy and multi-copy protocols, the SACARP proposed in this paper has better transmission performance and stability, especially when the network is free, the protocol would keep a good performance with fewer connections and less buffer space.

  8. Application of the luminescence single-aliquot technique for dose estimation in the Marmara Sea

    International Nuclear Information System (INIS)

    Tanir, Guenes; Sencan, Emine; Boeluekdemir, M. Hicabi; Tuerkoez, M. Burak; Tel, Eyuep

    2005-01-01

    The aim of this study is to obtain the equivalent dose, which is the important quantity for all the studies related to the use of luminescence in dating sediments. Recent advances in luminescence dating have led to increasing application of the technique to sediment from the depositional environmental samples. The sample used in this study is the active main fault sample that was collected from the Sea of Marmara in NW Turkey. Equivalent dose was measured using both the multiple-aliquots and the single-aliquot techniques. In this study single aliquot regeneration on additive dose (SARA) procedure was also used. The result obtained was not in agreement with the results evaluated from the multiple-aliquots procedure. So a simple modification was suggested for SARA procedure. In our modified procedure the calculated dose (D) values were obtained by using the additive dose protocol instead of regeneration protocol

  9. Mapping of single-copy genes by TSA-FISH in the codling moth, Cydia pomonella.

    Science.gov (United States)

    Carabajal Paladino, Leonela Z; Nguyen, Petr; Síchová, Jindra; Marec, František

    2014-01-01

    We work on the development of transgenic sexing strains in the codling moth, Cydia pomonella (Tortricidae), which would enable to produce male-only progeny for the population control of this pest using sterile insect technique (SIT). To facilitate this research, we have developed a number of cytogenetic and molecular tools, including a physical map of the codling moth Z chromosome using BAC-FISH (fluorescence in situ hybridization with bacterial artificial chromosome probes). However, chromosomal localization of unique, single-copy sequences such as a transgene cassette by conventional FISH remains challenging. In this study, we adapted a FISH protocol with tyramide signal amplification (TSA-FISH) for detection of single-copy genes in Lepidoptera. We tested the protocol with probes prepared from partial sequences of Z-linked genes in the codling moth. Using a modified TSA-FISH protocol we successfully mapped a partial sequence of the Acetylcholinesterase 1 (Ace-1) gene to the Z chromosome and confirmed thus its Z-linkage. A subsequent combination of BAC-FISH with BAC probes containing anticipated neighbouring Z-linked genes and TSA-FISH with the Ace-1 probe allowed the integration of Ace-1 in the physical map of the codling moth Z chromosome. We also developed a two-colour TSA-FISH protocol which enabled us simultaneous localization of two Z-linked genes, Ace-1 and Notch, to the expected regions of the Z chromosome. We showed that TSA-FISH represents a reliable technique for physical mapping of genes on chromosomes of moths and butterflies. Our results suggest that this technique can be combined with BAC-FISH and in the future used for physical localization of transgene cassettes on chromosomes of transgenic lines in the codling moth or other lepidopteran species. Furthermore, the developed protocol for two-colour TSA-FISH might become a powerful tool for synteny mapping in non-model organisms.

  10. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    International Nuclear Information System (INIS)

    McGowan, S E; Albertini, F; Lomax, A J; Thomas, S J

    2015-01-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties. (paper)

  11. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    Science.gov (United States)

    McGowan, S. E.; Albertini, F.; Thomas, S. J.; Lomax, A. J.

    2015-04-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties.

  12. Neoadjuvant chemoradiation (modified Eilber protocol) versus adjuvant radiotherapy in the treatment of extremity soft tissue sarcoma

    International Nuclear Information System (INIS)

    Lehane, Chris; Parasyn, Andrew; Ho, Frederick; Thompson, Stephen R.; Smee, Robert; Links, David; Crowe, Phil; Lewis, Craig; Friedlander, Michael; Williams, Janet

    2016-01-01

    Local control for extremity soft tissue sarcomas (STS) requires surgery combined with radiotherapy, usually given pre-operatively or post-operatively. The modified Eilber protocol, a neoadjuvant chemoradiation regimen, has been reported with excellent local control rates. This retrospective single-centre study compared outcomes for patients treated with the modified Eilber protocol with those treated with standard adjuvant radiotherapy. Twenty-nine patients were treated with modified Eilber protocol. Thirty-four patients received adjuvant radiotherapy. Three patients (10%) in the Eilber group and five patients (15%) in the Adjuvant group developed local recurrence (P = 0.87). Major acute wound complications were noted in four patients in each group (P = 0.55). One patient (3.4%) in the Eilber group developed Grade 3 or 4 late toxicities after 1 year compared with nine patients (27%) in the Adjuvant group (P = 0.02). Patients with a diagnosis of extremity STS were retrospectively reviewed from the Prince of Wales Hospital Sarcoma Database from 1995 to 2012. Sixty-three patients underwent curative surgery with either neoadjuvant Eilber chemoradiotherapy (Eilber) or adjuvant radiotherapy (Adjuvant). Neoadjuvant chemoradiation (Eilber protocol) provided similar rates of local control when compared with adjuvant radiotherapy. Acute wound complication rates were similar but there was less severe late toxicity in the Eilber group.

  13. Dual-energy CT for the characterization of urinary calculi: In vitro and in vivo evaluation of a low-dose scanning protocol

    International Nuclear Information System (INIS)

    Thomas, C.; Patschan, O.; Nagele, U.; Stenzl, A.; Ketelsen, D.; Tsiflikas, I.; Reimann, A.; Brodoefel, H.; Claussen, C.; Kopp, A.; Heuschmid, M.; Schlemmer, H.P.; Buchgeister, M.

    2009-01-01

    The efficiency and radiation dose of a low-dose dual-energy (DE) CT protocol for the evaluation of urinary calculus disease were evaluated. A low-dose dual-source DE-CT renal calculi protocol (140 kV, 46 mAs; 80 kV, 210 mAs) was derived from the single-energy (SE) CT protocol used in our institution for the detection of renal calculi (120 kV, 75 mAs). An Alderson-Rando phantom was equipped with thermoluminescence dosimeters and examined by CT with both protocols. The effective doses were calculated. Fifty-one patients with suspected or known urinary calculus disease underwent DE-CT. DE analysis was performed if calculi were detected using a dedicated software tool. Results were compared to chemical analysis after invasive calculus extraction. An effective dose of 3.43 mSv (male) and 5.30 mSv (female) was measured in the phantom for the DE protocol (vs. 3.17/4.57 mSv for the SE protocol). Urinary calculi were found in 34 patients; in 28 patients, calculi were removed and analyzed (23 patients with calcified calculi, three with uric acid calculi, one with 2,8-dihyxdroxyadenine-calculi, one patient with a mixed struvite calculus). DE analysis was able to distinguish between calcified and non-calcified calculi in all cases. In conclusion, dual-energy urinary calculus analysis is effective also with a low-dose protocol. The protocol tested in this study reliably identified calcified urinary calculi in vivo. (orig.)

  14. Dual-energy CT for the characterization of urinary calculi: In vitro and in vivo evaluation of a low-dose scanning protocol.

    Science.gov (United States)

    Thomas, C; Patschan, O; Ketelsen, D; Tsiflikas, I; Reimann, A; Brodoefel, H; Buchgeister, M; Nagele, U; Stenzl, A; Claussen, C; Kopp, A; Heuschmid, M; Schlemmer, H-P

    2009-06-01

    The efficiency and radiation dose of a low-dose dual-energy (DE) CT protocol for the evaluation of urinary calculus disease were evaluated. A low-dose dual-source DE-CT renal calculi protocol (140 kV, 46 mAs; 80 kV, 210 mAs) was derived from the single-energy (SE) CT protocol used in our institution for the detection of renal calculi (120 kV, 75 mAs). An Alderson-Rando phantom was equipped with thermoluminescence dosimeters and examined by CT with both protocols. The effective doses were calculated. Fifty-one patients with suspected or known urinary calculus disease underwent DE-CT. DE analysis was performed if calculi were detected using a dedicated software tool. Results were compared to chemical analysis after invasive calculus extraction. An effective dose of 3.43 mSv (male) and 5.30 mSv (female) was measured in the phantom for the DE protocol (vs. 3.17/4.57 mSv for the SE protocol). Urinary calculi were found in 34 patients; in 28 patients, calculi were removed and analyzed (23 patients with calcified calculi, three with uric acid calculi, one with 2,8-dihyxdroxyadenine-calculi, one patient with a mixed struvite calculus). DE analysis was able to distinguish between calcified and non-calcified calculi in all cases. In conclusion, dual-energy urinary calculus analysis is effective also with a low-dose protocol. The protocol tested in this study reliably identified calcified urinary calculi in vivo.

  15. Dual-energy CT for the characterization of urinary calculi: In vitro and in vivo evaluation of a low-dose scanning protocol

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, C. [University of Tuebingen, Department of Diagnostic and Interventional Radiology, Tuebingen (Germany); Department of Diagnostic and Interventional Radiology, Tuebingen (Germany); Patschan, O.; Nagele, U.; Stenzl, A. [University of Tuebingen, Department of Urology, Tuebingen (Germany); Ketelsen, D.; Tsiflikas, I.; Reimann, A.; Brodoefel, H.; Claussen, C.; Kopp, A.; Heuschmid, M.; Schlemmer, H.P. [University of Tuebingen, Department of Diagnostic and Interventional Radiology, Tuebingen (Germany); Buchgeister, M. [University of Tuebingen, Medical Physics, Department of Radiation Oncology, Tuebingen (Germany)

    2009-06-15

    The efficiency and radiation dose of a low-dose dual-energy (DE) CT protocol for the evaluation of urinary calculus disease were evaluated. A low-dose dual-source DE-CT renal calculi protocol (140 kV, 46 mAs; 80 kV, 210 mAs) was derived from the single-energy (SE) CT protocol used in our institution for the detection of renal calculi (120 kV, 75 mAs). An Alderson-Rando phantom was equipped with thermoluminescence dosimeters and examined by CT with both protocols. The effective doses were calculated. Fifty-one patients with suspected or known urinary calculus disease underwent DE-CT. DE analysis was performed if calculi were detected using a dedicated software tool. Results were compared to chemical analysis after invasive calculus extraction. An effective dose of 3.43 mSv (male) and 5.30 mSv (female) was measured in the phantom for the DE protocol (vs. 3.17/4.57 mSv for the SE protocol). Urinary calculi were found in 34 patients; in 28 patients, calculi were removed and analyzed (23 patients with calcified calculi, three with uric acid calculi, one with 2,8-dihyxdroxyadenine-calculi, one patient with a mixed struvite calculus). DE analysis was able to distinguish between calcified and non-calcified calculi in all cases. In conclusion, dual-energy urinary calculus analysis is effective also with a low-dose protocol. The protocol tested in this study reliably identified calcified urinary calculi in vivo. (orig.)

  16. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  17. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  18. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  19. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  20. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  1. Investigating single molecule adhesion by atomic force spectroscopy.

    Science.gov (United States)

    Stetter, Frank W S; Kienle, Sandra; Krysiak, Stefanie; Hugel, Thorsten

    2015-02-27

    Atomic force spectroscopy is an ideal tool to study molecules at surfaces and interfaces. An experimental protocol to couple a large variety of single molecules covalently onto an AFM tip is presented. At the same time the AFM tip is passivated to prevent unspecific interactions between the tip and the substrate, which is a prerequisite to study single molecules attached to the AFM tip. Analyses to determine the adhesion force, the adhesion length, and the free energy of these molecules on solid surfaces and bio-interfaces are shortly presented and external references for further reading are provided. Example molecules are the poly(amino acid) polytyrosine, the graft polymer PI-g-PS and the phospholipid POPE (1-palmitoyl-2-oleoyl-sn-glycero-3-phosphoethanolamine). These molecules are desorbed from different surfaces like CH3-SAMs, hydrogen terminated diamond and supported lipid bilayers under various solvent conditions. Finally, the advantages of force spectroscopic single molecule experiments are discussed including means to decide if truly a single molecule has been studied in the experiment.

  2. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  3. Can a single pulse transcranial magnetic stimulation targeted to the motor cortex interrupt pain processing?

    Science.gov (United States)

    Kisler, Lee-Bareket; Gurion, Ilan; Granovsky, Yelena; Sinai, Alon; Sprecher, Elliot; Shamay-Tsoory, Simone; Weissman-Fogel, Irit

    2018-01-01

    The modulatory role of the primary motor cortex (M1), reflected by an inhibitory effect of M1-stimulation on clinical pain, motivated us to deepen our understanding of M1's role in pain modulation. We used Transcranial Magnetic Stimulation (TMS)-induced virtual lesion (VL) to interrupt with M1 activity during noxious heat pain. We hypothesized that TMS-VL will effect experimental pain ratings. Three VL protocols were applied consisting of single-pulse TMS to transiently interfere with right M1 activity: (1) VLM1- TMS applied to 11 subjects, 20 msec before the individual's first pain-related M1 peak activation, as determined by source analysis (sLORETA), (2) VL-50 (N = 16; TMS applied 50 ms prior to noxious stimulus onset), and (3) VL+150 (N = 16; TMS applied 150 ms after noxious stimulus onset). Each protocol included 3 conditions ('pain-alone', ' TMS-VL', and 'SHAM-VL'), each consisted of 30 noxious heat stimuli. Pain ratings were compared, in each protocol, for TMS-VL vs. SHAM-VL and vs. pain-alone conditions. Repeated measures analysis of variance, corrected for multiple comparisons revealed no significant differences in the pain ratings between the different conditions within each protocol. Therefore, our results from this exploratory study suggest that a single pulse TMS-induced VL that is targeted to M1 failed to interrupt experimental pain processing in the specific three stimulation timing examined here.

  4. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  5. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  6. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  7. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  8. The effects of a tailored intensive care unit delirium prevention protocol: A randomized controlled trial.

    Science.gov (United States)

    Moon, Kyoung-Ja; Lee, Sun-Mi

    2015-09-01

    A decreased incidence of delirium following the application of non-pharmacologic intervention protocols to several patient populations has been previously reported. However, few studies have been conducted to examine the effects of their application to intensive care unit (ICU) patients. To examine the effects of applying a tailored delirium preventive protocol, developed by the authors, to ICU patients by analyzing its effects on delirium incidence, in-hospital mortality, ICU readmission, and length of ICU stay in a Korean hospital. A single-blind randomized controlled trial. A 1049-bed general hospital with a 105-bed ICU. Sixty and 63 ICU patients were randomly assigned to the intervention and control groups, respectively. The researchers applied the delirium prevention protocol to the intervention group every day for the first 7 days of ICU hospitalization. Delirium incidence, mortality, and re-admission to the ICU during the same hospitalization period were analyzed by logistic regression analysis; the 7- and 30-day in-hospital mortality by Kaplan-Meier survival and Cox proportional hazard regression analysis; and length of ICU stay was assessed by linear regression analysis. Application of the protocol had no significant effect on delirium incidence, in-hospital mortality, re-admission to the ICU, or length of ICU stay. Whereas the risk of 30-day in-hospital mortality was not significantly lower in the intervention than in the control group (OR: 0.33; 95% CI: 0.10-1.09), we found a significantly decreased 7-day in-hospital mortality in the intervention group after protocol application (HR: 0.09; 95% CI: 0.01-0.72). Application of a tailored delirium prevention protocol to acute stage patients during the first 7 days of ICU hospitalization appeared to reduce the 7-day in-hospital risk of mortality only for this patient population. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  10. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  11. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  12. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  13. DNA Extraction Protocols for Whole-Genome Sequencing in Marine Organisms.

    Science.gov (United States)

    Panova, Marina; Aronsson, Henrik; Cameron, R Andrew; Dahl, Peter; Godhe, Anna; Lind, Ulrika; Ortega-Martinez, Olga; Pereyra, Ricardo; Tesson, Sylvie V M; Wrange, Anna-Lisa; Blomberg, Anders; Johannesson, Kerstin

    2016-01-01

    The marine environment harbors a large proportion of the total biodiversity on this planet, including the majority of the earths' different phyla and classes. Studying the genomes of marine organisms can bring interesting insights into genome evolution. Today, almost all marine organismal groups are understudied with respect to their genomes. One potential reason is that extraction of high-quality DNA in sufficient amounts is challenging for many marine species. This is due to high polysaccharide content, polyphenols and other secondary metabolites that will inhibit downstream DNA library preparations. Consequently, protocols developed for vertebrates and plants do not always perform well for invertebrates and algae. In addition, many marine species have large population sizes and, as a consequence, highly variable genomes. Thus, to facilitate the sequence read assembly process during genome sequencing, it is desirable to obtain enough DNA from a single individual, which is a challenge in many species of invertebrates and algae. Here, we present DNA extraction protocols for seven marine species (four invertebrates, two algae, and a marine yeast), optimized to provide sufficient DNA quality and yield for de novo genome sequencing projects.

  14. Using machine learning to speed up manual image annotation: application to a 3D imaging protocol for measuring single cell gene expression in the developing C. elegans embryo

    Directory of Open Access Journals (Sweden)

    Waterston Robert H

    2010-02-01

    Full Text Available Abstract Background Image analysis is an essential component in many biological experiments that study gene expression, cell cycle progression, and protein localization. A protocol for tracking the expression of individual C. elegans genes was developed that collects image samples of a developing embryo by 3-D time lapse microscopy. In this protocol, a program called StarryNite performs the automatic recognition of fluorescently labeled cells and traces their lineage. However, due to the amount of noise present in the data and due to the challenges introduced by increasing number of cells in later stages of development, this program is not error free. In the current version, the error correction (i.e., editing is performed manually using a graphical interface tool named AceTree, which is specifically developed for this task. For a single experiment, this manual annotation task takes several hours. Results In this paper, we reduce the time required to correct errors made by StarryNite. We target one of the most frequent error types (movements annotated as divisions and train a support vector machine (SVM classifier to decide whether a division call made by StarryNite is correct or not. We show, via cross-validation experiments on several benchmark data sets, that the SVM successfully identifies this type of error significantly. A new version of StarryNite that includes the trained SVM classifier is available at http://starrynite.sourceforge.net. Conclusions We demonstrate the utility of a machine learning approach to error annotation for StarryNite. In the process, we also provide some general methodologies for developing and validating a classifier with respect to a given pattern recognition task.

  15. Knee and hip sagittal and transverse plane changes after two fatigue protocols

    Science.gov (United States)

    Lucci, Shawn; Cortes, Nelson; Van Lunen, Bonnie; Ringleb, Stacie; Onate, James

    2013-01-01

    Fatigue has been shown to alter the biomechanics of lower extremity during landing tasks. To date, no study has examined the effects of two types of fatigue on kinetics and kinematics. Objectives This study was conducted to assess biomechanical differences between two fatigue protocols [Slow Linear Oxidative Fatigue Protocol (SLO-FP) and Functional Agility Short-Term Fatigue Protocol (FAST-FP)]. Design Single-group repeated measures design. Methods Fifteen female collegiate soccer players had to perform five successful trials of unanticipated sidestep cutting (SS) pre- and post-fatigue protocols. The SLO-FP consisted of an initial VO2peak test followed by 5-min rest, and a 30-min interval run. The FAST-FP consisted of 4 sets of a functional circuit. Biomechanical measures of the hip and knee were obtained at different instants while performing SS pre- and post-fatigue. Repeated 2 × 2 ANOVAs were conducted to examine task and fatigue differences. Alpha level set a priori at 0.05. Results During the FAST-FP, participants had increased knee internal rotation at initial contact (IC) (12.5 ± 5.9°) when compared to the SLO-FP (7.9 ± 5.4°, p < 0.001). For hip flexion at IC, pre-fatigue had increased angles (36.4 ± 8.4°) compared to post-fatigue (30.4 ± 9.3°, p = 0.003), also greater knee flexion during pre-fatigue (25.6 ± 6.8°) than post-fatigue (22.4 ± 8.4°, p = 0.022). Conclusion The results of this study showed that hip and knee mechanics were substantially altered during both fatigue conditions. PMID:21636322

  16. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  17. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  18. Optimizing Two-Color Semiconductor Nanocrystal Immunoassays in Single Well Microtiter Plate Formats

    Directory of Open Access Journals (Sweden)

    W. Russ Algar

    2011-08-01

    Full Text Available The simultaneous detection of two analytes, chicken IgY (IgG and Staphylococcal enterotoxin B (SEB, in the single well of a 96-well plate is demonstrated using luminescent semiconductor quantum dot nanocrystal (NC tracers. The NC-labeled antibodies were prepared via sulfhydryl-reactive chemistry using a facile protocol that took

  19. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  20. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  1. Effect of Fatigue Protocols on Lower Limb Neuromuscular Function and Implications for Anterior Cruciate Ligament Injury Prevention Training: A Systematic Review.

    Science.gov (United States)

    Barber-Westin, Sue D; Noyes, Frank R

    2017-12-01

    Approximately two-thirds of anterior cruciate ligament (ACL) tears are sustained during noncontact situations when an athlete is cutting, pivoting, decelerating, or landing from a jump. Some investigators have postulated that fatigue may result in deleterious alterations in lower limb biomechanics during these activities that could increase the risk of noncontact ACL injuries. However, prior studies have noted a wide variation in fatigue protocols, athletic tasks studied, and effects of fatigue on lower limb kinetics and kinematics. First, to determine if fatigue uniformly alters lower limb biomechanics during athletic tasks that are associated with noncontact ACL injuries. Second, to determine if changes should be made in ACL injury prevention training programs to alter the deleterious effects of fatigue on lower limb kinetics and kinematics. Systematic review; Level of evidence, 4. A systematic review of the literature using MEDLINE was performed. Key terms were fatigue, neuromuscular, exercise, hop test, and single-legged function tests. Inclusion criteria were original research studies involving healthy participants, use of a fatigue protocol, study of at least 1 lower limb task that involved landing from a hop or jump or cutting, and analysis of at least 1 biomechanical variable. Thirty-seven studies involving 806 athletes (485 female, 321 male; mean age, 22.7 years) met the inclusion criteria. General fatigue protocols were used in 20 investigations, peripheral protocols were used in 17 studies, and 21 different athletic tasks were studied (13 single-legged, 8 double-legged). There was no consistency among investigations regarding the effects of fatigue on hip, knee, or ankle joint angles and moments or surface electromyography muscle activation patterns. The fatigue protocols typically did not produce statistically significant changes in ground-reaction forces. Published fatigue protocols did not uniformly produce alterations in lower limb neuromuscular

  2. In vitro fertilization and multiple pregnancies: an evidence-based analysis.

    Science.gov (United States)

    2006-01-01

    . IVF was first developed as a method to overcome bilateral Fallopian tube obstruction. The procedure includes several steps: (1) the woman's egg is retrieved from the ovaries; (2) exposed to sperm outside the body and fertilized; (3) the embryo(s) is cultured for 3 to 5 days; and (4) is transferred back to the uterus. IFV is considered to be one of the most effective treatments for infertility today. According to data from the Canadian Assisted Reproductive Technology Registry, the average live birth rate after IVF in Canada is around 30%, but there is considerable variation in the age of the mother and primary cause of infertility. An important advantage of IVF is that it allows for the control of the number of embryos transferred. An elective single embryo transfer in IVF cycles adopted in many European countries was shown to significantly reduce the risk of multiple pregnancies while maintaining acceptable birth rates. However, when number of embryos transferred is not limited, the rate of IVF-associated multiple pregnancies is similar to that of other treatments involving ovarian stimulation. The practice of multiple embryo transfer in IVF is often the result of pressures to increase success rates due to the high costs of the procedure. The average rate of multiple pregnancies resulting from IVF in Canada is currently around 30%. An alternative to IVF is IUI. In spite of reported lower success rates of IUI (pregnancy rates per cycle range from 8.7% to 17.1%) it is generally attempted before IVF due to its lower invasiveness and cost. Two major drawbacks of IUI are that it cannot be used in cases of bilateral tubal obstruction and it does not allow much control over the risk of multiple pregnancies compared with IVF. The rate of multiple pregnancies after IUI with COS is estimated to be about 21% to 29%. Ontario Health Insurance Plan Coverage Currently, the Ontario Health Insurance Plan covers the cost of IVF for women with bilaterally blocked Fallopian tubes only

  3. GOTHIC memory management : a multiprocessor shared single level store

    OpenAIRE

    Michel , Béatrice

    1990-01-01

    Gothic purpose is to build an object-oriented fault-tolerant distributed operating system for a local area network of multiprocessor workstations. This paper describes Gothic memory manager. It realizes the sharing of the secondary memory space between any process running on the Gothic system. Processes on different processors can communicate by sharing permanent information. The manager implements a shared single level storage with an invalidation protocol working on disk-pages to maintain s...

  4. Intravital imaging of cardiac function at the single-cell level.

    Science.gov (United States)

    Aguirre, Aaron D; Vinegoni, Claudio; Sebas, Matt; Weissleder, Ralph

    2014-08-05

    Knowledge of cardiomyocyte biology is limited by the lack of methods to interrogate single-cell physiology in vivo. Here we show that contracting myocytes can indeed be imaged with optical microscopy at high temporal and spatial resolution in the beating murine heart, allowing visualization of individual sarcomeres and measurement of the single cardiomyocyte contractile cycle. Collectively, this has been enabled by efficient tissue stabilization, a prospective real-time cardiac gating approach, an image processing algorithm for motion-artifact-free imaging throughout the cardiac cycle, and a fluorescent membrane staining protocol. Quantification of cardiomyocyte contractile function in vivo opens many possibilities for investigating myocardial disease and therapeutic intervention at the cellular level.

  5. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  6. Protocols for second-generation business satellites systems

    Science.gov (United States)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  7. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  8. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  9. Qualitative and quantitative assessment of single fingerprints in forensic DNA analysis.

    Science.gov (United States)

    Ostojic, Lana; Klempner, Stacey A; Patel, Rosni A; Mitchell, Adele A; Axler-DiPerte, Grace L; Wurmbach, Elisa

    2014-11-01

    Fingerprints and touched items are important sources of DNA for STR profiling, since this evidence can be recovered in a wide variety of criminal offenses. However, there are some fundamental difficulties in working with these samples, including variability in quantity and quality of extracted DNA. In this study, we collected and analyzed over 700 fingerprints. We compared a commercially available extraction protocol (Zygem) to two methods developed in our laboratory, a simple one-tube protocol and a high sensitivity protocol (HighSens) that includes additional steps to concentrate and purify the DNA. The amplification protocols tested were AmpFLSTR® Identifiler® using either 28 or 31 amplification cycles, and Identifiler® Plus using 32 amplification cycles. We found that the HighSens and Zygem extraction methods were significantly better in their DNA yields than the one-tube method. Identifiler® Plus increased the quality of the STR profiles for the one-tube extraction significantly. However, this effect could not be verified for the other extraction methods. Furthermore, microscopic analysis of single fingerprints revealed that some individuals tended to shed more material than others onto glass slides. However, a dense deposition of skin flakes did not strongly correlate with a high quality STR profile. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  11. Single-Molecule Methods for Nucleotide Excision Repair: Building a System to Watch Repair in Real Time

    OpenAIRE

    Kong, Muwen; Beckwitt, Emily C.; Springall, Luke; Kad, Neil M.; Van Houten, Bennett

    2017-01-01

    Single-molecule approaches to solving biophysical problems are powerful tools that allow static and dynamic real-time observations of specific molecular interactions of interest in the absence of ensemble-averaging effects. Here, we provide detailed protocols for building an experimental system that employs atomic force microscopy and a single-molecule DNA tightrope assay based on oblique angle illumination fluorescence microscopy. Together with approaches for engineering site-specific lesion...

  12. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  13. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  14. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  15. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  16. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  17. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  18. Double versus single renal allografts from aged donors.

    Science.gov (United States)

    Andrés, A; Morales, J M; Herrero, J C; Praga, M; Morales, E; Hernández, E; Ortuño, T; Rodício, J L; Martínez, M A; Usera, G; Díaz, R; Polo, G; Aguirre, F; Leiva, O

    2000-05-27

    The age limit of the cadaver kidney donors is increasing in response to the growing demand for renal transplantation. Simultaneous double kidney transplantation (SDKT) with kidneys obtained from elderly adults has been proposed to increase the transplantation number and improve its results. However, if SDKT is performed when there are no clear indications, a negative effect could be produced on the total number of transplanted patients as both kidneys would be used for only one recipient. In December 1996 we designed a transplantation protocol to be able to extend the selection of cadaver kidney donors with normal serum creatinine levels without establishing any age limit. A pregraft renal biopsy was always performed to analyze the glomerulosclerosis (GE) percentage whenever the donors were 60 years of age or older. A SDKT was performed in a single recipient when the donor age was 75 years or older or when the donors between 60 and 74 years old had a GE rate of more than 15%. On the contrary, a single kidney transplantation was performed in two different recipients for kidneys from donors between 60 and 74 years of age with a GE rate of less than 15%. Kidneys having GE rates of more than 50% were discarded for transplantation. Donor kidneys from subjects younger than 60 years of age were always used for a single kidney transplantation. Based on the above mentioned protocol, from December 1996 to May 1998, 181 patients received a kidney transplantation in our hospital. These patients were divided into three groups: group I which included the SDKT recipients (n=21), group II or single kidney recipients from 60- to 74-year-old donors (n=40), and group III or recipients from actuarial patient survival (100, 95, and 98%, respectively) or graft survival rates (95, 90, and 93%, respectively). The 6-month serum creatinine levels were excellent in the three groups, although there were significant differences between groups I and II (1.6+/-0.3 vs. 1.9+/-0.6 mg/dl, P75 years

  19. Detecting the Presence of Nora Virus in "Drosophila" Utilizing Single Fly RT-PCR

    Science.gov (United States)

    Munn, Bethany; Ericson, Brad; Carlson, Darby J.; Carlson, Kimberly A.

    2015-01-01

    A single fly RT-PCR protocol has recently been developed to detect the presence of the persistent, horizontally transmitted Nora virus in "Drosophila." Wild-caught flies from Ohio were tested for the presence of the virus, with nearly one-fifth testing positive. The investigation presented can serve as an ideal project for biology…

  20. Single-Molecule Analysis for RISC Assembly and Target Cleavage.

    Science.gov (United States)

    Sasaki, Hiroshi M; Tadakuma, Hisashi; Tomari, Yukihide

    2018-01-01

    RNA-induced silencing complex (RISC) is a small RNA-protein complex that mediates silencing of complementary target RNAs. Biochemistry has been successfully used to characterize the molecular mechanism of RISC assembly and function for nearly two decades. However, further dissection of intermediate states during the reactions has been warranted to fill in the gaps in our understanding of RNA silencing mechanisms. Single-molecule analysis with total internal reflection fluorescence (TIRF) microscopy is a powerful imaging-based approach to interrogate complex formation and dynamics at the individual molecule level with high sensitivity. Combining this technique with our recently established in vitro reconstitution system of fly Ago2-RISC, we have developed a single-molecule observation system for RISC assembly. In this chapter, we summarize the detailed protocol for single-molecule analysis of chaperone-assisted assembly of fly Ago2-RISC as well as its target cleavage reaction.

  1. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  2. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  3. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  4. A rapid and efficient protocol for in vitro multiplication of genetically uniform Stevia rebaudiana (Bertoni).

    Science.gov (United States)

    Khan, A; Jayanthi, M; Gantasala, Nagavara Prasad; Bhooshan, N; Rao, Uma

    2016-07-01

    Stevia rebaudiana (Bertoni), commonly called candy leaf or sweet leaf, endemic to South America, is an important medicinal plant. As a source of low calorie natural sweetener 'stevoside', it is used in obesity, diabetes, treatment of heartburn and tooth decay, and also serves as a food supplement. Large scale commercial propagation of S. rebaudiana demands a suitable protocol. Here, we propose an improved protocol for in vitro multiplication of S. rebaudiana from nodal explants. In this protocol, the effect of laboratory grade urea on multiple shoot induction from nodal explants was studied. The nodal explants were initially cultured on Murashige and Skoog (MS) basal media for 2 weeks which facilitated the axillary bud break. Further, culturing of these explants on MS medium fortified with 6 benzyl amninopurine (BAP) (2 mg/L) and Naphthalene acetic acid (NAA) (1 mg/L) with and .without urea (5 mg/L) for a period of 40 days revealed maximum shoot production of 44.56 from a single nodal explant in media supplemented with urea as compared to 22.44 without urea. The differences in the number of shoots produced were significant and these shoots readily rooted in MS media with NAA (4 mg/L). Primary and secondary hardening was successful in these plants. There were no visible morphological abnormalities observed in the micropropagated plantlets. Genetic analysis from random samples also revealed that these plants are genetically uniform. The advantage of the present protocol is that the complete process of multiple shoot induction, rooting and hardening could be completed within a period of 6 months as compared to the existing protocols.

  5. Perinatal outcomes in 6,338 singletons born after intrauterine insemination in Denmark, 2007 to 2012

    DEFF Research Database (Denmark)

    Malchau, Sara Sofia; Loft, Anne; Henningsen, Anna-Karina Aaris

    2014-01-01

    . INTERVENTION(S): None. MAIN OUTCOME MEASURE(S): Preterm birth (PTB), low birth weight (LBW), small for gestational age (SGA). RESULT(S): Children born after IUI-H had higher risks of PTB, LBW, and SGA vs. SC singletons (adjusted odds ratios [aOR] 1.3; 95% confidence interval (CI), 1.1-1.5; 1.4; 95% CI, 1.......2-1.7; and 1.4; 95% CI, 1.2-1.6), respectively. Compared with IVF, risk of SGA was similar, but risks of PTB and LBW were lower (aOR 0.6; 95% CI, 0.5-0.8; and 0.8; 95% CI, 0.6-0.9). Compared with intracytoplasmic sperm injection, no differences were found. For children born after IUI with donor semen, results...

  6. Droplet Microfluidics for Compartmentalized Cell Lysis and Extension of DNA from Single-Cells

    Science.gov (United States)

    Zimny, Philip; Juncker, David; Reisner, Walter

    Current single cell DNA analysis methods suffer from (i) bias introduced by the need for molecular amplification and (ii) limited ability to sequence repetitive elements, resulting in (iii) an inability to obtain information regarding long range genomic features. Recent efforts to circumvent these limitations rely on techniques for sensing single molecules of DNA extracted from single-cells. Here we demonstrate a droplet microfluidic approach for encapsulation and biochemical processing of single-cells inside alginate microparticles. In our approach, single-cells are first packaged inside the alginate microparticles followed by cell lysis, DNA purification, and labeling steps performed off-chip inside this microparticle system. The alginate microparticles are then introduced inside a micro/nanofluidic system where the alginate is broken down via a chelating buffer, releasing long DNA molecules which are then extended inside nanofluidic channels for analysis via standard mapping protocols.

  7. Estrus response and fertility of Menz and crossbred ewes to single prostaglandin injection protocol.

    Science.gov (United States)

    Mekuriaw, Zeleke; Assefa, Habtemariam; Tegegne, Azage; Muluneh, Dagne

    2016-01-01

    Natural lambing in sheep in Ethiopia occurs throughout the year in a scattered manner negatively affecting survival and growth rates of the lambs born during the unfavorable season of the year. Thus, controlling the time of mating artificially using exogenous source of hormones is considered as one of the ways to mitigated problems related to haphazard lambing. To this end, an experiment was conducted to evaluate efficacy of prostaglandin-based estrus synchronization protocol in local and crossbred ewes. A total of 160 ewes (80 local and 80 crossbreds) which lambed at least once and aged 3-5 years were used. Lutalyse® (dinoprost tromethamine sterile solution equivalent to 5 mg dinoprost per ml) and its analog, Synchromate® (cloprostenol sodium equivalent to 0.250 mg cloprostenol per ml), were tested at different doses. The treatments used were intramuscular injection of (1) 2.50 ml of Lutalyse® (12.5 mg dinoprost tromethamine), (2) 2 ml of Lutalyse® (10.0 mg dinoprost tromethamine), (3) 1 ml of Synchromate® (0.25 mg of cloprostenol Sodium), and (4) 0.8 ml of Synchromate® (0.20 mg of cloprostenol Sodium). Forty ewes (20 local and 20 crossbreds) were allocated per treatment. Following injection of the respective hormones, rams of known fertility were introduced into the flock for the duration of 96 h at the ratio of one ram to 10 ewes. All estrus synchronization protocols except treatment 4 (0.8 ml of Synchromate®) induced estrus (heat) in majority (55-65%) of local and crossbred ewes within 96 h post-hormone injection. The time interval from hormone administration to onset of estrus was also more or less similar for all treatment groups except for treatment group 4 which showed heat quicker. The highest lambing rate was recorded in local ewes (84.62% (11/13) treated with 2.5 ml of Lutalyse®, whereas the least was obtained in crossbreds (33.33% (3/9) treated with 0.8 ml Synchromate®. In conclusion, even though 2.5 ml and 2 ml of Lutalyse® or 1 ml of

  8. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  9. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  10. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  11. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  12. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  13. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  14. Prosthesis Prescription Protocol of the Arm (PPP-Arm) : The implementation of a national prosthesis prescription protocol

    NARCIS (Netherlands)

    Wijdenes, Paula; Brouwers, Michael; van der Sluis, Corry K

    BACKGROUND AND AIM: In order to create more uniformity in the prescription of upper limb prostheses by Dutch rehabilitation teams, the development and implementation of a Prosthesis Prescription Protocol of the upper limb (PPP-Arm) was initiated. The aim was to create a national digital protocol to

  15. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  16. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  17. Comparison of a new whole-body continuous-table-movement protocol versus a standard whole-body MR protocol for the assessment of multiple myeloma

    International Nuclear Information System (INIS)

    Weckbach, S.; Michaely, H.J.; Schoenberg, S.O.; Dinter, D.J.; Stemmer, A.

    2010-01-01

    To evaluate a whole body (WB) continuous-table-movement (CTM) MR protocol for the assessment of multiple myeloma (MM) in comparison to a step-by-step WB protocol. Eighteen patients with MM were examined at 1.5T using a WB CTM protocol (axial T2-w fs BLADE, T1-w GRE sequence) and a step-by-step WB protocol including coronal/sagittal T1-w SE and STIR sequences as reference. Protocol time was assessed. Image quality, artefacts, liver/spleen assessability, and the ability to depict bone marrow lesions less than or greater than 1 cm as well as diffuse infiltration and soft tissue lesions were rated. Potential changes in the Durie and Salmon Plus stage and the detectability of complications were assessed. Mean protocol time was 6:38 min (CTM) compared to 24:32 min (standard). Image quality was comparable. Artefacts were more prominent using the CTM protocol (P = 0.0039). Organ assessability was better using the CTM protocol (P < 0.001). Depiction of bone marrow and soft tissue lesions was identical without a staging shift. Vertebral fractures were not detected using the CTM protocol. The new protocol allows a higher patient throughput and facilitates the depiction of extramedullary lesions. However, as long as vertebral fractures are not detectable, the protocol cannot be safely used for clinical routine without the acquisition of an additional sagittal sequence. (orig.)

  18. A novel staining protocol for multiparameter assessment of cell heterogeneity in Phormidium populations (cyanobacteria employing fluorescent dyes.

    Directory of Open Access Journals (Sweden)

    Daria Tashyreva

    Full Text Available Bacterial populations display high heterogeneity in viability and physiological activity at the single-cell level, especially under stressful conditions. We demonstrate a novel staining protocol for multiparameter assessment of individual cells in physiologically heterogeneous populations of cyanobacteria. The protocol employs fluorescent probes, i.e., redox dye 5-cyano-2,3-ditolyl tetrazolium chloride, 'dead cell' nucleic acid stain SYTOX Green, and DNA-specific fluorochrome 4',6-diamidino-2-phenylindole, combined with microscopy image analysis. Our method allows simultaneous estimates of cellular respiration activity, membrane and nucleoid integrity, and allows the detection of photosynthetic pigments fluorescence along with morphological observations. The staining protocol has been adjusted for, both, laboratory and natural populations of the genus Phormidium (Oscillatoriales, and tested on 4 field-collected samples and 12 laboratory strains of cyanobacteria. Based on the mentioned cellular functions we suggest classification of cells in cyanobacterial populations into four categories: (i active and intact; (ii injured but active; (iii metabolically inactive but intact; (iv inactive and injured, or dead.

  19. Treatment Protocol for High Velocity/High Energy Gunshot Injuries to the Face

    Science.gov (United States)

    Peled, Micha; Leiser, Yoav; Emodi, Omri; Krausz, Amir

    2011-01-01

    Major causes of facial combat injuries include blasts, high-velocity/high-energy missiles, and low-velocity missiles. High-velocity bullets fired from assault rifles encompass special ballistic properties, creating a transient cavitation space with a small entrance wound and a much larger exit wound. There is no dispute regarding the fact that primary emergency treatment of ballistic injuries to the face commences in accordance with the current advanced trauma life support (ATLS) recommendations; the main areas in which disputes do exist concern the question of the timing, sequence, and modes of surgical treatment. The aim of the present study is to present the treatment outcome of high-velocity/high-energy gunshot injuries to the face, using a protocol based on the experience of a single level I trauma center. A group of 23 injured combat soldiers who sustained bullet and shrapnel injuries to the maxillofacial region during a 3-week regional military conflict were evaluated in this study. Nine patients met the inclusion criteria (high-velocity/high-energy injuries) and were included in the study. According to our protocol, upon arrival patients underwent endotracheal intubation and were hemodynamically stabilized in the shock-trauma unit and underwent total-body computed tomography with 3-D reconstruction of the head and neck and computed tomography angiography. All patients underwent maxillofacial surgery upon the day of arrival according to the protocol we present. In view of our treatment outcomes, results, and low complication rates, we conclude that strict adherence to a well-founded and structured treatment protocol based on clinical experience is mandatory in providing efficient, appropriate, and successful treatment to a relatively large group of patients who sustain various degrees of maxillofacial injuries during a short period of time. PMID:23449809

  20. Production of knock-in mice in a single generation from embryonic stem cells.

    Science.gov (United States)

    Ukai, Hideki; Kiyonari, Hiroshi; Ueda, Hiroki R

    2017-12-01

    The system-level identification and analysis of molecular networks in mammals can be accelerated by 'next-generation' genetics, defined as genetics that does not require crossing of multiple generations of animals in order to achieve the desired genetic makeup. We have established a highly efficient procedure for producing knock-in (KI) mice within a single generation, by optimizing the genome-editing protocol for KI embryonic stem (ES) cells and the protocol for the generation of fully ES-cell-derived mice (ES mice). Using this protocol, the production of chimeric mice is eliminated, and, therefore, there is no requirement for the crossing of chimeric mice to produce mice that carry the KI gene in all cells of the body. Our procedure thus shortens the time required to produce KI ES mice from about a year to ∼3 months. Various kinds of KI ES mice can be produced with a minimized amount of work, facilitating the elucidation of organism-level phenomena using a systems biology approach. In this report, we describe the basic technologies and protocols for this procedure, and discuss the current challenges for next-generation mammalian genetics in organism-level systems biology studies.

  1. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  2. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  3. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  4. Radiographic protocol and normal anatomy of the hind feet in the white rhinoceros (Ceratotherium simum).

    Science.gov (United States)

    Dudley, Robert J; Wood, Simon P; Hutchinson, John R; Weller, Renate

    2015-01-01

    Foot pathology is a common and important health concern in captive rhinoceroses worldwide, but osteopathologies are rarely diagnosed, partly because of a lack of radiographic protocols. Here, we aimed to develop the first radiographic protocol for rhinoceros feet and describe the radiographic anatomy of the white rhinoceros (Ceratotherium simum) hind foot (pes). Computed tomographic images were obtained of nine cadaver pedes from seven different white rhinoceroses and assessed for pathology. A single foot deemed free of pathology was radiographed using a range of different projections and exposures to determine the best protocol. 3D models were produced from the CT images and were displayed with the real radiographs to describe the normal radiographic anatomy of the white rhinoceros pes. An optimal radiographic projection was determined for each bone in the rhinoceros pes focusing on highlighting areas where pathology has been previously described. The projections deemed to be most useful were D60Pr-PlDiO (digit III), D45Pr45M-PlDiLO (digit II), and D40Pr35L-PlDiLO (digit IV). The primary beam was centered 5-7 cm proximal to the cuticle on the digit of interest. Articular surfaces, ridges, grooves, tubercles, processes and fossae were identified. The radiographic protocol we have developed along with the normal radiographic anatomy we have described will allow for more accessible and effective diagnosis of white rhinoceros foot osteopathologies. © 2014 American College of Veterinary Radiology.

  5. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  6. Biomechanical evaluation of a single-row versus double-row repair for complete subscapularis tears.

    Science.gov (United States)

    Wellmann, Mathias; Wiebringhaus, Philipp; Lodde, Ina; Waizy, Hazibullah; Becher, Christoph; Raschke, Michael J; Petersen, Wolf

    2009-12-01

    The purpose of the study was to compare a single-row repair and a double-row repair technique for the specific characteristics of a complete subscapularis lesion. Ten pairs of human cadaveric shoulder human shoulder specimens were tested for stiffness and ultimate tensile strength of the intact tendons in a load to failure protocol. After a complete subscapularis tear was provoked, the specimens were assigned to two treatment groups: single-row repair (1) and a double-row repair using a "suture bridge" technique (2). After repair cyclic loading a subsequent load to failure protocol was performed to determine the ultimate tensile load, the stiffness and the elongation behaviour of the reconstructions. The intact subscapularis tendons had a mean stiffness of 115 N/mm and a mean ultimate load of 720 N. The predominant failure mode of the intact tendons was a tear at the humeral insertion site (65%). The double-row technique restored 48% of the ultimate load of the intact tendons (332 N), while the single-row technique revealed a significantly lower ultimate load of 244 N (P = 0.001). In terms of the stiffness, the double-row technique showed a mean stiffness of 81 N/mm which is significantly higher compared to the stiffness of the single-row repairs of 55 N/mm (P = 0.001). The double-row technique has been shown to be stronger and stiffer when compared to a conventional single-row repair. Therefore, this technique is recommended from a biomechanical point of view irrespectively if performed by an open or arthroscopic approach.

  7. Introduction of an Oral Fluid Challenge Protocol in the Management of Children with Acute Gastroenteritis: A Regional Hospital Experience.

    LENUS (Irish Health Repository)

    Umana, E

    2018-06-01

    Oral rehydration therapy (ORT) remains the ideal first line therapy for acute gastroenteritis (AGE). Our aim was to assess the impact of introducing an Oral Fluid Challenge (OFC) protocol on outcomes such as intravenous fluid use and documentation in our institution. A single centre study with data collected retrospectively pre-implementation (April 2015) of the OFC protocol and post implementation (April 2016). Consecutive sampling of the first 55 patients presenting with GE like symptoms and underwent OFC were recruited. One hundred and ten patients were included in this study with 55 patients per cycle. The rates of IVF use decreased from 22% (12) in cycle one to 18% (10) in cycle two. There was an improvement in documentation by 26% (14) for level of dehydration and 52% (31) for OFC volume from cycle one to two. Overall, the addition of the OFC protocol to the management of patients with uncomplicated AGE would help streamline and improve care.

  8. An expert protocol for immunofluorescent detection of calcium channels in tsA-201 cells.

    Science.gov (United States)

    Koch, Peter; Herzig, Stefan; Matthes, Jan

    Pore-forming subunits of voltage gated calcium channels (VGCC) are large membrane proteins (260kDa) containing 24 transmembrane domains. Despite transfection with viral promoter driven vectors, biochemical analysis of VGCC is often hampered by rather low expression levels in heterologous systems rendering VGCC challenging targets. Especially in immunofluorescent detection, calcium channels are demanding proteins. We provide an expert step-by-step protocol with adapted conditions for handling procedures (tsA-201 cell culture, transient transfection, incubation time and temperature at 28°C or 37°C and immunostaining) to address the L-type calcium-channel pore Ca v 1.2 in an immunofluorescent approach. We performed immunocytochemical analysis of Ca v 1.2 expression at single-cell level in combination with detection of different markers for cellular organelles. We show confluency levels and shapes of tsA-201 cells at different time points during an experiment. Our experiments reveal sufficient levels of Ca v 1.2 protein and a correct Ca v 1.2 expression pattern in polygonal shaped cells already 12h after transfection. A sequence of elaborated protocol modifications allows subcellular localization analysis of Ca v 1.2 in an immunocytochemical approach. We provide a protocol that may be used to achieve insights into physiological and pathophysiological processes involving voltage gated calcium channels. Our protocol may be used for expression analysis of other challenging proteins and efficient overexpression may be exploited in related biochemical techniques requiring immunolabels. Copyright © 2016 Elsevier Inc. All rights reserved.

  9. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  10. FLIP: An Internetwork Protocol for Supporting Distributed Systems

    NARCIS (Netherlands)

    Kaashoek, M.F.; van Renesse, R.; van Staveren, H.; Tanenbaum, A.S.

    1993-01-01

    Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements 1993. Instead of using ad hoc protocols to meet each of the new requirements, we have designed a new protocol,

  11. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  12. A feasible repetitive transcranial magnetic stimulation clinical protocol in migraine prevention.

    Science.gov (United States)

    Zardouz, Shawn; Shi, Lei; Leung, Albert

    2016-01-01

    This case series was conducted to determine the clinical feasibility of a repetitive transcranial magnetic stimulation protocol for the prevention of migraine (with and without aura). Five patients with migraines underwent five repetitive transcranial magnetic stimulation sessions separated in 1- to 2-week intervals for a period of 2 months at a single tertiary medical center. Repetitive transcranial magnetic stimulation was applied to the left motor cortex with 2000 pulses (20 trains with 1s inter-train interval) delivered per session, at a frequency of 10 Hz and 80% resting motor threshold. Pre- and post-treatment numerical rating pain scales were collected, and percent reductions in intensity, frequency, and duration were generated. An average decrease in 37.8%, 32.1%, and 31.2% were noted in the intensity, frequency, and duration of migraines post-repetitive transcranial magnetic stimulation, respectively. A mean decrease in 1.9±1.0 (numerical rating pain scale ± standard deviation; range: 0.4-2.8) in headache intensity scores was noted after the repetitive transcranial magnetic stimulation sessions. The tested repetitive transcranial magnetic stimulation protocol is a well-tolerated, safe, and effective method for migraine prevention.

  13. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  14. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  15. Substantial differences in bias between single-digest and double-digest RAD-seq libraries: A case study.

    Science.gov (United States)

    Flanagan, Sarah P; Jones, Adam G

    2018-03-01

    The trade-offs of using single-digest vs. double-digest restriction site-associated DNA sequencing (RAD-seq) protocols have been widely discussed. However, no direct empirical comparisons of the two methods have been conducted. Here, we sampled a single population of Gulf pipefish (Syngnathus scovelli) and genotyped 444 individuals using RAD-seq. Sixty individuals were subjected to single-digest RAD-seq (sdRAD-seq), and the remaining 384 individuals were genotyped using a double-digest RAD-seq (ddRAD-seq) protocol. We analysed the resulting Illumina sequencing data and compared the two genotyping methods when reads were analysed either together or separately. Coverage statistics, observed heterozygosity, and allele frequencies differed significantly between the two protocols, as did the results of selection components analysis. We also performed an in silico digestion of the Gulf pipefish genome and modelled five major sources of bias: PCR duplicates, polymorphic restriction sites, shearing bias, asymmetric sampling (i.e., genotyping fewer individuals with sdRAD-seq than with ddRAD-seq) and higher major allele frequencies. This combination of approaches allowed us to determine that polymorphic restriction sites, an asymmetric sampling scheme, mean allele frequencies and to some extent PCR duplicates all contribute to different estimates of allele frequencies between samples genotyped using sdRAD-seq versus ddRAD-seq. Our finding that sdRAD-seq and ddRAD-seq can result in different allele frequencies has implications for comparisons across studies and techniques that endeavour to identify genomewide signatures of evolutionary processes in natural populations. © 2017 John Wiley & Sons Ltd.

  16. Implementation of a management protocol for massive bleeding reduces mortality in non-trauma patients: Results from a single centre audit.

    Science.gov (United States)

    Martínez-Calle, N; Hidalgo, F; Alfonso, A; Muñoz, M; Hernández, M; Lecumberri, R; Páramo, J A

    2016-12-01

    To audit the impact upon mortality of a massive bleeding management protocol (MBP) implemented in our center since 2007. A retrospective, single-center study was carried out. Patients transfused after MBP implementation (2007-2012, Group 2) were compared with a historical cohort (2005-2006, Group 1). Massive bleeding is associated to high mortality rates. Available MBPs are designed for trauma patients, whereas specific recommendations in the medical/surgical settings are scarce. After excluding patients who died shortly (<6h) after MBP activation (n=20), a total of 304 were included in the data analysis (68% males, 87% surgical). Our MBP featured goal-directed transfusion with early use of adjuvant hemostatic medications. Primary endpoints were 24-h and 30-day mortality. Fresh frozen plasma-to-red blood cells (FFP:RBC) and platelet-to-RBC (PLT:RBC) transfusion ratios, time to first FFP unit and the proactive MBP triggering rate were secondary endpoints. After MBP implementation (Group 2; n=222), RBC use remained stable, whereas FFP and hemostatic agents increased, when compared with Group 1 (n=82). Increased FFP:RBC ratio (p=0.053) and earlier administration of FFP (p=0.001) were also observed, especially with proactive MBP triggering. Group 2 patients presented lower rates of 24-h (0.5% vs. 7.3%; p=0.002) and 30-day mortality (15.9% vs. 30.2%; p=0.018) - the greatest reduction corresponding to non-surgical patients. Logistic regression showed an independent protective effect of MBP implementation upon 30-day mortality (OR=0.3; 95% CI 0.15-0.61). These data suggest that the implementation of a goal-directed MBP for prompt and aggressive management of non-trauma, massive bleeding patients is associated to reduced 24-h and 30-day mortality rates. Copyright © 2016 Elsevier España, S.L.U. y SEMICYUC. All rights reserved.

  17. Increasing fall risk awareness using wearables: A fall risk awareness protocol.

    Science.gov (United States)

    Danielsen, Asbjørn; Olofsen, Hans; Bremdal, Bernt Arild

    2016-10-01

    Each year about a third of elderly aged 65 or older experience a fall. Many of these falls may have been avoided if fall risk assessment and prevention tools where available in a daily living situation. We identify what kind of information is relevant for doing fall risk assessment and prevention using wearable sensors in a daily living environment by investigating current research, distinguishing between prospective and context-aware fall risk assessment and prevention. Based on our findings, we propose a fall risk awareness protocol as a fall prevention tool integrating both wearables and ambient sensing technology into a single platform. Copyright © 2016. Published by Elsevier Inc.

  18. Single-photon three-qubit quantum logic using spatial light modulators.

    Science.gov (United States)

    Kagalwala, Kumel H; Di Giuseppe, Giovanni; Abouraddy, Ayman F; Saleh, Bahaa E A

    2017-09-29

    The information-carrying capacity of a single photon can be vastly expanded by exploiting its multiple degrees of freedom: spatial, temporal, and polarization. Although multiple qubits can be encoded per photon, to date only two-qubit single-photon quantum operations have been realized. Here, we report an experimental demonstration of three-qubit single-photon, linear, deterministic quantum gates that exploit photon polarization and the two-dimensional spatial-parity-symmetry of the transverse single-photon field. These gates are implemented using a polarization-sensitive spatial light modulator that provides a robust, non-interferometric, versatile platform for implementing controlled unitary gates. Polarization here represents the control qubit for either separable or entangling unitary operations on the two spatial-parity target qubits. Such gates help generate maximally entangled three-qubit Greenberger-Horne-Zeilinger and W states, which is confirmed by tomographical reconstruction of single-photon density matrices. This strategy provides access to a wide range of three-qubit states and operations for use in few-qubit quantum information processing protocols.Photons are essential for quantum information processing, but to date only two-qubit single-photon operations have been realized. Here the authors demonstrate experimentally a three-qubit single-photon linear deterministic quantum gate by exploiting polarization along with spatial-parity symmetry.

  19. Criteria for Evaluating Alternative Network and Link Layer Protocols for the NASA Constellation Program Communication Architecture

    Science.gov (United States)

    Benbenek, Daniel; Soloff, Jason; Lieb, Erica

    2010-01-01

    Selecting a communications and network architecture for future manned space flight requires an evaluation of the varying goals and objectives of the program, development of communications and network architecture evaluation criteria, and assessment of critical architecture trades. This paper uses Cx Program proposed exploration activities as a guideline; lunar sortie, outpost, Mars, and flexible path options are described. A set of proposed communications network architecture criteria are proposed and described. They include: interoperability, security, reliability, and ease of automating topology changes. Finally a key set of architecture options are traded including (1) multiplexing data at a common network layer vs. at the data link layer, (2) implementing multiple network layers vs. a single network layer, and (3) the use of a particular network layer protocol, primarily IPv6 vs. Delay Tolerant Networking (DTN). In summary, the protocol options are evaluated against the proposed exploration activities and their relative performance with respect to the criteria are assessed. An architectural approach which includes (a) the capability of multiplexing at both the network layer and the data link layer and (b) a single network layer for operations at each program phase, as these solutions are best suited to respond to the widest array of program needs and meet each of the evaluation criteria.

  20. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.