WorldWideScience

Sample records for single iui protocol

  1. IVF with planned single-embryo transfer versus IUI with ovarian stimulation in couples with unexplained subfertility: an economic analysis.

    Science.gov (United States)

    van Rumste, Minouche M E; Custers, Inge M; van Wely, Madelon; Koks, Carolien A; van Weering, Hans G I; Beckers, Nicole G M; Scheffer, Gabrielle J; Broekmans, Frank J M; Hompes, Peter G A; Mochtar, Monique H; van der Veen, Fulco; Mol, Ben W J

    2014-03-01

    Couples with unexplained subfertility are often treated with intrauterine insemination (IUI) with ovarian stimulation, which carries the risk of multiple pregnancies. An explorative randomized controlled trial was performed comparing one cycle of IVF with elective single-embryo transfer (eSET) versus three cycles of IUI-ovarian stimulation in couples with unexplained subfertility and a poor prognosis for natural conception, to assess the economic burden of the treatment modalities. The main outcome measures were ongoing pregnancy rates and costs. This study randomly assigned 58 couples to IVF-eSET and 58 couples to IUI-ovarian stimulation. The ongoing pregnancy rates were 24% in with IVF-eSET versus 21% with IUI-ovarian stimulation, with two and three multiple pregnancies, respectively. The mean cost per included couple was significantly different: €2781 with IVF-eSET and €1876 with IUI-ovarian stimulation (Pcosts per ongoing pregnancy were €2456 for IVF-eSET. In couples with unexplained subfertility, one cycle of IVF-eSET cost an additional €900 per couple compared with three cycles of IUI-ovarian stimulation, for no increase in ongoing pregnancy rates or decrease in multiple pregnancies. When IVF-eSET results in higher ongoing pregnancy rates, IVF would be the preferred treatment. Couples that have been trying to conceive unsuccessfully are often treated with intrauterine insemination (IUI) and medication to improve egg production (ovarian stimulation). This treatment carries the risk of multiple pregnancies like twins. We performed an explorative study among those couples that had a poor prognosis for natural conception. One cycle of IVF with transfer of one selected embryo (elective single-embryo transfer, eSET) was compared with three cycles of IUI-ovarian stimulation. The aim of this study was to assess the economic burden of both treatments. The Main outcome measures were number of good pregnancies above 12weeks and costs. We randomly assigned 58

  2. Techniques used for IUI: is it time for a change?

    NARCIS (Netherlands)

    Lemmens, L.; Kos, S.; Beijer, C.; Braat, D.D.M.; Nelen, W.L.D.M.; Wetzels, A.M.M.

    2017-01-01

    STUDY QUESTION: Are the guidelines for the technical aspects of IUI (WHO, 2010) still in accordance with the current literature? SUMMARY ANSWER: In general, the laboratory guidelines of the World Health Organization (WHO) are a suitable protocol, although the evidence is not always conclusive and

  3. Techniques used for IUI: is it time for a change?

    Science.gov (United States)

    Lemmens, L; Kos, S; Beijer, C; Braat, D D M; Nelen, W L D M; Wetzels, A M M

    2017-09-01

    Are the guidelines for the technical aspects of IUI (WHO, 2010) still in accordance with the current literature? In general, the laboratory guidelines of the World Health Organization (WHO) are a suitable protocol, although the evidence is not always conclusive and some changes are advisable. Lack of standardization of the technical procedures required for IUI might result in inter-laboratory variation in pregnancy rates. Most centers still use their own materials and methods even though some guidelines are available. A structural review focusing on the association between pregnancy rates and the procedures of semen collection (e.g. ejaculatory abstinence, collection place), semen processing (e.g. preparation method, temperature during centrifugation/storage), insemination (e.g. timing of IUI, bed rest after IUI) and the equipment used. A literature search was performed in Medline and the Cochrane library. When no adequate studies of the impact of a parameter on pregnancy results were found, its association with sperm parameters was reviewed. For most variables, the literature review revealed a low level of evidence, a limited number of studies and/or an inadequate outcome measure. Moreover, the comparison of procedures (i.e. semen preparation technique, time interval between semen, collection, processing and IUI) revealed no consensus about their results. It was not possible to develop an evidence-based, optimal IUI treatment protocol. The included studies exhibited a lack of standardization in inclusion criteria and methods used. This review emphasizes the need for more knowledge about and standardization of assisted reproduction technologies. Our literature search indicates that some of the recommendations in the laboratory guidelines could be adapted to improve standardization, comfort, quality control and to cut costs. The Dutch Foundation for Quality Assessment in Medical Laboratories (SKML), Nijmegen, The Netherlands. S.K. and W.N. have no conflicts of

  4. Is IVF-served two different ways-more cost-effective than IUI with controlled ovarian hyperstimulation?

    Science.gov (United States)

    Tjon-Kon-Fat, R I; Bensdorp, A J; Bossuyt, P M M; Koks, C; Oosterhuis, G J E; Hoek, A; Hompes, P; Broekmans, F J; Verhoeve, H R; de Bruin, J P; van Golde, R; Repping, S; Cohlen, B J; Lambers, M D A; van Bommel, P F; Slappendel, E; Perquin, D; Smeenk, J; Pelinck, M J; Gianotten, J; Hoozemans, D A; Maas, J W M; Groen, H; Eijkemans, M J C; van der Veen, F; Mol, B W J; van Wely, M

    2015-10-01

    What is the cost-effectiveness of in vitro fertilization (IVF) with conventional ovarian stimulation, single embryo transfer (SET) and subsequent cryocycles or IVF in a modified natural cycle (MNC) compared with intrauterine insemination with controlled ovarian hyperstimulation (IUI-COH) as a first-line treatment in couples with unexplained subfertility and an unfavourable prognosis on natural conception?. Both IVF strategies are significantly more expensive when compared with IUI-COH, without being significantly more effective. In the comparison between IVF-MNC and IUI-COH, the latter is the dominant strategy. Whether IVF-SET is cost-effective depends on society's willingness to pay for an additional healthy child. IUI-COH and IVF, either after conventional ovarian stimulation or in a MNC, are used as first-line treatments for couples with unexplained or mild male subfertility. As IUI-COH is less invasive, this treatment is usually offered before proceeding to IVF. Yet, as conventional IVF with SET may lead to higher pregnancy rates in fewer cycles for a lower multiple pregnancy rate, some have argued to start with IVF instead of IUI-COH. In addition, IVF in the MNC is considered to be a more patient friendly and less costly form of IVF. We performed a cost-effectiveness analysis alongside a randomized noninferiority trial. Between January 2009 and February 2012, 602 couples with unexplained infertility and a poor prognosis on natural conception were allocated to three cycles of IVF-SET including frozen embryo transfers, six cycles of IVF-MNC or six cycles of IUI-COH. These couples were followed until 12 months after randomization. We collected data on resource use related to treatment, medication and pregnancy from the case report forms. We calculated unit costs from various sources. For each of the three strategies, we calculated the mean costs and effectiveness. Incremental cost-effectiveness ratios (ICER) were calculated for IVF-SET compared with IUI-COH and

  5. IVF or IUI as first-line treatment in unexplained subfertility: the conundrum of treatment selection markers.

    Science.gov (United States)

    Tjon-Kon-Fat, R I; Tajik, P; Zafarmand, M H; Bensdorp, A J; Bossuyt, P M M; Oosterhuis, G J E; van Golde, R; Repping, S; Lambers, M D A; Slappendel, E; Perquin, D; Pelinck, M J; Gianotten, J; Maas, J W M; Eijkemans, M J C; van der Veen, F; Mol, B W; van Wely, M

    2017-05-01

    Are there treatment selection markers that could aid in identifying couples, with unexplained or mild male subfertility, who would have better chances of a healthy child with IVF with single embryo transfer (IVF-SET) than with IUI with ovarian stimulation (IUI-OS)? We did not find any treatment selection markers that were associated with better chances of a healthy child with IVF-SET instead of IUI-OS in couples with unexplained or mild male subfertility. A recent trial, comparing IVF-SET to IUI-OS, found no evidence of a difference between live birth rates and multiple pregnancy rates. It was suggested that IUI-OS should remain the first-line treatment instead of IVF-SET in couples with unexplained or mild male subfertility and female age between 18 and 38 years. The question remains whether there are some couples that may have higher pregnancy chances if treated with IVF-SET instead of IUI. We performed our analyses on data from the INeS trial, where couples with unexplained or mild male subfertility and an unfavourable prognosis for natural conception were randomly allocated to IVF-SET, IVF in a modified natural cycle or IUI-OS. In view of the aim of this study, we only used data of the comparison between IVF-SET (201 couples) and IUI-OS (207 couples). We pre-defined the following baseline characteristics as potential treatment selection markers: female age, ethnicity, smoking status, type of subfertility (primary/secondary), duration of subfertility, BMI, pre-wash total motile count and Hunault prediction score. For each potential treatment selection marker, we explored the association with the chances of a healthy child after IVF-SET and IUI-OS and tested if there was an interaction with treatment. Given the exploratory nature of our analysis, we used a P-value of 0.1. None of the markers were associated with higher chances of a healthy child from IVF-SET compared to IUI-OS (P-value for interaction >0.10). Since this is the first large study that looked at

  6. Is IVF-served two different ways-more cost-effective than IUI with controlled ovarian hyperstimulation?

    NARCIS (Netherlands)

    Tjon-Kon-Fat, R. I.; Bensdorp, A. J.; Bossuyt, P. M. M.; Koks, C.; Oosterhuis, G. J. E.; Hoek, A.; Hompes, P.; Broekmans, F. J.; Verhoeve, H. R.; de Bruin, J. P.; van Golde, R.; Repping, S.; Cohlen, B. J.; Lambers, M. D. A.; van Bommel, P. F.; Slappendel, E.; Perquin, D.; Smeenk, J.; Pelinck, M. J.; Gianotten, J.; Hoozemans, D. A.; Maas, J. W. M.; Groen, H.; Eijkemans, M. J. C.; van der Veen, F.; Mol, B. W. J.; van Wely, M.

    2015-01-01

    What is the cost-effectiveness of in vitro fertilization (IVF) with conventional ovarian stimulation, single embryo transfer (SET) and subsequent cryocycles or IVF in a modified natural cycle (MNC) compared with intrauterine insemination with controlled ovarian hyperstimulation (IUI-COH) as a

  7. Cost-effectiveness of primary offer of IVF vs. primary offer of IUI followed by IVF (for IUI failures) in couples with unexplained or mild male factor subfertility.

    Science.gov (United States)

    Pashayan, Nora; Lyratzopoulos, Georgios; Mathur, Raj

    2006-06-23

    In unexplained and mild male factor subfertility, both intrauterine insemination (IUI) and in-vitro fertilisation (IVF) are indicated as first line treatments. Because the success rate of IUI is low, many couples failing IUI subsequently require IVF treatment. In practice, it is therefore important to examine the comparative outcomes (live birth-producing pregnancy), costs, and cost-effectiveness of primary offer of IVF, compared with primary offer of IUI followed by IVF for couples failing IUI. Mathematical modelling was used to estimate comparative clinical and cost effectiveness of either primary offer of one full IVF cycle (including frozen cycles when applicable) or "IUI + IVF" (defined as primary IUI followed by IVF for IUI failures) to a hypothetical cohort of subfertile couples who are eligible for both treatment strategies. Data used in calculations were derived from the published peer-reviewed literature as well as activity data of local infertility units. Cost-effectiveness ratios for IVF, "unstimulated-IUI (U-IUI) + IVF", and "stimulated IUI (S-IUI) + IVF" were 12,600 pounds sterling, 13,100 pound sterling and 15,100 pound sterling per live birth-producing pregnancy respectively. For a hypothetical cohort of 100 couples with unexplained or mild male factor subfertility, compared with primary offer of IVF, 6 cycles of "U-IUI + IVF" or of "S-IUI + IVF" would cost an additional 174,200 pounds sterling and 438,000 pounds sterling, representing an opportunity cost of 54 and 136 additional IVF cycles and 14 to 35 live birth-producing pregnancies respectively. For couples with unexplained and mild male factor subfertility, primary offer of a full IVF cycle is less costly and more cost-effective than providing IUI (of any modality) followed by IVF.

  8. Cost-effectiveness of primary offer of IVF vs. primary offer of IUI followed by IVF (for IUI failures in couples with unexplained or mild male factor subfertility

    Directory of Open Access Journals (Sweden)

    Lyratzopoulos Georgios

    2006-06-01

    Full Text Available Abstract Background In unexplained and mild male factor subfertility, both intrauterine insemination (IUI and in-vitro fertilisation (IVF are indicated as first line treatments. Because the success rate of IUI is low, many couples failing IUI subsequently require IVF treatment. In practice, it is therefore important to examine the comparative outcomes (live birth-producing pregnancy, costs, and cost-effectiveness of primary offer of IVF, compared with primary offer of IUI followed by IVF for couples failing IUI. Methods Mathematical modelling was used to estimate comparative clinical and cost effectiveness of either primary offer of one full IVF cycle (including frozen cycles when applicable or "IUI + IVF" (defined as primary IUI followed by IVF for IUI failures to a hypothetical cohort of subfertile couples who are eligible for both treatment strategies. Data used in calculations were derived from the published peer-reviewed literature as well as activity data of local infertility units. Results Cost-effectiveness ratios for IVF, "unstimulated-IUI (U-IUI + IVF", and "stimulated IUI (S-IUI + IVF" were £12,600, £13,100 and £15,100 per live birth-producing pregnancy respectively. For a hypothetical cohort of 100 couples with unexplained or mild male factor subfertility, compared with primary offer of IVF, 6 cycles of "U-IUI + IVF" or of "S-IUI + IVF" would cost an additional £174,200 and £438,000, representing an opportunity cost of 54 and 136 additional IVF cycles and 14 to 35 live birth-producing pregnancies respectively. Conclusion For couples with unexplained and mild male factor subfertility, primary offer of a full IVF cycle is less costly and more cost-effective than providing IUI (of any modality followed by IVF.

  9. Single-Rooted Extraction Sockets: Classification and Treatment Protocol.

    Science.gov (United States)

    El Chaar, Edgar; Oshman, Sarah; Fallah Abed, Pooria

    2016-09-01

    Clinicians have many treatment techniques from which to choose when extracting a failing tooth and replacing it with an implant-supported restoration and when successful management of an extraction socket during the course of tooth replacement is necessary to achieve predictable and esthetic outcomes. This article presents a straightforward, yet thorough, classification for extraction sockets of single-rooted teeth and provides guidance to clinicians in the selection of appropriate and predictable treatment. The presented classification of extraction sockets for single-rooted teeth focuses on the topography of the extraction socket, while the protocol for treatment of each socket type factors in the shape of the remaining bone, the biotype, and the location of the socket whether it be in the mandible or maxilla. This system is based on the biologic foundations of wound healing and can help guide clinicians to successful treatment outcomes.

  10. Construction of a single atom trap for quantum information protocols

    Science.gov (United States)

    Shea, Margaret E.; Baker, Paul M.; Gauthier, Daniel J.; Duke Physics Department Team

    2016-05-01

    The field of quantum information science addresses outstanding problems such as achieving fundamentally secure communication and solving computationally hard problems. Great progress has been made in the field, particularly using photons coupled to ions and super conducting qubits. Neutral atoms are also interesting for these applications and though the technology for control of neutrals lags behind that of trapped ions, they offer some key advantages: primarily coupling to optical frequencies closer to the telecom band than trapped ions or superconducting qubits. Here we report progress on constructing a single atom trap for 87 Rb. This system is a promising platform for studying the technical problems facing neutral atom quantum computing. For example, most protocols destroy the trap when reading out the neutral atom's state; we will investigate an alternative non-destructive state detection scheme. We detail the experimental systems involved and the challenges addressed in trapping a single atom. All of our hardware components are off the shelf and relatively inexpensive. Unlike many other systems, we place a high numerical aperture lens inside our vacuum system to increase photon collection efficiency. We gratefully acknowledge the financial support of the ARO through Grant # W911NF1520047.

  11. Conversion of ICSI cycles to IUI in poor responders to controlled ovarian hyperstimulation

    Directory of Open Access Journals (Sweden)

    Amal Shohieb

    2012-03-01

    Conclusion: As the pregnancy rates difference between both groups was not statistically significant the conversion to IUI could be considered a useful substitute to the oocyte retrieval procedure in the poor responder cases. However, to adopt this conclusion, further confirmation in other prospective studies with larger sample size is a must.

  12. Metformin-letrozole in comparison with Metformin-clomiphene citrate in clomiphene-resistance PCOS patients undergoing IUI

    Directory of Open Access Journals (Sweden)

    Mohammad Hossein Fallahzadeh

    2011-01-01

    Full Text Available Background: Polycystic ovary syndrome (PCOS is associated with approximately 75% of women who suffer from infertility due to anovulation. Additionally, around 20– 25% of anovulatory women with PCOS do not respond at all to clomiphene citrate and are considered to be “clomiphene– resistant”. Aromatase inhibitors have been suggested as an alternative treatment to clomiphene as the discrepancy between ovulation and pregnancy rates with clomiphene citrate has been attributed to its anti-estrogenic action and estrogen receptor depletion. Objective: The aim of this study is to compare results of Metformin-letrozole with Metformin-clomiphene citrate in clomiphene resistance PCOS patients undergoing IUI.Materials and Methods: In this single blind randomized trial, ovarian cycles were studied in 100 clomiphene- resistant patients with PCOS. The inclusion criteria were patients who received 150mg clomiphene citrate daily for 3 cycles and failed to become pregnant. The patients were matched for their age, body mass index (BMI, and infertility period. They were randomly allocated to a metformin-letrozole group (n=50 and a metformin-clomiphene citrate group (n=50. Chemical and clinical pregnancies were assessed after IUI. Abortion rates were determined in both groups. Results: Regarding pregnancy rate, there was no significant difference between the two groups. One miscarriage (2% occurred in the metformin-clomiphene citrate group, whereas none was seen in the metformin-letrozole group. Conclusion: There is no significant difference in pregnancy rate between clomiphene citrate and letrozole groups although it has been 2% in the former and 5% in the latter.

  13. Effects of piroxicam administration on pregnancy outcome in intrauterine insemination (IUI) cycles: a randomized clinical trial.

    Science.gov (United States)

    Zarei, A; Mahboubi, M; Parsanezhad, M E; Alborzi, S; Younesi, M; Madadi, G

    2016-01-01

    Uterus contractibility is considered a powerful prognostic factor in predicting the embryo transfer outcome. Moreover, uterine contractions are known to be stimulated by prostaglandins which are produced by cyclooxygenase from arachidonic acid. As such, suppressing the inflammatory response and contractions using anti-inflammatory and relaxant agents is expected to result in increased success rate of embryo transfer and artificial insemination. To investigate the effect of piroxicam administration on the success rate in intrauterine insemination (IU) cycles in patients presenting with unexplained infertility. This randomized, placebo-controlled clinical trial included 260 women with unexplained infertility undergoing IUI cycles. Patients were randomly assigned to receive either piroxicam ten mg/day on days 4-6 after IUI or placebo (control group). The main outcome measures were number of IUI cycles, pregnancy, abortion, and multiple pregnancy rates. The pregnancy rate was found to be 25 (19.2%) and 16 (12.3%) in piroxicam and control groups, respectively (p = 0.039). Five patients (3.8%) in piroxicam group experienced twin pregnancy whereas only three patients (2.3%) in control group had twin pregnancy (p = 0.361). The pregnancy rate per cycle was also significantly higher in those who received piroxicam as compared to controls (11.16 vs. 6.66; p = 0.021). Administration of piroxicam after IUI is associated with decreased number of cycles, as well as increased pregnancy rate and pregnancy rate per cycle in IUI cycles. However, piroxicam did not have any effect on abortion, multiple pregnancy, and ongoing pregnancy rates.

  14. Effective dose comparison between stitched and single FOV in CBCT protocols for complete dental arcade

    International Nuclear Information System (INIS)

    Soares, Maria Rosangela; Batista, Wilson Otto; Antonio, Patricia Lara de; Caldas, Linda V.E.; Maia, Ana F.

    2015-01-01

    Objective: The objective of this study was to assess and compare protocols with a single field of view and multiple stitched field of view with a similar clinical purpose by means of effective dose value. Materials and methods: Measurements of absorbed dose were performed with thermoluminescent dosemeters inserted in the position of organs/tissues of a female anthropomorphic phantom and from these values the effective dose was calculated, utilizing weighting factor tissue-ICRP 103 (2007). Results: The results obtained in this study for effective dose are within the range of 43.1 µSv and 111.5 µSv for equipment using protocols with single FOV and in the range of 44.5 µSv and 236.2 µSv for equipments that using protocols with stitched field of view. Conclusions: In terms of the value of effective dose, stitched FOV protocols do not have any advantage over the single field of view protocols. This results suggest the necessity for knowledge of the exposure parameters and effective dose values associated with each image protocol. - Highlights: • The study relies on the comparison of two protocols with similar goals of CBCT: stitched protocols and single protocols. • The stitched FOV protocol is more specific and it is good option when want imaging only of some dental units. • In relation the effective dose, single FOV protocols presents advantage over the stitched FOV protocols. • Know the exposure parameters and effective dose values associated with each image protocol is necessity for request the best CBCT tomographic image

  15. Security of a single-state semi-quantum key distribution protocol

    Science.gov (United States)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  16. XPS Protocol for the Characterization of Pristine and Functionalized Single Wall Carbon Nanotubes

    Science.gov (United States)

    Sosa, E. D.; Allada, R.; Huffman, C. B.; Arepalli, S.

    2009-01-01

    Recent interest in developing new applications for carbon nanotubes (CNT) has fueled the need to use accurate macroscopic and nanoscopic techniques to characterize and understand their chemistry. X-ray photoelectron spectroscopy (XPS) has proved to be a useful analytical tool for nanoscale surface characterization of materials including carbon nanotubes. Recent nanotechnology research at NASA Johnson Space Center (NASA-JSC) helped to establish a characterization protocol for quality assessment for single wall carbon nanotubes (SWCNTs). Here, a review of some of the major factors of the XPS technique that can influence the quality of analytical data, suggestions for methods to maximize the quality of data obtained by XPS, and the development of a protocol for XPS characterization as a complementary technique for analyzing the purity and surface characteristics of SWCNTs is presented. The XPS protocol is then applied to a number of experiments including impurity analysis and the study of chemical modifications for SWCNTs.

  17. Measurement of the equivalent dose in quartz using a regenerative-dose single-aliquot protocol

    International Nuclear Information System (INIS)

    Murray, A.S.; Roberts, R.G.

    1998-01-01

    The principles behind a regenerative-dose single-aliquot protocol are outlined. It is shown for three laboratory-bleached Australian sedimentary quartz samples that the relative change in sensitivity of the optically stimulated luminescence (OSL) during a repeated measurement cycle (consisting of a dose followed by a 10 s preheat at a given temperature and then a 100 s exposure to blue/green light at 125 deg. C) is very similar to that of the 110 deg. C thermoluminescence (TL) peak measured during the preheat cycle. The absolute change in the TL sensitivity with preheat temperature is different for samples containing a natural or a regenerative dose. Furthermore, the absolute change in sensitivity in both the OSL and TL signals is non-linear with regeneration cycle, but the relative change in the OSL signal compared to the following 110 deg. C TL measurement is well approximated by a straight line. Both signals are thought to use the same luminescence centres, and so some common behaviour is not unexpected. A new regenerative-dose protocol is presented which makes use of this linear relationship to correct for sensitivity changes with regeneration cycle, and requires only one aliquot for the estimation of the equivalent dose (D e ). The protocol has been applied to quartz from nine Australian sites. To illustrate the value of the regenerative-dose single-aliquot approach, the apparent values of D e for 13 samples, containing doses of between 0.01 and 100 Gy, have been measured at various preheat temperatures of between 160 and 300 deg. C, using a single aliquot for each D e measurement. Excellent agreement is found between these single-aliquot estimates of D e and those obtained from additive-dose multiple-aliquot and single-aliquot protocols, over the entire dose range

  18. Synthetic CT: Simulating low dose single and dual energy protocols from a dual energy scan

    International Nuclear Information System (INIS)

    Wang, Adam S.; Pelc, Norbert J.

    2011-01-01

    Purpose: The choice of CT protocol can greatly impact patient dose and image quality. Since acquiring multiple scans at different techniques on a given patient is undesirable, the ability to predict image quality changes starting from a high quality exam can be quite useful. While existing methods allow one to generate simulated images of lower exposure (mAs) from an acquired CT exam, the authors present and validate a new method called synthetic CT that can generate realistic images of a patient at arbitrary low dose protocols (kVp, mAs, and filtration) for both single and dual energy scans. Methods: The synthetic CT algorithm is derived by carefully ensuring that the expected signal and noise are accurate for the simulated protocol. The method relies on the observation that the material decomposition from a dual energy CT scan allows the transmission of an arbitrary spectrum to be predicted. It requires an initial dual energy scan of the patient to either synthesize raw projections of a single energy scan or synthesize the material decompositions of a dual energy scan. The initial dual energy scan contributes inherent noise to the synthesized projections that must be accounted for before adding more noise to simulate low dose protocols. Therefore, synthetic CT is subject to the constraint that the synthesized data have noise greater than the inherent noise. The authors experimentally validated the synthetic CT algorithm across a range of protocols using a dual energy scan of an acrylic phantom with solutions of different iodine concentrations. An initial 80/140 kVp dual energy scan of the phantom provided the material decomposition necessary to synthesize images at 100 kVp and at 120 kVp, across a range of mAs values. They compared these synthesized single energy scans of the phantom to actual scans at the same protocols. Furthermore, material decompositions of a 100/120 kVp dual energy scan are synthesized by adding correlated noise to the initial material

  19. Single-cell qPCR on dispersed primary pituitary cells -an optimized protocol

    Directory of Open Access Journals (Sweden)

    Haug Trude M

    2010-11-01

    Full Text Available Abstract Background The incidence of false positives is a potential problem in single-cell PCR experiments. This paper describes an optimized protocol for single-cell qPCR measurements in primary pituitary cell cultures following patch-clamp recordings. Two different cell harvesting methods were assessed using both the GH4 prolactin producing cell line from rat, and primary cell culture from fish pituitaries. Results Harvesting whole cells followed by cell lysis and qPCR performed satisfactory on the GH4 cell line. However, harvesting of whole cells from primary pituitary cultures regularly produced false positives, probably due to RNA leakage from cells ruptured during the dispersion of the pituitary cells. To reduce RNA contamination affecting the results, we optimized the conditions by harvesting only the cytosol through a patch pipette, subsequent to electrophysiological experiments. Two important factors proved crucial for reliable harvesting. First, silanizing the patch pipette glass prevented foreign extracellular RNA from attaching to charged residues on the glass surface. Second, substituting the commonly used perforating antibiotic amphotericin B with β-escin allowed efficient cytosol harvest without loosing the giga seal. Importantly, the two harvesting protocols revealed no difference in RNA isolation efficiency. Conclusion Depending on the cell type and preparation, validation of the harvesting technique is extremely important as contaminations may give false positives. Here we present an optimized protocol allowing secure harvesting of RNA from single cells in primary pituitary cell culture following perforated whole cell patch clamp experiments.

  20. Performance of Differential-Phase-Shift Keying Protocol Applying 1310 nm Up-Conversion Single-Photon Detector

    International Nuclear Information System (INIS)

    Chen-Xu, Feng; Rong-Zhen, Jiao; Wen-Han, Zhang

    2008-01-01

    The performance of the differential-phase-shift keying (DPSK) protocol applying a 1310 nm up-conversion single-photon detector is analysed. The error rate and the communication rate as a function of distance for three quantum key distribution protocols, the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the DPSK, are presented. Then we compare the performance of these three protocols using the 1310nm up-conversion detector. We draw the conclusion that the DPSK protocol applying the detector has significant advantage over the other two protocols. Longer transmission distance and lower error rate can be achieved. (general)

  1. Comparison of pregnancy rates in PCOS patients undergoing clomiphene citrate and IUI treatment with different leading follicular sizes.

    Science.gov (United States)

    Seckin, Berna; Pekcan, Meryem Kuru; Bostancı, Esra Isci; Inal, Hasan Ali; Cicek, Mahmut Nedim

    2016-04-01

    The objective of the study was to compare the pregnancy rates in PCOS patients undergoing clomiphene citrate (CC) and intrauterine insemination (IUI) treatment with different leading follicular sizes. A total of 358 infertile women with PCOS who underwent 563 clomiphene citrate and IUI treatment cycles were included in this prospective study. Treatment cycles were divided into three groups according to leading follicular size on the day of hCG administration: Group I: follicular size 17-18 mm (n = 177), Group II: 19-22 mm (n = 321), and Group III : >22 mm (n = 65). Pregnancy rates were evaluated. Treatment outcomes of the groups were further analyzed related to endometrial thickness measurement on the day of hCG. For this purpose, cycles were placed into three subgroups as follows: endometrial thickness 9 mm. There was no statistically significant difference in clinical pregnancy rate per cycle between the groups (8.5, 10, and 9.2 % for Group I, II, and III, respectively, p = 0.86). In further analyses related to endometrial thickness, no significant difference was also found in pregnancy rate among the groups. This results suggest that pregnancy rate is not related to leading follicle size on the day of hCG administration in PCOS patients treated with CC and IUI. In addition, pregnancy rate in women with different follicular sizes is not influenced by the endometrial thickness.

  2. Comparative study of intravenous urographic bolus (I.U.B.) and intravenous urographic infusion (I.U.I.) in dogs

    International Nuclear Information System (INIS)

    Thibaut L, Julio; Ditzel, G.; Vargas, L; Born, R; Deppe G, Rodolfo

    1996-01-01

    Two urographic methods were compared: the intravenous urographic bolus (i.u.b.) and the intravenous urographic infusion (i.u.i.). In both methods, two groups of seven healthy adult dogs of both sexes, weighing7.0 to 16.5 kg were used and were anaesthesized with 2% thiopentone sodium in doses of 20 mg/kg via cephalica. In the i.u.b., meglumine diatrizoate (Hypaque-M, 60%) was injected via saphena with a concentration of 282 mg of iodine per mi in doses of 564 mg of iodine per kg. In the i.u.i., meglumine diatrizoate was injected via saphena by drip infusion with a concentration of 200 mg of iodine per mi in doses of 500 mg of iodine per kg. Three series of two X-rays each were taken in ventrodorsal projection 1, 4 and 8 min and left lateral recumbency 30 sec after administering the contrast medium. The X-ray plates obtained were analyzed and compared intra and inter group considering the advance speed of the contrast medium, the radiographic density and outline, and kidney size. The advance speed of the contrast medium was higher in the i.u.i., reaching the kidney, ureter and bladder 1 min after administration in both projections; in ventrodorsal projections in the i.u.b. only the kidneys were reached while in the left lateral recumbency, the kidney and ureters were reached [es

  3. CPM Test-Retest Reliability: "Standard" vs "Single Test-Stimulus" Protocols.

    Science.gov (United States)

    Granovsky, Yelena; Miller-Barmak, Adi; Goldstein, Oren; Sprecher, Elliot; Yarnitsky, David

    2016-03-01

    Assessment of pain inhibitory mechanisms using conditioned pain modulation (CPM) is relevant clinically in prediction of pain and analgesic efficacy. Our objective is to provide necessary estimates of intersession CPM reliability, to enable transformation of the CPM paradigm into a clinical tool. Two cohorts of young healthy subjects (N = 65) participated in two dual-session studies. In Study I, a Bath-Thermode CPM protocol was used, with hot water immersion and contact heat as conditioning- and test-stimuli, respectively, in a classical parallel CPM design introducing test-stimulus first, and then the conditioning- and repeated test-stimuli in parallel. Study II consisted of two CPM protocols: 1) Two-Thermodes, one for each of the stimuli, in the same parallel design as above, and 2) single test-stimulus (STS) protocol with a single administration of a contact heat test-stimulus, partially overlapped in time by a remote shorter contact heat as conditioning stimulus. Test-retest reliability was assessed within 3-7 days. The STS-CPM had superior reliability intraclass correlation (ICC 2 ,: 1  = 0.59) over Bath-Thermode (ICC 2 ,: 1  = 0.34) or Two-Thermodes (ICC 2 ,: 1  = 0.21) protocols. The hand immersion conditioning pain had higher reliability than thermode pain (ICC 2 ,: 1  = 0.76 vs ICC 2 ,: 1  = 0.16). Conditioned test-stimulus pain scores were of good (ICC 2 ,: 1  = 0.62) or fair (ICC 2 ,: 1  = 0.43) reliability for the Bath-Thermode and the STS, respectively, but not for the Two-Thermodes protocol (ICC 2 ,: 1  = 0.20). The newly developed STS-CPM paradigm was more reliable than other CPM protocols tested here, and should be further investigated for its clinical relevance. It appears that large contact size of the conditioning-stimulus and use of single rather than dual test-stimulus pain contribute to augmentation of CPM reliability. © 2015 American Academy of Pain Medicine. All rights reserved. For permissions, please e

  4. Taxonomy and Analysis of IP Micro-Mobility Protocols in Single and Simultaneous Movements Scenarios

    Directory of Open Access Journals (Sweden)

    G. De Marco

    2007-01-01

    Full Text Available The micro-mobility is an important aspect in mobile communications, where the applications are anywhere and used anytime. One of the problems of micro-mobility is the hand-off latency. In this paper, we analyse two solutions for IP micro-mobility by means of a general taxonomy. The first one is based on the Stream Control Transmission Protocol (SCTP, which allows the dynamic address configuration of an association. The second one is based on the Session Initiation Protocol (SIP, which is the most popular protocol for multimedia communications over IP networks. We show that for the SCTP solution, there is room for further optimisations of the hand-off latency by adding slight changes to the protocol. However, as full end-to-end solution, SCTP is not able to handle simultaneous movement of hosts, whose probability in general cannot be neglected. On the other hand, the SIP can handle both single and simultaneous movements cases, although the hand-off latency can increase with respect to the SCTP solution. We show that for a correct and fast hand-off, the SIP server should be statefull.

  5. Single dental implant retained mandibular complete dentures – influence of the loading protocol: study protocol for a randomized controlled trial

    Science.gov (United States)

    2014-01-01

    Background Over the years, there has been a strong consensus in dentistry that at least two implants are required to retain a complete mandibular denture. It has been shown in several clinical trials that one single median implant can retain a mandibular overdenture sufficiently well for up to 5 years without implant failures, when delayed loading was used. However, other trials have reported conflicting results with in part considerable failure rates when immediate loading was applied. Therefore it is the purpose of the current randomized clinical trial to test the hypothesis that immediate loading of a single mandibular midline implant with an overdenture will result in a comparable clinical outcome as using the standard protocol of delayed loading. Methods/design This prospective nine-center randomized controlled clinical trial is still ongoing. The final patient will complete the trial in 2016. In total, 180 edentulous patients between 60 and 89 years with sufficient complete dentures will receive one median implant in the edentulous mandible, which will retain the existing complete denture using a ball attachment. Loading of the median implant is either immediately after implant placement (experimental group) or delayed by 3 months of submerged healing at second-stage surgery (control group). Follow-up of patients will be performed for 24 months after implant loading. The primary outcome measure is non-inferiority of implant success rate of the experimental group compared to the control group. The secondary outcome measures encompass clinical, technical and subjective variables. The study was funded by the Deutsche Forschungsgemeinschaft (German research foundation, KE 477/8-1). Discussion This multi-center clinical trial will give information on the ability of a single median implant to retain a complete mandibular denture when immediately loaded. If viable, this treatment option will strongly improve everyday dental practice. Trial registration The trial

  6. Endometrial Scratch Injury Induces Higher Pregnancy Rate for Women With Unexplained Infertility Undergoing IUI With Ovarian Stimulation: A Randomized Controlled Trial.

    Science.gov (United States)

    Maged, Ahmed M; Al-Inany, Hesham; Salama, Khaled M; Souidan, Ibrahim I; Abo Ragab, Hesham M; Elnassery, Noura

    2016-02-01

    To explore the impact of endometrial scratch injury (ESI) on intrauterine insemination (IUI) success. One hundred and fifty four infertile women received 100 mg of oral clomiphene citrate for 5 days starting on day 3 of the menstrual cycle. Patients were randomized to 2 equal groups: Group C received IUI without ESI and group S had ESI. Successful pregnancy was confirmed by ultrasound. 13, 21, and 10 women got pregnant after the first, second, and third IUI trials, respectively, with 28.6% cumulative pregnancy rate (PR). The cumulative PR was significantly higher in group S (39%) compared to group C (18.2%). The PR in group S was significantly higher compared to that in group C at the second and third trials. The PR was significantly higher in group S at the second trial compared to that reported in the same group at the first trial but nonsignificantly higher compared to that reported during the third trial, while in group C, the difference was nonsignificant. Eight pregnant women had first trimester abortion with 18.2% total abortion rate with nonsignificant difference between studied groups. The ESI significantly improves the outcome of IUI in women with unexplained infertility especially when conducted 1 month prior to IUI. © The Author(s) 2015.

  7. The reliability of a single protocol to determine endothelial, microvascular and autonomic functions in adolescents.

    Science.gov (United States)

    Bond, Bert; Williams, Craig A; Barker, Alan R

    2017-11-01

    Impairments in macrovascular, microvascular and autonomic function are present in asymptomatic youths with clustered cardiovascular disease risk factors. This study determines the within-day reliability and between-day reliability of a single protocol to non-invasively assess these outcomes in adolescents. Forty 12- to 15-year-old adolescents (20 boys) visited the laboratory in a fasted state on two occasions, approximately 1 week apart. One hour after a standardized cereal breakfast, macrovascular function was determined via flow-mediated dilation (FMD). Heart rate variability (root mean square of successive R-R intervals; RMSSD) was determined from the ECG-gated ultrasound images acquired during the FMD protocol prior to cuff occlusion. Microvascular function was simultaneously quantified as the peak (PRH) and total (TRH) hyperaemic response to occlusion in the cutaneous circulation of the forearm via laser Doppler imaging. To address within-day reliability, a subset of twenty adolescents (10 boys) repeated these measures 90 min afterwards on one occasion. The within-day typical error and between-day typical error expressed as a coefficient of variation of these outcomes are as follows: ratio-scaled FMD, 5·1% and 10·6%; allometrically scaled FMD, 4·4% and 9·4%; PRH, 11% and 13·3%; TRH, 29·9% and 23·1%; and RMSSD, 17·6% and 17·6%. The within- and between-day test-retest correlation coefficients for these outcomes were all significant (r > 0·54 for all). Macrovascular, microvascular and autonomic functions can be simultaneously and non-invasively determined in adolescents using a single protocol with an appropriate degree of reproducibility. Determining these outcomes may provide greater understanding of the progression of cardiovascular disease and aid early intervention. © 2016 Scandinavian Society of Clinical Physiology and Nuclear Medicine. Published by John Wiley & Sons Ltd.

  8. A single-aliquot OSL protocol using bracketing regenerative doses to accurately determine equivalent doses in quartz

    International Nuclear Information System (INIS)

    Folz, Elise; Mercier, Norbert

    1999-01-01

    In most cases, sediments show inherent heterogeneity in their luminescence behaviours and bleaching histories, and identical aliquots are not available: single-aliquot determination of the equivalent dose (ED) is then the approach of choice and the advantages of using regenerative protocols are outlined. Experiments on five laboratory bleached and dosed quartz samples, following the protocol described by Murray and Roberts (1998. Measurement of the equivalent dose in quartz using a regenerative-dose single aliquot protocol. Radiation Measurements 27, 171-184), showed the hazards of using a single regeneration dose: a 10% variation in the regenerative dose yielded some equivalent dose estimates that differed from the expected value by more than 5%. A protocol is proposed that allows the use of different regenerative doses to bracket the estimated equivalent dose. The measured ED is found to be in excellent agreement with the known value when the main regeneration dose is within 10% of the true equivalent dose

  9. A single-aliquot OSL protocol using bracketing regenerative doses to accurately determine equivalent doses in quartz

    CERN Document Server

    Folz, E

    1999-01-01

    In most cases, sediments show inherent heterogeneity in their luminescence behaviours and bleaching histories, and identical aliquots are not available: single-aliquot determination of the equivalent dose (ED) is then the approach of choice and the advantages of using regenerative protocols are outlined. Experiments on five laboratory bleached and dosed quartz samples, following the protocol described by Murray and Roberts (1998. Measurement of the equivalent dose in quartz using a regenerative-dose single aliquot protocol. Radiation Measurements 27, 171-184), showed the hazards of using a single regeneration dose: a 10% variation in the regenerative dose yielded some equivalent dose estimates that differed from the expected value by more than 5%. A protocol is proposed that allows the use of different regenerative doses to bracket the estimated equivalent dose. The measured ED is found to be in excellent agreement with the known value when the main regeneration dose is within 10% of the true equivalent dose.

  10. Effect of single family rooms for preterm infants on neurodevelopment: study protocol for a systematic review.

    Science.gov (United States)

    van Veenendaal, Nicole R; van der Schoor, Sophie R D; Limpens, Jacqueline; van Kempen, Anne A M W; van Goudoever, Johannes B

    2017-08-04

    Preterm infants are at an increased risk for neurodevelopmental delay. They have to endure many stressors in early life, including parent-infant separation, noise and painful procedures during hospitalisation in the highly technological environment of the modern neonatal ward. Currently, a shift is being noticed in the architectural design of neonatal wards towards single family rooms instead of the common open bay units. The influence of the hospital environment on health and specifically neurodevelopment in this vulnerable patient population remains under discussion. To assess the effect of single family rooms during hospitalisation primarily on neurodevelopment in preterm infants. Secondary outcome measures will be neonatal (ie, breastfeeding rates, sepsis, growth during hospital stay, length of hospital stay) and parental (ie, parental stress, satisfaction, participation, presence and self-efficacy). The PRISMA-P 2015 (Preferred Reporting Items for Systematic reviews and Meta-Analyses for Protocols 2015) 17 items checklist was used for the generation of the protocol for this review. The following PICO was formulated: Population: preterm infants with need of hospitalisation in the neonatal ward; Intervention: single family rooms; Comparison: standard neonatal care in open bay units; Outcome: neurodevelopmental outcome of infants from 9 months onwards. If at least two studies, with low or moderate risk of bias, suitable for inclusion are found a meta-analysis will be performed. If quantitative synthesis is not appropriate the data will be presented descriptively. This will be the first review, systematically assessing the effect of single family rooms on neurodevelopmental outcome in preterm infants. Clinical practice could possibly be optimised to ameliorate neurodevelopment in this vulnerable patient population based on these insights. This systematic review will be published in an international peer-reviewed journal. We registered this systematic review

  11. Developing a single-aliquot protocol for measuring equivalent dose in biogenic carbonates

    International Nuclear Information System (INIS)

    Stirling, R.J.; Duller, G.A.T.; Roberts, H.M.

    2012-01-01

    Exploiting biogenic carbonates as thermoluminescence dosimeters requires an understanding of trap kinetics and an appropriate sequence with which to measure equivalent dose. The trap kinetics of two high temperature peaks (peaks II and III) from calcitic snail opercula have been investigated resulting in the calculation of lifetimes of 7.4 × 10 7 and 1.4 × 10 11 years for the two peaks respectively. Two measurement sequences, based upon changes in the application and measurement of a test dose, have been applied to peaks II and III, and though both methods were equally successful in dose recovery and production of a dose response curve some differences were observed. Primarily, the use of method 1 lead to dose dependant sensitivity change implying competition effects occurring during irradiation; method 2 did not experience this phenomenon. As a consequence method 2 was chosen as the most appropriate protocol for single-aliquot dating of this material. When assessing the TL behaviour of the two peaks, peak II performed poorly in dose recovery experiments recovering a dose 60–100% larger than that applied. Disproportionate growth of peak II in response to a beta dose applied prior to measurement, compared to growth following regeneration doses indicated that peak II was not suitable for use in single-aliquot protocols. However, dose recovery results for peak III were all within errors of unity of the given dose, and peak III was therefore chosen as the most appropriate peak for TL dosimetry in these single-aliquot procedures. The lifetime of charge in peak III is sufficient to date over many millions of years, and furthermore using the chosen method 2 the dose response curve has a D 0 of 3,250 ± 163 Gy allowing dating to over 3 million years.

  12. The INeS study: prevention of multiple pregnancies: a randomised controlled trial comparing IUI COH versus IVF e SET versus MNC IVF in couples with unexplained or mild male subfertility.

    Science.gov (United States)

    Bensdorp, Alexandra J; Slappendel, Els; Koks, Carolien; Oosterhuis, Jur; Hoek, Annemieke; Hompes, Peter; Broekmans, Frank; Verhoeve, Harold; de Bruin, Jan Peter; van Weert, Janne Meije; Traas, Maaike; Maas, Jacques; Beckers, Nicole; Repping, Sjoerd; Mol, Ben W; van der Veen, Fulco; van Wely, Madelon

    2009-12-18

    Multiple pregnancies are high risk pregnancies with higher chances of maternal and neonatal mortality and morbidity. In the past decades the number of multiple pregnancies has increased. This trend is partly due to the fact that women start family planning at an increased age, but also due to the increased use of ART.Couples with unexplained or mild male subfertility generally receive intrauterine insemination IUI with controlled hormonal stimulation (IUI COH). The cumulative pregnancy rate is 40%, with a 10% multiple pregnancy rate.This study aims to reveal whether alternative treatments such as IVF elective Single Embryo Transfer (IVF e SET) or Modified Natural Cycle IVF (MNC IVF) can reduce the number of multiple pregnancy rates, but uphold similar pregnancy rates as IUI COH in couples with mild male or unexplained subfertility. Secondly, the aim is to perform a cost effective analyses and assess treatment preference of these couples. We plan a multicentre randomised controlled clinical trial in the Netherlands comparing six cycles of intra-uterine insemination with controlled ovarian hyperstimulation or six cycles of Modified Natural Cycle (MNC) IVF or three cycles with IVF-elective Single Embryo Transfer (eSET) plus cryo-cycles within a time frame of 12 months.Couples with unexplained subfertility or mild male subfertility and a poor prognosis for treatment independent pregnancy will be included. Women with anovulatory cycles, severe endometriosis, double sided tubal pathology or serious endocrine illness will be excluded.Our primary outcome is the birth of a healthy singleton. Secondary outcomes are multiple pregnancy, treatment costs, and patient experiences in each treatment arm. The analysis will be performed according tot the intention to treat principle. We will test for non-inferiority of the three arms with respect to live birth. As we accept a 12.5% loss in pregnancy rate in one of the two IVF arms to prevent multiple pregnancies, we need 200 couples

  13. The INeS study: prevention of multiple pregnancies: a randomised controlled trial comparing IUI COH versus IVF e SET versus MNC IVF in couples with unexplained or mild male subfertility

    Directory of Open Access Journals (Sweden)

    Beckers Nicole

    2009-12-01

    Full Text Available Abstract Background Multiple pregnancies are high risk pregnancies with higher chances of maternal and neonatal mortality and morbidity. In the past decades the number of multiple pregnancies has increased. This trend is partly due to the fact that women start family planning at an increased age, but also due to the increased use of ART. Couples with unexplained or mild male subfertility generally receive intrauterine insemination IUI with controlled hormonal stimulation (IUI COH. The cumulative pregnancy rate is 40%, with a 10% multiple pregnancy rate. This study aims to reveal whether alternative treatments such as IVF elective Single Embryo Transfer (IVF e SET or Modified Natural Cycle IVF (MNC IVF can reduce the number of multiple pregnancy rates, but uphold similar pregnancy rates as IUI COH in couples with mild male or unexplained subfertility. Secondly, the aim is to perform a cost effective analyses and assess treatment preference of these couples. Methods/Design We plan a multicentre randomised controlled clinical trial in the Netherlands comparing six cycles of intra-uterine insemination with controlled ovarian hyperstimulation or six cycles of Modified Natural Cycle (MNC IVF or three cycles with IVF-elective Single Embryo Transfer (eSET plus cryo-cycles within a time frame of 12 months. Couples with unexplained subfertility or mild male subfertility and a poor prognosis for treatment independent pregnancy will be included. Women with anovulatory cycles, severe endometriosis, double sided tubal pathology or serious endocrine illness will be excluded. Our primary outcome is the birth of a healthy singleton. Secondary outcomes are multiple pregnancy, treatment costs, and patient experiences in each treatment arm. The analysis will be performed according tot the intention to treat principle. We will test for non-inferiority of the three arms with respect to live birth. As we accept a 12.5% loss in pregnancy rate in one of the two IVF arms

  14. MPLEx: a Robust and Universal Protocol for Single-Sample Integrative Proteomic, Metabolomic, and Lipidomic Analyses

    Energy Technology Data Exchange (ETDEWEB)

    Nakayasu, Ernesto S.; Nicora, Carrie D.; Sims, Amy C.; Burnum-Johnson, Kristin E.; Kim, Young-Mo; Kyle, Jennifer E.; Matzke, Melissa M.; Shukla, Anil K.; Chu, Rosalie K.; Schepmoes, Athena A.; Jacobs, Jon M.; Baric, Ralph S.; Webb-Robertson, Bobbie-Jo; Smith, Richard D.; Metz, Thomas O.; Chia, Nicholas

    2016-05-03

    ABSTRACT

    Integrative multi-omics analyses can empower more effective investigation and complete understanding of complex biological systems. Despite recent advances in a range of omics analyses, multi-omic measurements of the same sample are still challenging and current methods have not been well evaluated in terms of reproducibility and broad applicability. Here we adapted a solvent-based method, widely applied for extracting lipids and metabolites, to add proteomics to mass spectrometry-based multi-omics measurements. Themetabolite,protein, andlipidextraction (MPLEx) protocol proved to be robust and applicable to a diverse set of sample types, including cell cultures, microbial communities, and tissues. To illustrate the utility of this protocol, an integrative multi-omics analysis was performed using a lung epithelial cell line infected with Middle East respiratory syndrome coronavirus, which showed the impact of this virus on the host glycolytic pathway and also suggested a role for lipids during infection. The MPLEx method is a simple, fast, and robust protocol that can be applied for integrative multi-omic measurements from diverse sample types (e.g., environmental,in vitro, and clinical).

    IMPORTANCEIn systems biology studies, the integration of multiple omics measurements (i.e., genomics, transcriptomics, proteomics, metabolomics, and lipidomics) has been shown to provide a more complete and informative view of biological pathways. Thus, the prospect of extracting different types of molecules (e.g., DNAs, RNAs, proteins, and metabolites) and performing multiple omics measurements on single samples is very attractive, but such studies are challenging due to the fact that the extraction conditions differ according to the molecule type. Here, we adapted an organic solvent-based extraction method that demonstrated

  15. Effects of a single-session assertiveness music therapy role playing protocol for psychiatric inpatients.

    Science.gov (United States)

    Silverman, Michael J

    2011-01-01

    The purpose of this study was to implement and measure the effectiveness of a single-session assertiveness music therapy role playing protocol for psychiatric inpatients. Participants (N=133) were randomly assigned by group to one of three conditions: (a) Assertiveness Music Therapy, (b) No Music Assertiveness, or (c) Music No Assertiveness. Participants in both assertiveness conditions role played a number of different commonly occurring scenarios at an inpatient psychiatric facility and in the community. There were no significant between-group differences in posttest quality of life, locus of control, or other subscales. However, participants in both assertiveness conditions tended to have slightly higher internal locus of control and overall quality of life scores than participants in the music no assertiveness condition. Additionally, the assertiveness music therapy condition had higher attendance rates than the other conditions. A higher percentage of participants from both the assertiveness music therapy and music no assertiveness conditions indicated they thought their session was the most helpful/therapeutic group therapy session in which they had participated; this was not the case for the assertiveness no music condition. Future research is warranted to measure the effects of protocols that can help psychiatric patients generalize skills learned in treatment.

  16. Role of rescue IVF-ET treatment in the management of high response in stimulated IUI cycles.

    Science.gov (United States)

    Olufowobi, O; Sharif, K; Papaioannou, S; Mohamed, H; Neelakantan, D; Afnan, M

    2005-02-01

    Rescue in-vitro fertilisation and embryo transfer (IVF-ET) has been used in high response gonadotrophin intrauterine insemination (IUI) cycles to minimise the risks of ovarian hyperstimulation and multiple gestation. Such unplanned IVF treatment increases the cost of treatment. But can this added cost and the risks associated with IVF be justified? We present our experience with this treatment using clinical pregnancy and live birth rates as the primary outcomes. Between 1998 to 2001, 40 women undergoing IUI cycles who over responded (>3 follicles measuring >15 mm in diameter on the planned day of hCG administration) to gonadotrophin were offered the choice of conversion to IVF-ET or cancel the cycle. 17/40 declined rescue IVF/ET and had their cycles cancelled. 23/40 converted to IVF/ET and underwent transvaginal oocyte retrieval. 21/23 had embryo transferred. The clinical pregnancy and live birth rates were 52% and 48%, respectively. Rescue IVF-ET offers excellent clinical pregnancy and live birth rates in high responders. However, affordability can be an obstacle in the utilization of this treatment option.

  17. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    Energy Technology Data Exchange (ETDEWEB)

    Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br

    2013-09-15

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.

  18. Image quality comparison between single energy and dual energy CT protocols for hepatic imaging

    International Nuclear Information System (INIS)

    Yao, Yuan; Pelc, Norbert J.; Ng, Joshua M.; Megibow, Alec J.

    2016-01-01

    Purpose: Multi-detector computed tomography (MDCT) enables volumetric scans in a single breath hold and is clinically useful for hepatic imaging. For simple tasks, conventional single energy (SE) computed tomography (CT) images acquired at the optimal tube potential are known to have better quality than dual energy (DE) blended images. However, liver imaging is complex and often requires imaging of both structures containing iodinated contrast media, where atomic number differences are the primary contrast mechanism, and other structures, where density differences are the primary contrast mechanism. Hence it is conceivable that the broad spectrum used in a dual energy acquisition may be an advantage. In this work we are interested in comparing these two imaging strategies at equal-dose and more complex settings. Methods: We developed numerical anthropomorphic phantoms to mimic realistic clinical CT scans for medium size and large size patients. MDCT images based on the defined phantoms were simulated using various SE and DE protocols at pre- and post-contrast stages. For SE CT, images from 60 kVp through 140 with 10 kVp steps were considered; for DE CT, both 80/140 and 100/140 kVp scans were simulated and linearly blended at the optimal weights. To make a fair comparison, the mAs of each scan was adjusted to match the reference radiation dose (120 kVp, 200 mAs for medium size patients and 140 kVp, 400 mAs for large size patients). Contrast-to-noise ratio (CNR) of liver against other soft tissues was used to evaluate and compare the SE and DE protocols, and multiple pre- and post-contrasted liver-tissue pairs were used to define a composite CNR. To help validate the simulation results, we conducted a small clinical study. Eighty-five 120 kVp images and 81 blended 80/140 kVp images were collected and compared through both quantitative image quality analysis and an observer study. Results: In the simulation study, we found that the CNR of pre-contrast SE image mostly

  19. Comparison of four different protocols of I-131 therapy for toxic single thyroid nodule

    International Nuclear Information System (INIS)

    Zakavi, S.R.; Mousavi, Z.

    2007-01-01

    Full text: Aim: Radio-iodine therapy is the preferred method of treatment of toxic thyroid nodule, however there is no consensus on the dose of I-131 administered. The aim of this study was to compare 4 different dose protocols for treatment of these patients. Methods and patients: All patients with hyperthyroidism and single hot thyroid nodule were referred for I-131 therapy after thyroid physical examination, ultrasonography and measurements of 24 hours thyroid iodine uptake. They were randomly entered in one of 4 groups: fixed low dose (FLD), fixed high dose (FHD), calculated low dose (CLD) and calculated high dose (CHD). In fixed dose protocol, 13mCi of I-131 was administered for patients in FLD group and 22.5mCi was administered for patients in FHD group. Quimby formula was used for calculation of radio-iodine dose in calculated groups with 90-100uCi and 180-200uCi per gram of thyroid weight in CLD and CHD groups respectively. Patients were followed up for a mean of 2, 5, 10 , 22 and 50 months later and physical exam and measurements of thyroid values were done in each follow up. Results: One hundred and sixteen patients were studied. One 72 year old patient was decreased 2 months after treatment due to coronary artery disease and 18 other patients did not complete follow up. From 97 patients who completed follow- up 8 patients were male and 89 patients were female. Mean age of patients were 43.3 years (SD=13.4) and mean thyroid nodule weight was 51 grams (SD=19.2).Mean 24 hours thyroid uptake was 48.07% (SD=14.07). Follow up was done up to 85 months with a median follow up of 14 months. Twenty two patients were in CHD group, 23 patients in CLD, 25 patients in FLD and 27 patients in FHD group. No significant difference was noted in 4 groups regarding age, sex, thyroid uptake and thyroid weight. The mean administered dose was 10.5mCi (SD=3.2) and 18.7mCi (SD=5.3) in CLD and CHD groups respectively (P<0.001). In CHD group, hyperthyroidism was decreased from 33

  20. Blunt hepatic and splenic trauma. A single Center experience using a multidisciplinary protocol.

    Science.gov (United States)

    Ruscelli, Paolo; Buccoliero, Farncesco; Mazzocato, Susanna; Belfiori, Giulio; Rabuini, Claudio; Sperti, Pierluigi; Rimini, Massimiliano

    2017-01-01

    The aim of this retrospective study was to describe more than 10 years experience of a single Trauma Center about non operative management of abdominal organ injuries in hemodynamically stable patients MATERIAL OF STUDY: Between January 2001 and December 2014 ,732 consecutive patients were admitted with blunt abdominal trauma, involving liver and/or spleen and/or kidney, at the Bufalini Cesena Hospital .Management of patients included a specific institutional developed protocol :hemodynamic stability was evaluated in shock room according to the patients response to fluid challenge and the patients were classified into three categories A,B,and C. Form 732 Trauma, 356(48.6%) of patients were submitted to a surgical procedure, all the other patient 376(51.4%) underwent an non operative management .Overall mortality was 9.8% (72), mortality in the surgery group was 15.4% eheras in the non operative group was 4.5%; the relative risk of mortality, measured by the odds ratio waith a 95% confidence interval, was 3.417(2.023-5.772) for rhe surgery group; patient over 40 years old has a statistically significant higher mortality. In our series the overall mortality rate of non operative management group was 4.5%, instead in unstable patients, the surgery group, the mortality was 15.3%; the overall mortality mortality rate after the application of our protocol is 9.8%, Although surgery continues to be the standard for hemodically unstable patients with blunt hepatic and splenic trauma. In our experience AAST Organ Injury Scale was useless for the therapeutic decision making process after the CT scan if a source of bleeding was detected and immediate angiography was performed in order to control and solve it. In our experience the AAST Organ Injury Scale was useless for the therapeutic decision making process, The results suggest that the only criteria of choice for therapeutici strategy was the hemodynamic stability, Nonoperative managem,ent can be applied only following

  1. Seqüência de Robin: protocolo único de tratamento Robin sequence: a single treatment protocol

    Directory of Open Access Journals (Sweden)

    Ilza L. Marques

    2005-02-01

    Full Text Available OBJETIVO: Apresentar protocolo único que possa atender tanto às dificuldades respiratórias como às dificuldades alimentares dos neonatos e lactentes com seqüência de Robin. FONTE DE DADOS: O artigo foi desenvolvido tomando como base as publicações mais recentes disponíveis em bancos de dados bibliográficos e livros que discutem o tratamento da seqüência de Robin, em especial os estudos realizados no Hospital de Reabilitação de Anomalias Craniofaciais da Universidade de São Paulo (HRAC/USP. SÍNTESE DE DADOS: O artigo apresenta os aspectos morfológicos e genéticos da seqüência de Robin e conceitos sobre nasofaringoscopia e suas implicações clínicas, discute o tratamento das dificuldades respiratórias e alimentares e apresenta um protocolo único para atender a todos os casos de seqüência de Robin, independentemente de sua gravidade e complexidade. CONCLUSÕES: A seqüência de Robin não é somente uma patologia obstrutiva anatômica para ser resolvida com procedimentos cirúrgicos, mas os conhecimentos sobre crescimento e desenvolvimento devem ser aplicados por uma equipe multidisciplinar, porque possibilitam a rápida recuperação da permeabilidade das vias aéreas e da capacidade de alimentação oral, evitando-se, muitas vezes, os procedimentos cirúrgicos e seus riscos, principalmente quando realizados em neonatos e lactentes pequenos.OBJECTIVE: To present a single protocol that might cover both the respiratory and feeding difficulties of neonates and infants with Robin sequence. SOURCES OF DATA: The article was prepared on the basis of the most recent publications available in bibliographic databases and in books that discuss the treatment of Robin sequence, especially the studies conducted at the Hospital for Rehabilitation of Craniofacial Anomalies of Universidade de São Paulo (HRAC/USP. SUMMARY OF THE FINDINGS: We present the morphological and genetic aspects of Robin sequence and concepts about

  2. Feasibility of a single-stage tracheostomy decannulation protocol with endoscopy in adult patients.

    Science.gov (United States)

    Cohen, Oded; Tzelnick, Sharon; Lahav, Yonatan; Stavi, Dekel; Shoffel-Havakuk, Hagit; Hain, Moshe; Halperin, Doron; Adi, Nimrod

    2016-09-01

    Gradual decrease in tube size and tube capping are considered the standard of care for tracheostomy decannulation. Both of these actions result in increased airway resistance. Immediate decannulation may offer a more tolerable approach. To assess the feasibility of immediate tracheostomy decannulation compared with the traditional decannulation methods. This study is a single institute, case-control retrospective study of patients between the years 2009 to 2014. The study group included all patients who underwent immediate decannulation, whereas the control group comprised patients who underwent traditional staged decannulation. An immediate decannulation protocol included admission to the intensive care unit, a comprehensive evaluation, decannulation, 24 hours of monitoring, and observation until discharge. Twenty-nine patients were included in the study group and 20 in the control group. No significant statistical difference was found between the two groups in the patients' medical history and tracheostomy data, except for the Acute Physiology and Chronic Health Evaluation II score and duration of the deflated cuff, which were significantly higher in the control group. A significant difference was found in the complication rate between the groups. In the staged decannulation group, four patients failed decannulation and required reinsertion of the tracheostomy cannula, whereas there were no such failures in the immediate decannulation group. Hospitalization duration after decannulation of the study group patients was significantly shorter than that of the control group. Immediate decannulation may offer a safe alternative for weaning from tracheostomy. It may also reduce the duration of the weaning process and hospitalization. 3b Laryngoscope, 126:2057-2062, 2016. © 2015 The American Laryngological, Rhinological and Otological Society, Inc.

  3. Gated single-photon emission tomography imaging protocol to evaluate myocardial stunning after exercise

    International Nuclear Information System (INIS)

    Hashimoto, Jun; Kubo, Atsushi; Iwasaki, Ryuichiro; Iwanaga, Shiro; Mitamura, Hideo; Ogawa, Satoshi; Kosuda, Shigeru

    1999-01-01

    This study was designed to apply ECG-gating to stress myocardial perfusion single-photon emission tomography (SPET) for the evaluation of myocardial stunning after exercise. Technetium-99m sestamibi was selected as the perfusion agent and a rest/exercise 1-day protocol was employed. Fourteen patients without coronary stenosis and 33 patients with coronary stenosis were enrolled in the study. We carried out three data acquisitions with ECG-gating: a 15-min data acquisition starting 30 min after the rest injection (AC1), a 5-min acquisition starting 5 min after the stress injection (AC2) and a 15-min acquisition starting 20 min after the stress injection (AC3). Calculation of left ventricular ejection fraction (LVEF) values was performed by means of automatic determination of the endocardial surface for all gating intervals in the cardiac cycle. Measured global EF values in 14 patients without coronary stenosis were 52.3%±7.6% (AC1), 60.6%±8.9% (AC2) and 55.6%±5.6% (AC3), and those in 11 patients with severe ischaemia were 53.6%±8.0% (AC1), 45.6%±12.1% (AC2) and 49.7%±10.7%. The magnitude of the depression of post-stress LVEF relative to the rest LVEF correlated with the severity of ischaemia (r=0.594, P=0.002), and segments manifesting post-stress functional depression were associated with ischaemic segments showing reversible perfusion defects. Stress myocardial perfusion SPET with ECG-gating is a feasible method for the evaluation of myocardial stunning as well as exercise-induced ischaemia. (orig.)

  4. Safety of a DVT chemoprophylaxis protocol following traumatic brain injury: a single center quality improvement initiative.

    Science.gov (United States)

    Nickele, Christopher M; Kamps, Timothy K; Medow, Joshua E

    2013-04-01

    Venous thromboembolism (VTE) is a complication that affects approximately 30 % of moderate and severe traumatic brain injury (TBI) patients when pharmacologic prophylaxis is not used. Following TBI, specifically in the case of contusions, the safety and efficacy of pharmacologic thromboembolism prophylaxis (PTP) has been studied only in small sample sizes. In this study, we attempt to assess the safety and efficacy of a PTP protocol for TBI patients, as a quality improvement (QI) initiative, in the neuroscience intensive care unit (NSICU). Between January 1st and December 31st, 2009, consecutive patients discharged from the University of Wisconsin NSICU after >a 48 h minimum stay were evaluated as part of a QI project. A protocol for the initiation of PTP was designed and implemented for NSICU patients. The protocol did not vary based on type of intracranial injury. The rate of VTE was reported as was heparin-induced thrombocytopenia and PTP-related expansion of intracranial hemorrhage (IH) requiring reoperation. The number of patients receiving PTP and the timing of therapy were tracked. Patients were excluded for persistent coagulopathy, other organ system bleeding (such as the gastrointestinal tract), or pregnancy. Faculty could opt out of the protocol without reason. Using the same criteria, patients discharged during the preceding 6 months, from July 1st to December 31st, 2008, were evaluated as controls as the PTP protocol was not in effect during this time. During the control period, there were 48 head trauma admissions who met the inclusion criteria. In 22 patients (45.8 %), PTP was initiated at an average of 4.9 ± 5.4 days after admission. During the protocol period, there were 87 head trauma admissions taken from 1,143 total NSICU stays who met criteria. In 63 patients (72.4 %), the care team in the NSICU successfully initiated PTP, at an average of 3.4 ± 2.8 days after admission. All 87 trauma patients were analyzed, and the rate of clinically

  5. Reliability of single aliquot regenerative protocol (SAR) for dose estimation in quartz at different burial temperatures: A simulation study

    International Nuclear Information System (INIS)

    Koul, D.K.; Pagonis, V.; Patil, P.

    2016-01-01

    The single aliquot regenerative protocol (SAR) is a well-established technique for estimating naturally acquired radiation doses in quartz. This simulation work examines the reliability of SAR protocol for samples which experienced different ambient temperatures in nature in the range of −10 to 40 °C. The contribution of various experimental variables used in SAR protocols to the accuracy and precision of the method is simulated for different ambient temperatures. Specifically the effects of paleo-dose, test dose, pre-heating temperature and cut-heat temperature on the accuracy of equivalent dose (ED) estimation are simulated by using random combinations of the concentrations of traps and centers using a previously published comprehensive quartz model. The findings suggest that the ambient temperature has a significant bearing on the reliability of natural dose estimation using SAR protocol, especially for ambient temperatures above 0 °C. The main source of these inaccuracies seems to be thermal sensitization of the quartz samples caused by the well-known thermal transfer of holes between luminescence centers in quartz. The simulations suggest that most of this inaccuracy in the dose estimation can be removed by delivering the laboratory doses in pulses (pulsed irradiation procedures). - Highlights: • Ambient temperatures affect the reliability of SAR. • It overestimates the dose with increase in burial temperature and burial time periods. • Elevated temperature irradiation does not correct for these overestimations. • Inaccuracies in dose estimation can be removed by incorporating pulsed irradiation procedures.

  6. Protocol renal biopsy in patients with lupus nephritis: a single center experience.

    Science.gov (United States)

    Singh, Ametashver; Ghosh, Rabindranath; Kaur, Prabhjeet; Golay, Vishal; Pandey, Rajendra; Roychowdhury, Arpita

    2014-07-01

    Renal biopsy plays an indispensable role in the diagnosis and management of patients with lupus nephritis (LN). A number of studies have evaluated the role of a repeat biopsy in case of disease relapse or treatment unresponsiveness. We studied 40 patients with LN with renal biopsies performed at baseline and after six months of therapy. The baseline and protocol biopsies were compared with respect to histological class transformation, crescents, tubular atrophy, interstitial fibrosis and glomerulosclerosis. We also compared serum creatinine, hemoglobin, systemic lupus erythematosus disease activity index (SLEDAI) scores, 24-h urine protein excretion and C3levels as well as activity index (AI) and chronicity index (CI) at baseline and at six months. Comparison of means was made by paired t test, McNemar test and marginal homogeneity test (multinomial data). Histological class transformation was seen in 10 patients (25%). Intra-class progression to greater chronicity was seen in 10 other patients (25%).There was an increase in glomerulosclerosis, tubular atrophy, interstitial fibrosis and a reduction in cellularity, crescent formation and wire loop lesions in the protocol biopsy. A decline in AI (6.05 vs. 2.50, P protocol biopsy. Our study shows a trend toward greater chronicity in protocol biopsies in LN.

  7. Using the OSL single-aliquot regenerative-dose protocol with quartz extracted from building materials in retrospective dosimetry

    DEFF Research Database (Denmark)

    Bøtter-Jensen, L.; Solongo, S.; Murray, A.S.

    2000-01-01

    We report on the application of the single-aliquot regenerative-dose (SAR) protocol to the optically stimulated luminescence signal from quartz extracted from fired bricks acid unfired mortar in retrospective dosimetry. The samples came from a radioactive materials storage facility, with ambient...... dose rates of about 0.1 mGy/h. A detailed dose-depth profile was analysed from one brick, and compared with dose records from area TL dosemeters. Small-aliquot dose-distributions were analysed from the mortar samples; one associated with the exposed brick, and one from a remote site exposed only...

  8. Near-optimality of special periodic protocols for fluid models of single server switched networks with switchover times

    Science.gov (United States)

    Matveev, A. S.; Ishchenko, R.

    2017-11-01

    We consider a generic deterministic time-invariant fluid model of a single server switched network, which consists of finitely many infinite size buffers (queues) and receives constant rate inflows of jobs from the outside. Any flow undergoes a multi-phase service, entering a specific buffer after every phase, and ultimately leaves the network; the route of the flow over the buffers is pre-specified, and flows may merge inside the network. They share a common source of service, which can serve at most one buffer at a time and has to switch among buffers from time to time; any switch consumes a nonzero switchover period. With respect to the long-run maximal scaled wip (work in progress) performance metric, near-optimality of periodic scheduling and service protocols is established: the deepest optimum (that is over all feasible processes in the network, irrespective of the initial state) is furnished by such a protocol up to as small error as desired. Moreover, this can be achieved with a special periodic protocol introduced in the paper. It is also shown that the exhaustive policy is optimal for any buffer whose service at the maximal rate does not cause growth of the scaled wip.

  9. Implementation of a split-bolus single-pass CT protocol at a UK major trauma centre to reduce excess radiation dose in trauma pan-CT

    International Nuclear Information System (INIS)

    Leung, V.; Sastry, A.; Woo, T.D.; Jones, H.R.

    2015-01-01

    Aim: To quantify the dose reduction and ensure that the use of a split-bolus protocol provided sufficient vascular enhancement. Materials and methods: Between 1 January 2014 and 31 May 2014, both split bolus and traditional two-phase scans were performed on a single CT scanner (SOMATOM Definition AS+, Siemens Healthcare) using a two-pump injector (Medrad Stellant). Both protocols used Siemens' proprietary tube current and tube voltage modulation techniques (CARE dose and CARE kV). The protocols were compared retrospectively to assess the dose–length product (DLP), aortic radiodensity at the level of the coeliac axis and radiodensity of the portal vein. Results: There were 151 trauma CT examinations during this period. Seventy-eight used the split-bolus protocol. Seventy-one had traditional two-phase imaging. One patient was excluded as they were under the age of 18 years. The radiodensity measurements for the portal vein were significantly higher (p<0.001) in the split-bolus protocol. The mean aortic enhancement in both protocols exceeded 250 HU, although the traditional two-phase protocol gave greater arterial enhancement (p<0.001) than the split-bolus protocol. The split-bolus protocol had a significantly lower (p<0.001) DLP with 43.5% reduction in the mean DLP compared to the traditional protocol. Conclusion: Split-bolus CT imaging offers significant dose reduction for this relatively young population while retaining both arterial and venous enhancement. -- Highlights: •We implemented a split bolus pan-CT protocol for trauma CT. •We compared the radiation dose and vascular enhancement of the split bolus protocol to a traditional two phase protocol. •The split bolus protocol had a 43.5% reduction in mean DLP

  10. Investigations of the post-IR IRSL protocol applied to single K-feldspar grains from fluvial sediment samples

    International Nuclear Information System (INIS)

    Nian, Xiaomei; Bailey, Richard M.; Zhou, Liping

    2012-01-01

    The post-IR IRSL protocol with single K-feldspar grains was applied to three samples taken from a fluvial sedimentary sequence at the archaeological site of the Dali Man, Shaanxi Province, China. K-feldspar coarse grains were extracted for measurement. Approximately 30–40% of the grains were sufficiently bright to measure, and after application of rejection criteria based on signal strength, recuperation, recycling ratio and saturation dose, ∼10–15% of the grains were used for D e calculation. The relationship of signal decay rate and form of D e (t) with the recovery dose were investigated. The dose recovery ratios of the samples after initial bleaching with the four different light sources were within uncertainties of unity. No anomalous fading was observed. The over-dispersion of the recovered dose and D e values were similar, suggesting neither incomplete resetting of the post-IR IRSL signals nor spatially heterogeneous dose rates significantly affected the natural dose estimates. The values of D e obtained with the single K-feldspar grain post-IR IRSL protocol were in the range ∼400–490 Gy. Combining all of the measured single-grain signals for each of the individual samples (into a ‘synthetic single aliquot’) increased the D e estimates to the range ∼700–900 Gy, suggesting that the grains screened-out by the rejection criteria may have the potential to cause palaeodose over-estimation, although this finding requires a more extensive investigation. Thermally transferred signals were found in the single K-feldspar grains post-IR IRSL protocol, and the proportion of thermally transferred signal to test-dose OSL signal (stimulation at 290 °C) from the natural dose was higher than from regenerative doses, and the proportion was grain- and dose-dependent. As such, TT-post-IR IRSL signals at 290 °C have the potential to cause dose underestimation, although this may be reduced by using larger test-dose irradiations. Our study demonstrates

  11. The effect of a positive reappraisal coping intervention and problem-solving skills training on coping strategies during waiting period of IUI treatment: An RCT

    Science.gov (United States)

    Ghasemi, Marzieh; Kordi, Masoumeh; Asgharipour, Negar; Esmaeili, Habibollah; Amirian, Maliheh

    2017-01-01

    Background: Waiting period of fertility treatment is stressful, therefore it is necessary to use effective coping strategies to cope with waiting period of intrauterine insemination (IUI) treatment. Objective: The aim of this study was comparing the effect of the positive reappraisal coping intervention (PRCI) with the problem-solving skills training (PSS) on the coping strategies of IUI waiting period, in infertile women referred to Milad Infertility Center in Mashhad. Materials and Methods: In this randomized clinical trial, 108 women were evaluated into three groups. The control group received the routine care, but in PRCI group, two training sessions were held and they were asked to review the coping thoughts cards and fill out the daily monitoring forms during the waiting period, and in PSS group problem-solving skill were taught during 3 sessions. The coping strategies were compared between three groups on the 10th day of IUI waiting period. Results: Results showed that the mean score for problem-focused were significantly different between the control (28.54±9.70), PSS (33.71±9.31), and PRCI (30.74±10.96) (p=0.025) groups. There were significant differences between the PSS group and others groups, and mean emotion-focused were significantly different between the control (32.09±11.65), PSS (29.20±9.88), and PRCI (28.74±7.96) (p=0.036) groups. There were significant differences between the PRCI and the control group (p=0.047). Conclusion: PSS was more effective to increase problem-focused coping strategies than PRCI, therefore it is recommended that this intervention should be used in infertility treatment centers. PMID:29404530

  12. The effect of a positive reappraisal coping intervention and problem-solving skills training on coping strategies during waiting period of IUI treatment: An RCT.

    Science.gov (United States)

    Ghasemi, Marzieh; Kordi, Masoumeh; Asgharipour, Negar; Esmaeili, Habibollah; Amirian, Maliheh

    2017-11-01

    Waiting period of fertility treatment is stressful, therefore it is necessary to use effective coping strategies to cope with waiting period of intrauterine insemination (IUI) treatment. The aim of this study was comparing the effect of the positive reappraisal coping intervention (PRCI) with the problem-solving skills training (PSS) on the coping strategies of IUI waiting period, in infertile women referred to Milad Infertility Center in Mashhad. In this randomized clinical trial, 108 women were evaluated into three groups. The control group received the routine care, but in PRCI group, two training sessions were held and they were asked to review the coping thoughts cards and fill out the daily monitoring forms during the waiting period, and in PSS group problem-solving skill were taught during 3 sessions. The coping strategies were compared between three groups on the 10 th day of IUI waiting period. Results showed that the mean score for problem-focused were significantly different between the control (28.54±9.70), PSS (33.71±9.31), and PRCI (30.74±10.96) (p=0.025) groups. There were significant differences between the PSS group and others groups, and mean emotion-focused were significantly different between the control (32.09±11.65), PSS (29.20±9.88), and PRCI (28.74±7.96) (p=0.036) groups. There were significant differences between the PRCI and the control group (p=0.047). PSS was more effective to increase problem-focused coping strategies than PRCI, therefore it is recommended that this intervention should be used in infertility treatment centers.

  13. The effect of a positive reappraisal coping intervention and problem-solving skills training on coping strategies during waiting period of IUI treatment: An RCT

    Directory of Open Access Journals (Sweden)

    Marzieh Ghasemi

    2017-11-01

    Full Text Available Background: Waiting period of fertility treatment is stressful, therefore it is necessary to use effective coping strategies to cope with waiting period of intrauterine insemination (IUI treatment. Objective: The aim of this study was comparing the effect of the positive reappraisal coping intervention (PRCI with the problem-solving skills training (PSS on the coping strategies of IUI waiting period, in infertile women referred to Milad Infertility Center in Mashhad. Materials and Methods: In this randomized clinical trial, 108 women were evaluated into three groups. The control group received the routine care, but in PRCI group, two training sessions were held and they were asked to review the coping thoughts cards and fill out the daily monitoring forms during the waiting period, and in PSS group problem-solving skill were taught during 3 sessions. The coping strategies were compared between three groups on the 10th day of IUI waiting period. Results: Results showed that the mean score for problem-focused were significantly different between the control (28.54±9.70, PSS (33.71±9.31, and PRCI (30.74±10.96 (p=0.025 groups. There were significant differences between the PSS group and others groups, and mean emotion-focused were significantly different between the control (32.09±11.65, PSS (29.20±9.88, and PRCI (28.74±7.96 (p=0.036 groups. There were significant differences between the PRCI and the control group (p=0.047. Conclusion: PSS was more effective to increase problem-focused coping strategies than PRCI, therefore it is recommended that this intervention should be used in infertility treatment centers.

  14. Quantitative mouse brain phenotyping based on single and multispectral MR protocols

    Science.gov (United States)

    Badea, Alexandra; Gewalt, Sally; Avants, Brian B.; Cook, James J.; Johnson, G. Allan

    2013-01-01

    Sophisticated image analysis methods have been developed for the human brain, but such tools still need to be adapted and optimized for quantitative small animal imaging. We propose a framework for quantitative anatomical phenotyping in mouse models of neurological and psychiatric conditions. The framework encompasses an atlas space, image acquisition protocols, and software tools to register images into this space. We show that a suite of segmentation tools (Avants, Epstein et al., 2008) designed for human neuroimaging can be incorporated into a pipeline for segmenting mouse brain images acquired with multispectral magnetic resonance imaging (MR) protocols. We present a flexible approach for segmenting such hyperimages, optimizing registration, and identifying optimal combinations of image channels for particular structures. Brain imaging with T1, T2* and T2 contrasts yielded accuracy in the range of 83% for hippocampus and caudate putamen (Hc and CPu), but only 54% in white matter tracts, and 44% for the ventricles. The addition of diffusion tensor parameter images improved accuracy for large gray matter structures (by >5%), white matter (10%), and ventricles (15%). The use of Markov random field segmentation further improved overall accuracy in the C57BL/6 strain by 6%; so Dice coefficients for Hc and CPu reached 93%, for white matter 79%, for ventricles 68%, and for substantia nigra 80%. We demonstrate the segmentation pipeline for the widely used C57BL/6 strain, and two test strains (BXD29, APP/TTA). This approach appears promising for characterizing temporal changes in mouse models of human neurological and psychiatric conditions, and may provide anatomical constraints for other preclinical imaging, e.g. fMRI and molecular imaging. This is the first demonstration that multiple MR imaging modalities combined with multivariate segmentation methods lead to significant improvements in anatomical segmentation in the mouse brain. PMID:22836174

  15. Estrus response and fertility of Menz and crossbred ewes to single prostaglandin injection protocol.

    Science.gov (United States)

    Mekuriaw, Zeleke; Assefa, Habtemariam; Tegegne, Azage; Muluneh, Dagne

    2016-01-01

    Natural lambing in sheep in Ethiopia occurs throughout the year in a scattered manner negatively affecting survival and growth rates of the lambs born during the unfavorable season of the year. Thus, controlling the time of mating artificially using exogenous source of hormones is considered as one of the ways to mitigated problems related to haphazard lambing. To this end, an experiment was conducted to evaluate efficacy of prostaglandin-based estrus synchronization protocol in local and crossbred ewes. A total of 160 ewes (80 local and 80 crossbreds) which lambed at least once and aged 3-5 years were used. Lutalyse® (dinoprost tromethamine sterile solution equivalent to 5 mg dinoprost per ml) and its analog, Synchromate® (cloprostenol sodium equivalent to 0.250 mg cloprostenol per ml), were tested at different doses. The treatments used were intramuscular injection of (1) 2.50 ml of Lutalyse® (12.5 mg dinoprost tromethamine), (2) 2 ml of Lutalyse® (10.0 mg dinoprost tromethamine), (3) 1 ml of Synchromate® (0.25 mg of cloprostenol Sodium), and (4) 0.8 ml of Synchromate® (0.20 mg of cloprostenol Sodium). Forty ewes (20 local and 20 crossbreds) were allocated per treatment. Following injection of the respective hormones, rams of known fertility were introduced into the flock for the duration of 96 h at the ratio of one ram to 10 ewes. All estrus synchronization protocols except treatment 4 (0.8 ml of Synchromate®) induced estrus (heat) in majority (55-65%) of local and crossbred ewes within 96 h post-hormone injection. The time interval from hormone administration to onset of estrus was also more or less similar for all treatment groups except for treatment group 4 which showed heat quicker. The highest lambing rate was recorded in local ewes (84.62% (11/13) treated with 2.5 ml of Lutalyse®, whereas the least was obtained in crossbreds (33.33% (3/9) treated with 0.8 ml Synchromate®. In conclusion, even though 2.5 ml and 2 ml of Lutalyse® or 1 ml of

  16. Single-needle temporomandibular joint arthrocentesis with hyaluronic acid injections. Preliminary data after a five-injection protocol.

    Science.gov (United States)

    Manfredini, D; Guarda-Nardini, L; Ferronato, G

    2009-10-01

    The classical technique for temporomandibular joint (TMJ) arthrocentesis provides a double access to the joint space, which may lead to patient's postoperatory discomfort. For this reason, a less invasive, single-needle approach has been recently described, and the present investigation reports findings on a case series of patients with TMJ osteoarthritis treated with hyaluronic acid injections following a single needle arthrocentesis. METHODS. Fourteen consecutive patients with a diagnosis of TMJ osteoarthritis according to the Research Diagnostic Criteria for Temporo-mandibular Disorders were treated with a cycle of five weekly injections of hyaluronic acid after arthrocentesis. A number of subjective (pain at rest and mastication, masticatory efficiency, functional limitation, subjective efficacy of treatment, tolerability of treatment) and objective (maximum assisted and unassited mouth opening, protrusive and laterotrusive movements) outcome variables were assessed before and after the treatment period. At the end of the five-injection protocol, significant improvements were showed in almost all the subjective outcome variables. Tolerability of the treatment was good on a four-point ordinal scale since the time of the first injection. The present investigation suggested that the single needle technique for TMJ hyaluronic injection following arthrocentesis in osteoarthritic joints may have promising applications in the clinical setting, which have to be confirmed with future studies.

  17. Early pain management after periodontal treatment in dogs – comparison of single and combined analgesic protocols

    Directory of Open Access Journals (Sweden)

    Petr Raušer

    2015-01-01

    Full Text Available The aim of this study was to assess the analgesic effectiveness of three analgesic protocols in dogs undergoing a periodontal treatment. The study was performed as a prospective, randomized, “double blind” clinical study. A total of 45 client-owned dogs scheduled for periodontal treatment were included. Dogs of Group C received carprofen (4 mg·kg-1, dogs of Group B received bupivacaine (1 mg·kg-1 and dogs of Group CB received a combination of carprofen (4 mg·kg-1 and bupivacaine (1 mg·kg-1. Carprofen was administered subcutaneously 30 min before anaesthesia, bupivacaine was administered by nerve blocks in anaesthetized dogs. Painful periodontal treatment was performed in all patients, lasting up to one hour. Modified University of Melbourne Pain Score (UMPS, Visual Analogue Scale for pain assessment (VAS, plasma glucose and serum cortisol levels were assessed 30 min before administration of analgesics (C-0, B-0, CB‑0 and 2 h after recovery from anaesthesia (C-2, B-2, CB-2. For statistical analysis Friedman test, Mann-Whitney U-test, ANOVA and Fischer exact tests were used (P < 0.05. In CB‑2 compared to CB‑0 significantly decreased modified UMPS values. In CB‑2 UMPS values were significantly lower compared to C‑2 or B‑2. In C‑2 VAS values were significantly increased compared to C‑0, and in B‑2 VAS values were significantly increased compared to B‑0. Visual Analogue Scale values were significantly lower in CB‑2 compared to C‑2 or B‑2. Significantly increased plasma glucose concentrations were found in C‑2 compared to C‑0 and in B‑2 compared to B‑0. No other significant differences were detected. Administration of carprofen, bupivacaine or their combination is sufficient for early postoperative analgesia following periodontal treatment. Carprofen-bupivacaine combination is superior to carprofen or bupivacaine administered separately.

  18. Using the OSL single-aliquot regenerative-dose protocol with quartz extracted from building materials in retrospective dosimetry

    International Nuclear Information System (INIS)

    Boetter-Jensen, L.; Solongo, S.; Murray, A.S.; Banerjee, D.; Jungner, H.

    2000-01-01

    We report on the application of the single-aliquot regenerative-dose (SAR) protocol to the optically stimulated luminescence signal from quartz extracted from fired bricks and unfired mortar in retrospective dosimetry. The samples came from a radioactive materials storage facility, with ambient dose rates of about 0.1 mGy/h. A detailed dose-depth profile was analysed from one brick, and compared with dose records from area TL dosemeters. Small-aliquot dose-distributions were analysed from the mortar samples; one associated with the exposed brick, and one from a remote site exposed only to background radiation. We conclude that unfired materials have considerable potential in retrospective dosimetry

  19. The Effects of Total Motile Sperm Count on Spontaneous Pregnancy Rate and Pregnancy After IUI Treatment in Couples with Male Factor and Unexplained Infertility.

    Science.gov (United States)

    Hajder, Mithad; Hajder, Elmira; Husic, Amela

    2016-02-01

    Male infertility factor is defined if the total number of motile spermatozoa (TMSC) 3,10(6) / ejaculate and a spontaneous pregnancy, group (B) with TMSCl 3 x 10(6) / ejaculate and couples who have not achieved pregnancy. From a total of 98 pairs of men's and unexplained infertility, 42 of them (42.8%) achieved spontaneous pregnancy, while 56 (57.2%) pairs did not achieve spontaneous pregnancy. TMSC was significantly higher (42.4 ± 28.4 vs. 26.2 ± 24, p 20 x 10(6) / ejaculate (RR = 1.7, 95% CI: 1.56-1.82, 5 x 10(6) / ejaculate are indicated for treatment with IUI. TMSC can be used as the method of choice for diagnosis and treatment of male infertility.

  20. A novel diagnostic protocol to identify patients suitable for discharge after a single high-sensitivity troponin

    Science.gov (United States)

    Carlton, Edward W; Cullen, Louise; Than, Martin; Gamble, James; Khattab, Ahmed; Greaves, Kim

    2015-01-01

    Objective To establish whether a novel accelerated diagnostic protocol (ADP) for suspected acute coronary syndrome (ACS) could successfully identify low-risk patients suitable for discharge after a single high-sensitivity troponin T (hs-cTnT) taken at presentation to the emergency department. We also compared the diagnostic accuracy of this ADP with strategies using initial undetectable hs-cTnT. Methods This prospective observational study evaluated the ability of the Triage Rule-out Using high-Sensitivity Troponin (TRUST) ADP to identify low-risk patients with suspected ACS. The ADP incorporated a single presentation hs-cTnT of <14 ng/L, a non-ischaemic ECG and a modified Goldman risk score. Diagnostic performance of the ADP was compared with the detection limit cut-offs of hs-cTnT (<5 ng/L and <3 ng/L). The primary end point was fatal/non-fatal acute myocardial infarction (AMI) within 30 days. Results 960 participants were recruited, mean age 58.0 years, 80 (8.3%) had an AMI. The TRUST ADP classified 382 (39.8%) as low-risk with a sensitivity for identifying AMI of 98.8% (95% CI 92.5% to 99.9%). hs-cTnT detection limits (<5 ng/L and <3 ng/L) had a sensitivity of 100% (94.3 to 100) and 100% (94.4 to 100), respectively. The TRUST ADP identified more patients suitable for early discharge at 39.8% vs 29.3% (<5 ng/L) and 7.9% (<3 ng/L) (p<0.001) with a lower false-positive rate for AMI detection; specificity 43.3% (95% CI 42.7% to 43.4%) vs 32.0% (95% CI 31.5% to 32.0%) and 8.6% (95% CI 8.1% to 8.6%), respectively. Conclusions The TRUST ADP, which incorporates structured risk-assessment and a single presentation hs-cTnT blood draw, has potential to allow early discharge in 40% of patients with suspected ACS and has greater clinical utility than undetectable hs-cTnT strategies. Trial registration number ISRCTN No. 21109279. PMID:25691511

  1. Outcomes of Optimized over Standard Protocol of Rabbit Antithymocyte Globulin for Severe Aplastic Anemia: A Single-Center Experience

    Science.gov (United States)

    Ge, Meili; Shao, Yingqi; Huang, Jinbo; Huang, Zhendong; Zhang, Jing; Nie, Neng; Zheng, Yizhou

    2013-01-01

    Background Previous reports showed that outcome of rabbit antithymocyte globulin (rATG) was not satisfactory as the first-line therapy for severe aplastic anemia (SAA). We explored a modifying schedule of administration of rATG. Design and Methods Outcomes of a cohort of 175 SAA patients, including 51 patients administered with standard protocol (3.55 mg/kg/d for 5 days) and 124 cases with optimized protocol (1.97 mg/kg/d for 9 days) of rATG plus cyclosporine (CSA), were analyzed retrospectively. Results Of all 175 patients, response rates at 3 and 6 months were 36.6% and 56.0%, respectively. 51 cases received standard protocol had poor responses at 3 (25.5%) and 6 months (41.2%). However, 124 patients received optimized protocol had better responses at 3 (41.1%, P = 0.14) and 6 (62.1%, P = 0.01). Higher incidences of infection (57.1% versus 37.9%, P = 0.02) and early mortality (17.9% versus 0.8%, P<0.001) occurred in patients received standard protocol compared with optimized protocol. The 5-year overall survival in favor of the optimized over standard rATG protocol (76.0% versus. 50.3%, P<0.001) was observed. By multivariate analysis, optimized protocol (RR = 2.21, P = 0.04), response at 3 months (RR = 10.31, P = 0.03) and shorter interval (<23 days) between diagnosis and initial dose of rATG (RR = 5.35, P = 0.002) were independent favorable predictors of overall survival. Conclusions Optimized instead of standard rATG protocol in combination with CSA remained efficacious as a first-line immunosuppressive regimen for SAA. PMID:23554855

  2. Alveolar Bone Resorption Evaluation Around Single-piece Designed Bicortical Implants, Using Immediate Loading Protocol, Based on Orthopantomographs

    Directory of Open Access Journals (Sweden)

    Száva Dániel-Tamás

    2017-12-01

    Full Text Available Background: Inserting dental implants in severely atrophied jawbones is a great challenge for the dental practitioner. There are an increasing number of patients who choose dental implantanchored prosthetic restorations despite compromised bone quality and quantity. There have been numerous attempts in adapting implant design for the atrophic crestal bone. One-piece, needle-type basal implant design is a typical design for these cases. These implants are inserted in the remaining compact bone located in the basal aspect of the jawbones. If high primary stability is achieved, these implants are used for immediate loading protocol. From many points of view, this technique is based on contradictory principles compared to classic implant surgery and loading protocols. The aim of this study was to investigate the long-term success of basal one-piece short-diameter dental implants used for immediate loading protocol.

  3. Is IVF-served two different ways-more cost-effective than IUI with controlled ovarian hyperstimulation?

    NARCIS (Netherlands)

    Tjon-Kon-Fat, R. I.; Bensdorp, A. J.; Bossuyt, P. M. M.; Koks, C.; Oosterhuis, G. J. E.; Hoek, A.; Hompes, P.; Broekmans, F. J.; Verhoeve, H. R.; de Bruin, J. P.; van Golde, R.; Repping, S.; Cohlen, B. J.; Lambers, M. D. A.; van Bommel, P. F.; Slappendel, E.; Perquin, D.; Smeenk, J.; Pelinck, M. J.; Gianotten, J.; Hoozemans, D. A.; Maas, J. W. M.; Groen, H.; Eijkemans, M. J. C.; van der Veen, F.; Mol, B. W. J.; van Wely, M.

    2015-01-01

    STUDY QUESTION: What is the cost-effectiveness of in vitro fertilization(IVF) with conventional ovarian stimulation, single embryotransfer (SET) and subsequent cryocycles or IVF in a modified natural cycle (MNC) compared with intrauterine insemination with controlled ovarian hyperstimulation

  4. Is IVF-served two different ways-more cost-effective than IUI with controlled ovarian hyperstimulation?

    NARCIS (Netherlands)

    Tjon-Kon-Fat, R. I.; Bensdorp, A. J.; Bossuyt, P. M M; Koks, C.; Oosterhuis, G. J E; Hoek, A.; Hompes, P.; Broekmans, F. J.; Verhoeve, H. R.; De Bruin, J. P.; Van Golde, R.; Repping, S.; Cohlen, B. J.; Lambers, M. D A; Van Bommel, P. F.; Slappendel, E.; Perquin, D.; Smeenk, J.; Pelinck, M. J.; Gianotten, J.; Hoozemans, D. A.; Maas, J. W M; Groen, H.; Eijkemans, M. J C; Van Der Veen, F.; Mol, B. W J; Van Wely, M.

    2015-01-01

    STUDY QUESTION What is the cost-effectiveness of in vitro fertilization (IVF) with conventional ovarian stimulation, single embryo transfer (SET) and subsequent cryocycles or IVF in a modified natural cycle (MNC) compared with intrauterine insemination with controlled ovarian hyperstimulation

  5. RT-based memory detection : Item saliency effects in the single-probe and the multiple-probe protocol

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.; Theocharidou, K.

    RT-based memory detection may provide an efficient means to assess recognition of concealed information. There is, however, considerable heterogeneity in detection rates, and we explored two potential moderators: item saliency and test protocol. Participants tried to conceal low salient (e.g.,

  6. Study Protocol: Phase III single-blinded fast-track pragmatic randomised controlled trial of a complex intervention for breathlessness in advanced disease

    Directory of Open Access Journals (Sweden)

    Brafman-Kennedy Barbara

    2011-05-01

    Full Text Available Abstract Background Breathlessness in advanced disease causes significant distress to patients and carers and presents management challenges to health care professionals. The Breathlessness Intervention Service (BIS seeks to improve the care of breathless patients with advanced disease (regardless of cause through the use of evidence-based practice and working with other healthcare providers. BIS delivers a complex intervention (of non-pharmacological and pharmacological treatments via a multi-professional team. BIS is being continuously developed and its impact evaluated using the MRC's framework for complex interventions (PreClinical, Phase I and Phase II completed. This paper presents the protocol for Phase III. Methods/Design Phase III comprises a pragmatic, fast-track, single-blind randomised controlled trial of BIS versus standard care. Due to differing disease trajectories, the service uses two broad service models: one for patients with malignant disease (intervention delivered over two weeks and one for patients with non-malignant disease (intervention delivered over four weeks. The Phase III trial therefore consists of two sub-protocols: one for patients with malignant conditions (four week protocol and one for patients with non-malignant conditions (eight week protocol. Mixed method interviews are conducted with patients and their lay carers at three to five measurement points depending on randomisation and sub-protocol. Qualitative interviews are conducted with referring and non-referring health care professionals (malignant disease protocol only. The primary outcome measure is 'patient distress due to breathlessness' measured on a numerical rating scale (0-10. The trial includes economic evaluation. Analysis will be on an intention to treat basis. Discussion This is the first evaluation of a breathlessness intervention for advanced disease to have followed the MRC framework and one of the first palliative care trials to use fast

  7. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  8. Preventing falls in older multifocal glasses wearers by providing single-lens distance glasses: the protocol for the VISIBLE randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Lee Bonsan B

    2009-03-01

    Full Text Available Abstract Background Recent research has shown that wearing multifocal glasses increases the risk of trips and falls in older people. The aim of this study is to determine whether the provision of single-lens distance glasses to older multifocal glasses wearers, with recommendations for wearing them for walking and outdoor activities, can prevent falls. We will also measure the effect of the intervention on health status, lifestyle activities and fear of falling, as well as the extent of adherence to the program. Methods/Design Approximately 580 older people who are regular wearers of multifocal glasses people will be recruited. Participants will be randomly allocated to either an intervention group (provision of single lens glasses, with counselling and advice about appropriate use or a control group (usual care. The primary outcome measure will be falls (measured with 13 monthly calendars. Secondary measures will be quality of life, falls efficacy, physical activity levels and adverse events. Discussions The study will determine the impact of providing single-lens glasses, with advice about appropriate use, on preventing falls in older regular wearers of multifocal glasses. This pragmatic intervention, if found to be effective, will guide practitioners with regard to recommending appropriate glasses for minimising the risk of falls in older people. Trial Registration The protocol for this study was registered with the Clinical Trials.gov Protocol Registration System on June 7th 2006 (#350855.

  9. Calculation of 3D genome structures for comparison of chromosome conformation capture experiments with microscopy: An evaluation of single-cell Hi-C protocols.

    Science.gov (United States)

    Lando, David; Stevens, Tim J; Basu, Srinjan; Laue, Ernest D

    2018-01-01

    Single-cell chromosome conformation capture approaches are revealing the extent of cell-to-cell variability in the organization and packaging of genomes. These single-cell methods, unlike their multi-cell counterparts, allow straightforward computation of realistic chromosome conformations that may be compared and combined with other, independent, techniques to study 3D structure. Here we discuss how single-cell Hi-C and subsequent 3D genome structure determination allows comparison with data from microscopy. We then carry out a systematic evaluation of recently published single-cell Hi-C datasets to establish a computational approach for the evaluation of single-cell Hi-C protocols. We show that the calculation of genome structures provides a useful tool for assessing the quality of single-cell Hi-C data because it requires a self-consistent network of interactions, relating to the underlying 3D conformation, with few errors, as well as sufficient longer-range cis- and trans-chromosomal contacts.

  10. Integration of GC-MSD and ER-Calux® assay into a single protocol for determining steroid estrogens in environmental samples.

    Science.gov (United States)

    Avberšek, Miha; Žegura, Bojana; Filipič, Metka; Heath, Ester

    2011-11-01

    There are many published studies that use either chemical or biological methods to investigate steroid estrogens in the aquatic environment, but rarer are those that combine both. In this study, gas chromatography with mass selective detection (GC-MSD) and the ER-Calux(®) estrogenicity assay were integrated into a single protocol for simultaneous determination of natural (estrone--E1, 17β-estradiol--E2, estriol--E3) and synthetic (17α-ethinylestradiol--EE2) steroid estrogens concentrations and the total estrogenic potential of environmental samples. For integration purposes, several solvents were investigated and the commonly used dimethyl sulphoxide (DMSO) in the ER-Calux(®) assay was replaced by ethyl acetate, which is more compatible with gas chromatography and enables the same sample to be analysed by both GC-MSD and the ER-Calux(®) assay. The integrated protocol was initially tested using a standard mixture of estrogens. The results for pure standards showed that the estrogenicity calculated on the basis of GC-MSD and the ER-Calux(®) assay exhibited good correlation (r(2)=0.96; α=0.94). The result remained the same when spiked waste water extracts were tested (r(2)=0.92, α=1.02). When applied to real waste water influent and effluent samples the results proved (r(2)=0.93; α=0.99) the applicability of the protocol. The main advantages of this newly developed protocol are simple sample handling for both methods, and reduced material consumption and labour. In addition, it can be applied as either a complete or sequential analysis where the ER-Calux(®) assay is used as a pre-screening method prior to the chemical analysis. Copyright © 2011 Elsevier B.V. All rights reserved.

  11. An operation protocol for facilitating start-up of single-stage autotrophic nitrogen removing reactors based on process stoichiometry

    DEFF Research Database (Denmark)

    Mutlu, A. Gizem; Vangsgaard, Anna Katrine; Sin, Gürkan

    2012-01-01

    Start-up and operation of single-stage nitritation/anammox reactor employing complete autotrophic nitrogen can be difficult. Keeping the performance criteria and monitoring the microbial community composition may not be easy or fast enough to take action on time. In this study, a control strategy...

  12. A combined static-dynamic single-dose imaging protocol to compare quantitative dynamic SPECT with static conventional SPECT.

    Science.gov (United States)

    Sciammarella, Maria; Shrestha, Uttam M; Seo, Youngho; Gullberg, Grant T; Botvinick, Elias H

    2017-08-03

    SPECT myocardial perfusion imaging (MPI) is a clinical mainstay that is typically performed with static imaging protocols and visually or semi-quantitatively assessed for perfusion defects based upon the relative intensity of myocardial regions. Dynamic cardiac SPECT presents a new imaging technique based on time-varying information of radiotracer distribution, which permits the evaluation of regional myocardial blood flow (MBF) and coronary flow reserve (CFR). In this work, a preliminary feasibility study was conducted in a small patient sample designed to implement a unique combined static-dynamic single-dose one-day visit imaging protocol to compare quantitative dynamic SPECT with static conventional SPECT for improving the diagnosis of coronary artery disease (CAD). Fifteen patients (11 males, four females, mean age 71 ± 9 years) were enrolled for a combined dynamic and static SPECT (Infinia Hawkeye 4, GE Healthcare) imaging protocol with a single dose of 99m Tc-tetrofosmin administered at rest and a single dose administered at stress in a one-day visit. Out of 15 patients, eleven had selective coronary angiography (SCA), 8 within 6 months and the rest within 24 months of SPECT imaging, without intervening symptoms or interventions. The extent and severity of perfusion defects in each myocardial region was graded visually. Dynamically acquired data were also used to estimate the MBF and CFR. Both visually graded images and estimated CFR were tested against SCA as a reference to evaluate the validity of the methods. Overall, conventional static SPECT was normal in ten patients and abnormal in five patients, dynamic SPECT was normal in 12 patients and abnormal in three patients, and CFR from dynamic SPECT was normal in nine patients and abnormal in six patients. Among those 11 patients with SCA, conventional SPECT was normal in 5, 3 with documented CAD on SCA with an overall accuracy of 64%, sensitivity of 40% and specificity of 83%. Dynamic SPECT image

  13. Comprehensive low-dose imaging of carotid and coronary arteries with a single-injection dual-source CT angiography protocol

    International Nuclear Information System (INIS)

    Tognolini, A.; Arellano, C.S.; Marfori, W.; Heidari, G.; Sayre, J.W.; Krishnam, M.S.; Ruehm, S.G.

    2014-01-01

    Aim: To assess the feasibility of a fast single-bolus combined carotid and coronary computed tomography angiography (CTA) protocol in asymptomatic patients. Materials and methods: Thirty-three consecutive patients (18 women and 15 men) with a median age of 61 ± 14 years old (range 37–87 years) with known or suspected atherosclerotic disease were enrolled in this prospective study. A single breath-hold, single biphasic injection protocol (50 ml at 3 ml/s, 50 ml at 5 ml/s, 50 ml saline flush at 5 ml/s) was used for combined CTA imaging of the supra-aortic (SAA) and coronary arteries (CA) on a 64-slice dual-source CT (DSCT) machine. Helical CTA acquisition of the SAA was followed by prospective electrocardiography (ECG)-triggered coronary CTA. Subjective (four-point scale) image quality and objective signal-to-noise (SNR) and contrast-to-noise (CNR) measurements were performed. Vascular disease was graded on a four-point scale (grade 1: absent; grade 2: mild, grade 3: moderate; grade 4: severe). The radiation dose was recorded for each patient. Results: The average enhancement and subjective quality score of SAA and CA segments were 396 HU/358 HU and 1.2 ± 0.3/1.72 ± 0.4, respectively. The SNR was 27.1 ± 1.7 in the SAA and 21.6 ± 1.6 in the CA (p < 0.0001). The CNR was 18.1 ± 1.2 and 15.9 ± 1.8, respectively (p = 0.4). Four percent of SAA and 14% of CA segments (mostly due to peri-venous streak artefacts and small calibre, respectively) produced non-diagnostic images. SAA findings were as follows: 26/33 (79%) patients showed no disease and 6/33 (18%) had grade 2 and 1/33 (3%) had grade 3 disease. CA findings were as follows: 25/33 (76%) showed no disease and 6/33 (18%) patients had grade 2 and 2/33 (6%) had grade 3 disease. Five patients had disease in both districts. The average radiation dose for the combined CTA angiogram was 4.3 ± 0.6 mSv. Conclusion: A fast, low-dose combined DSCT angiography protocol appears technically feasible for imaging carotid and

  14. Comprehensive low-dose imaging of carotid and coronary arteries with a single-injection dual-source CT angiography protocol.

    Science.gov (United States)

    Tognolini, A; Arellano, C S; Marfori, W; Heidari, G; Sayre, J W; Krishnam, M S; Ruehm, S G

    2014-03-01

    To assess the feasibility of a fast single-bolus combined carotid and coronary computed tomography angiography (CTA) protocol in asymptomatic patients. Thirty-three consecutive patients (18 women and 15 men) with a median age of 61 ± 14 years old (range 37-87 years) with known or suspected atherosclerotic disease were enrolled in this prospective study. A single breath-hold, single biphasic injection protocol (50 ml at 3 ml/s, 50 ml at 5 ml/s, 50 ml saline flush at 5 ml/s) was used for combined CTA imaging of the supra-aortic (SAA) and coronary arteries (CA) on a 64-slice dual-source CT (DSCT) machine. Helical CTA acquisition of the SAA was followed by prospective electrocardiography (ECG)-triggered coronary CTA. Subjective (four-point scale) image quality and objective signal-to-noise (SNR) and contrast-to-noise (CNR) measurements were performed. Vascular disease was graded on a four-point scale (grade 1: absent; grade 2: mild, grade 3: moderate; grade 4: severe). The radiation dose was recorded for each patient. The average enhancement and subjective quality score of SAA and CA segments were 396 HU/358 HU and 1.2 ± 0.3/1.72 ± 0.4, respectively. The SNR was 27.1 ± 1.7 in the SAA and 21.6 ± 1.6 in the CA (p grade 2 and 1/33 (3%) had grade 3 disease. CA findings were as follows: 25/33 (76%) showed no disease and 6/33 (18%) patients had grade 2 and 2/33 (6%) had grade 3 disease. Five patients had disease in both districts. The average radiation dose for the combined CTA angiogram was 4.3 ± 0.6 mSv. A fast, low-dose combined DSCT angiography protocol appears technically feasible for imaging carotid and coronary atherosclerotic disease. Copyright © 2013 The Royal College of Radiologists. Published by Elsevier Ltd. All rights reserved.

  15. Proposed Treatment Protocol for Frostbite: A Retrospective Analysis of 17 Cases Based on a 3-Year Single-Institution Experience

    Directory of Open Access Journals (Sweden)

    Eun-Kyung Woo

    2013-09-01

    Full Text Available Background This paper discusses the treatment protocol for patients with frostbite.Methods We performed a retrospective analysis of a series of 17 patients with second- andhigher-degree frostbite who had been treated at our medical institution between 2010 and2012.Results Our clinical series of patients (n=17 included 13 men and four women, whosemean age was 42.4±11.6 years (range, 22-67 years. The sites of injury include the foot in sixpatients (35.3%, the hand in six patients (35.3% and the facial region in five patients (29.4%.Seven patients with second-degree frostbite were completely cured with only conservativetreatment during a mean period of 12.7±3.3 days (range, 8-16 days. Of the five patients withthird-degree frostbite, two underwent skin grafting following debridement, and the remainingthree achieved a complete cure with conservative treatment during a mean period of 35±4.3days (range, 29-39 days. Five patients with fourth-degree frostbite were treated with surgicalprocedures including amputation.Conclusions With the appropriate conservative management in the early stage of onset,surgeons should decide on surgery after waiting for a sufficient period of time until thedemarcation of the wound. Continuous management of patients is also needed to achievefunctional recovery after a complete cure has been achieved. This should also be accompaniedby patient education for the avoidance of re-exposure to cold environments.

  16. Protocol for a single-centre, randomised controlled study of a preoperative rehabilitation bundle in the frail and elderly undergoing abdominal surgery.

    Science.gov (United States)

    Abdullah, Hairil Rizal; Lien, Victoria Peixin; Ong, Hwee Kuan; Er, Pei Ling; Hao, Ying; Khan, Shariq Ali; Liu, Christopher Weiyang

    2017-08-04

    Frail patients have decreased physiological reserves and consequently, they are unable to recover as quickly from surgery. Frailty, as an entity, is a risk factor of increased morbidity and mortality. It is also associated with a longer time to discharge. This trial is undertaken to determine if a novel prehabilitation protocol (10-day bundle of interventions-physiotherapy, nutritional supplementation and cognitive training) can reduce the postoperative length of stay of frail patients who are undergoing elective abdominal surgery, compared with standard care. This is a prospective, single-centre, randomised controlled trial with two parallel arms. 62 patients who are frail and undergoing elective abdominal surgery will be recruited and randomised to receive either a novel prehabilitation protocol or standard care. Participants will receive telephone reminders preoperatively to encourage protocol compliance. Data will be collected for up to 30 days postoperatively. The primary outcome of the trial will be the postoperative length of stay and the secondary outcomes are the postoperative complications and functional recovery during the hospital admission. This study has been approved by the Singapore General Hospital Institutional Review Board (CIRB Ref: 2016/2584). The study is also listed on ClinicalTrials.gov (Trial number: NCT02921932). All participants will sign an informed consent form before randomisation and translators will be made available to non-English speaking patients. The results of this study will be published in peer-reviewed journals as well as national and international conferences. The data collected will also be made available in a public data repository. NCT02921932 (ClinicalTrials.gov). © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  17. Proposed Treatment Protocol for Frostbite: A Retrospective Analysis of 17 Cases Based on a 3-Year Single-Institution Experience

    Directory of Open Access Journals (Sweden)

    Eun-Kyung Woo

    2013-09-01

    Full Text Available BackgroundThis paper discusses the treatment protocol for patients with frostbite.MethodsWe performed a retrospective analysis of a series of 17 patients with second- and higher-degree frostbite who had been treated at our medical institution between 2010 and 2012.ResultsOur clinical series of patients (n=17 included 13 men and four women, whose mean age was 42.4±11.6 years (range, 22-67 years. The sites of injury include the foot in six patients (35.3%, the hand in six patients (35.3% and the facial region in five patients (29.4%. Seven patients with second-degree frostbite were completely cured with only conservative treatment during a mean period of 12.7±3.3 days (range, 8-16 days. Of the five patients with third-degree frostbite, two underwent skin grafting following debridement, and the remaining three achieved a complete cure with conservative treatment during a mean period of 35±4.3 days (range, 29-39 days. Five patients with fourth-degree frostbite were treated with surgical procedures including amputation.ConclusionsWith the appropriate conservative management in the early stage of onset, surgeons should decide on surgery after waiting for a sufficient period of time until the demarcation of the wound. Continuous management of patients is also needed to achieve functional recovery after a complete cure has been achieved. This should also be accompanied by patient education for the avoidance of re-exposure to cold environments.

  18. The effectiveness of a single-stage versus traditional three-staged protocol of hospital disinfection at eradicating vancomycin-resistant Enterococci from frequently touched surfaces.

    Science.gov (United States)

    Friedman, N Deborah; Walton, Aaron L; Boyd, Sarah; Tremonti, Christopher; Low, Jillian; Styles, Kaylene; Harris, Owen; Alfredson, David; Athan, Eugene

    2013-03-01

    Environmental contamination is a reservoir for vancomycin-resistant enterococcus (VRE) in hospitals. Environmental sampling of surfaces was undertaken anytime before disinfection and 1 hour after disinfection utilizing a sodium dichloroisocyanurate-based, 3-staged protocol (phase 1) or benzalkonium chloride-based, single-stage clean (phase 2). VRE colonization and infection rates are presented from 2010 to 2011, and audits of cleaning completeness were also analyzed. Environmental samples collected before disinfection were significantly more likely to be contaminated with VRE during phase 1 than phase 2: 25.2% versus 4.6%, respectively; odds ratio (OR), 7.01 (P benzalkonium chloride-based product for disinfection. This reduction in VRE may be due to a new disinfection product, more attention to the thoroughness of cleaning, or other supplementary efforts in our institution. Copyright © 2013 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Mosby, Inc. All rights reserved.

  19. A simple and effective protocol for fast isolation of human Tenon's fibroblasts from a single trabeculectomy biopsy - a comparison of cell behaviour in different culture media.

    Science.gov (United States)

    Przekora, Agata; Zarnowski, Tomasz; Ginalska, Grazyna

    2017-01-01

    Human Tenon's fibroblasts (HTFs) play a crucial role in wound healing. They cause postoperative scarring of the filtering bleb and are thus responsible for trabeculectomy failure. This study aimed to find an effective and fast protocol for HTF isolation from trabeculectomy biopsies. The protocol was compared with the commonly recommended HTF isolation procedure, which uses Dulbecco's modified Eagle's medium (DMEM). We used Eagle's minimum essential medium (EMEM) enriched with fibroblast growth factor (FGF), which selectively promoted the proliferation of HTF cells. A secondary goal was to compare HTF morphology, metabolism and growth during parallel cultivation of the isolated cells in FGF-enriched EMEM and DMEM. Standard procedures for HTF isolation from tissue biopsies require a 20- to 30-day culture of the explants to obtain the first monolayer. Our protocol yielded the first monolayer after approx. 15 days. More importantly, the majority of the cells were fibroblasts with only individual epithelium-derived cells present. Using FGF-enriched EMEM allowed 1.3 × 10 6 vimentin-positive fibroblasts to be obtained from a single biopsy within approx. 25 days. Using DMEM resulted in isolation failure and required exchange to FGF-enriched medium to recover the fibroblast culture. HTFs maintained in FGF-enriched EMEM also showed faster proliferation and a different type I collagen production ability compared to HTFs cultured in DMEM. Thus, FGF-enriched EMEM is recommended for fast propagation of HTFs unless the aim of the study is to assess the effect of a tested agent on proliferation ability or type I collagen production. Our fast protocol for HTF isolation allows easy setup of cell banks by researchers under laboratory conditions and could be very useful during testing of novel ophthalmologic anti-fibrotic agents in vitro. Molecular analysis of HTFs isolated from patients with known treatment histories may provide valuable information on the effects of some

  20. Low-dose single acquisition rest {sup 99m}Tc/stress {sup 201}Tl myocardial perfusion SPECT protocol: phantom studies and clinical validation

    Energy Technology Data Exchange (ETDEWEB)

    Dey, Thomas [RWTH Aachen University, Institute of Imaging and Computer Vision, Aachen (Germany); Backus, Barbra E.; Romijn, R.Leo [St. Antonius Hospital, Department of Nuclear Medicine, Nieuwegein (Netherlands); Wieczorek, Herfried [Philips Research, Eindhoven (Netherlands); Verzijlbergen, J.F. [St. Antonius Hospital, Department of Nuclear Medicine, Nieuwegein (Netherlands); Erasmus Medical Center, Department of Nuclear Medicine, Rotterdam (Netherlands)

    2014-03-15

    We developed and tested a single acquisition rest {sup 99m}Tc-sestamibi/stress {sup 201}Tl dual isotope protocol (SDI) with the intention of improving the clinical workflow and patient comfort of myocardial perfusion single photon emission computed tomography (SPECT). The technical feasibility of SDI was evaluated by a series of anthropomorphic phantom studies on a standard SPECT camera. The attenuation map was created by a moving transmission line source. Iterative reconstruction including attenuation correction, resolution recovery and Monte Carlo simulation of scatter was used for simultaneous reconstruction of dual tracer distribution. For clinical evaluation, patient studies were compared to stress {sup 99m}Tc and rest {sup 99m}Tc reference images acquired in a 2-day protocol. Clinical follow-up examinations like coronary angiography (CAG) and fractional flow reserve (FFR) were included in the assessment if available. Phantom studies demonstrated the technical feasibility of SDI. Artificial lesions inserted in the phantom mimicking ischaemia could be clearly identified. In 51/53 patients, the image quality was adequate for clinical evaluation. For the remaining two obese patients with body mass index > 32 the injected {sup 201}Tl dose of 74 MBq was insufficient for clinical assessment. In answer to this the {sup 201}Tl dose was adapted for obese patients in the rest of the study. In 31 patients, SDI and {sup 99m}Tc reference images resulted in equivalent clinical assessment. Significant differences were found in 20 patients. In 18 of these 20 patients additional examinations were available. In 15 patients the diagnosis based on the SDI images was confirmed by the results of CAG or FFR. In these patients the SDI images were more accurate than the {sup 99m}Tc reference study. In three patients minor ischaemic lesions were detected by SDI but were not confirmed by CAG. In one of these cases this was probably caused by pronounced apical thinning. For two patients

  1. Low-dose single acquisition rest 99mTc/stress 201Tl myocardial perfusion SPECT protocol: phantom studies and clinical validation

    International Nuclear Information System (INIS)

    Dey, Thomas; Backus, Barbra E.; Romijn, R.Leo; Wieczorek, Herfried; Verzijlbergen, J.F.

    2014-01-01

    We developed and tested a single acquisition rest 99m Tc-sestamibi/stress 201 Tl dual isotope protocol (SDI) with the intention of improving the clinical workflow and patient comfort of myocardial perfusion single photon emission computed tomography (SPECT). The technical feasibility of SDI was evaluated by a series of anthropomorphic phantom studies on a standard SPECT camera. The attenuation map was created by a moving transmission line source. Iterative reconstruction including attenuation correction, resolution recovery and Monte Carlo simulation of scatter was used for simultaneous reconstruction of dual tracer distribution. For clinical evaluation, patient studies were compared to stress 99m Tc and rest 99m Tc reference images acquired in a 2-day protocol. Clinical follow-up examinations like coronary angiography (CAG) and fractional flow reserve (FFR) were included in the assessment if available. Phantom studies demonstrated the technical feasibility of SDI. Artificial lesions inserted in the phantom mimicking ischaemia could be clearly identified. In 51/53 patients, the image quality was adequate for clinical evaluation. For the remaining two obese patients with body mass index > 32 the injected 201 Tl dose of 74 MBq was insufficient for clinical assessment. In answer to this the 201 Tl dose was adapted for obese patients in the rest of the study. In 31 patients, SDI and 99m Tc reference images resulted in equivalent clinical assessment. Significant differences were found in 20 patients. In 18 of these 20 patients additional examinations were available. In 15 patients the diagnosis based on the SDI images was confirmed by the results of CAG or FFR. In these patients the SDI images were more accurate than the 99m Tc reference study. In three patients minor ischaemic lesions were detected by SDI but were not confirmed by CAG. In one of these cases this was probably caused by pronounced apical thinning. For two patients no relevant clinical follow

  2. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  3. Preoperative Single-Fraction Partial Breast Radiation Therapy: A Novel Phase 1, Dose-Escalation Protocol With Radiation Response Biomarkers

    International Nuclear Information System (INIS)

    Horton, Janet K.; Blitzblau, Rachel C.; Yoo, Sua; Geradts, Joseph; Chang, Zheng; Baker, Jay A.; Georgiade, Gregory S.; Chen, Wei; Siamakpour-Reihani, Sharareh; Wang, Chunhao; Broadwater, Gloria; Groth, Jeff; Palta, Manisha; Dewhirst, Mark; Barry, William T.; Duffy, Eileen A.

    2015-01-01

    Purpose: Women with biologically favorable early-stage breast cancer are increasingly treated with accelerated partial breast radiation (PBI). However, treatment-related morbidities have been linked to the large postoperative treatment volumes required for external beam PBI. Relative to external beam delivery, alternative PBI techniques require equipment that is not universally available. To address these issues, we designed a phase 1 trial utilizing widely available technology to 1) evaluate the safety of a single radiation treatment delivered preoperatively to the small-volume, intact breast tumor and 2) identify imaging and genomic markers of radiation response. Methods and Materials: Women aged ≥55 years with clinically node-negative, estrogen receptor–positive, and/or progesterone receptor–positive HER2−, T1 invasive carcinomas, or low- to intermediate-grade in situ disease ≤2 cm were enrolled (n=32). Intensity modulated radiation therapy was used to deliver 15 Gy (n=8), 18 Gy (n=8), or 21 Gy (n=16) to the tumor with a 1.5-cm margin. Lumpectomy was performed within 10 days. Paired pre- and postradiation magnetic resonance images and patient tumor samples were analyzed. Results: No dose-limiting toxicity was observed. At a median follow-up of 23 months, there have been no recurrences. Physician-rated cosmetic outcomes were good/excellent, and chronic toxicities were grade 1 to 2 (fibrosis, hyperpigmentation) in patients receiving preoperative radiation only. Evidence of dose-dependent changes in vascular permeability, cell density, and expression of genes regulating immunity and cell death were seen in response to radiation. Conclusions: Preoperative single-dose radiation therapy to intact breast tumors is well tolerated. Radiation response is marked by early indicators of cell death in this biologically favorable patient cohort. This study represents a first step toward a novel partial breast radiation approach. Preoperative radiation should

  4. Preoperative Single-Fraction Partial Breast Radiation Therapy: A Novel Phase 1, Dose-Escalation Protocol With Radiation Response Biomarkers

    Energy Technology Data Exchange (ETDEWEB)

    Horton, Janet K., E-mail: janet.horton@duke.edu [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); Blitzblau, Rachel C.; Yoo, Sua [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); Geradts, Joseph [Department of Pathology, Duke University Medical Center, Durham, North Carolina (United States); Chang, Zheng [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); Baker, Jay A. [Department of Radiology, Duke University Medical Center, Durham, North Carolina (United States); Georgiade, Gregory S. [Department of Surgery, Duke University Medical Center, Durham, North Carolina (United States); Chen, Wei [Department of Bioinformatics: Duke Cancer Institute, Duke University Medical Center, Durham, North Carolina (United States); Siamakpour-Reihani, Sharareh; Wang, Chunhao [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); Broadwater, Gloria [Department of Biostatistics: Duke Cancer Institute, Duke University Medical Center, Durham, North Carolina (United States); Groth, Jeff [Department of Pathology, Duke University Medical Center, Durham, North Carolina (United States); Palta, Manisha; Dewhirst, Mark [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); Barry, William T. [Department of Biostatistics and Bioinformatics, Duke University Medical Center, Durham, North Carolina (United States); Biostatistics and Computational Biology, Dana-Farber Cancer Institute, Boston, Massachusetts (United States); Duffy, Eileen A. [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); and others

    2015-07-15

    Purpose: Women with biologically favorable early-stage breast cancer are increasingly treated with accelerated partial breast radiation (PBI). However, treatment-related morbidities have been linked to the large postoperative treatment volumes required for external beam PBI. Relative to external beam delivery, alternative PBI techniques require equipment that is not universally available. To address these issues, we designed a phase 1 trial utilizing widely available technology to 1) evaluate the safety of a single radiation treatment delivered preoperatively to the small-volume, intact breast tumor and 2) identify imaging and genomic markers of radiation response. Methods and Materials: Women aged ≥55 years with clinically node-negative, estrogen receptor–positive, and/or progesterone receptor–positive HER2−, T1 invasive carcinomas, or low- to intermediate-grade in situ disease ≤2 cm were enrolled (n=32). Intensity modulated radiation therapy was used to deliver 15 Gy (n=8), 18 Gy (n=8), or 21 Gy (n=16) to the tumor with a 1.5-cm margin. Lumpectomy was performed within 10 days. Paired pre- and postradiation magnetic resonance images and patient tumor samples were analyzed. Results: No dose-limiting toxicity was observed. At a median follow-up of 23 months, there have been no recurrences. Physician-rated cosmetic outcomes were good/excellent, and chronic toxicities were grade 1 to 2 (fibrosis, hyperpigmentation) in patients receiving preoperative radiation only. Evidence of dose-dependent changes in vascular permeability, cell density, and expression of genes regulating immunity and cell death were seen in response to radiation. Conclusions: Preoperative single-dose radiation therapy to intact breast tumors is well tolerated. Radiation response is marked by early indicators of cell death in this biologically favorable patient cohort. This study represents a first step toward a novel partial breast radiation approach. Preoperative radiation should

  5. A clinical protocol for predicting outcomes with an implantable prosthetic device (Baha) in patients with single-sided deafness.

    Science.gov (United States)

    Snapp, Hillary A; Fabry, David A; Telischi, Fred F; Arheart, Kristopher L; Angeli, Simon I

    2010-01-01

    The Baha implant is increasingly becoming a common form of treatment for individuals with single-sided deafness (SSD). However, evidence-based guidelines for determining candidacy in these patients are not yet established. The purpose of this study was to investigate the clinical utility of speech-in-noise testing as a part of the preoperative evaluation of the Baha device in patients with SSD. The study design was a prospective cohort of 24 English-speaking adults comparing preoperative results on speech-in-noise measures using the Baha Cordelle II headband stimulator to postoperative results using the patient's external Baha processor. Outcome measures included signal-to-noise ratio (SNR) loss as measured by the QuickSIN™ and scores of self-reported disability questionnaires. Wilcoxon signed-rank test resulted in no significant difference between the preoperative and postoperative methods for measuring benefit on listening in noise tasks. Passing Bablok regression analysis showed the preoperative and postoperative results to be statistically equivalent, which suggests that postoperative results can be predicted during preoperative testing. Wilcoxon signed-rank test showed significant improvements in self-reported disability postoperatively. The results support the use of speech-in-noise measures as an accurate predictor of overall benefit in patients with SSD prior to implantation. American Academy of Audiology.

  6. Optimization of Single- and Dual-Color Immunofluorescence Protocols for Formalin-Fixed, Paraffin-Embedded Archival Tissues.

    Science.gov (United States)

    Kajimura, Junko; Ito, Reiko; Manley, Nancy R; Hale, Laura P

    2016-02-01

    Performance of immunofluorescence staining on archival formalin-fixed paraffin-embedded human tissues is generally not considered to be feasible, primarily due to problems with tissue quality and autofluorescence. We report the development and application of procedures that allowed for the study of a unique archive of thymus tissues derived from autopsies of individuals exposed to atomic bomb radiation in Hiroshima, Japan in 1945. Multiple independent treatments were used to minimize autofluorescence and maximize fluorescent antibody signals. Treatments with NH3/EtOH and Sudan Black B were particularly useful in decreasing autofluorescent moieties present in the tissue. Deconvolution microscopy was used to further enhance the signal-to-noise ratios. Together, these techniques provide high-quality single- and dual-color fluorescent images with low background and high contrast from paraffin blocks of thymus tissue that were prepared up to 60 years ago. The resulting high-quality images allow the application of a variety of image analyses to thymus tissues that previously were not accessible. Whereas the procedures presented remain to be tested for other tissue types and archival conditions, the approach described may facilitate greater utilization of older paraffin block archives for modern immunofluorescence studies. © 2016 The Histochemical Society.

  7. Using machine learning to speed up manual image annotation: application to a 3D imaging protocol for measuring single cell gene expression in the developing C. elegans embryo

    Directory of Open Access Journals (Sweden)

    Waterston Robert H

    2010-02-01

    Full Text Available Abstract Background Image analysis is an essential component in many biological experiments that study gene expression, cell cycle progression, and protein localization. A protocol for tracking the expression of individual C. elegans genes was developed that collects image samples of a developing embryo by 3-D time lapse microscopy. In this protocol, a program called StarryNite performs the automatic recognition of fluorescently labeled cells and traces their lineage. However, due to the amount of noise present in the data and due to the challenges introduced by increasing number of cells in later stages of development, this program is not error free. In the current version, the error correction (i.e., editing is performed manually using a graphical interface tool named AceTree, which is specifically developed for this task. For a single experiment, this manual annotation task takes several hours. Results In this paper, we reduce the time required to correct errors made by StarryNite. We target one of the most frequent error types (movements annotated as divisions and train a support vector machine (SVM classifier to decide whether a division call made by StarryNite is correct or not. We show, via cross-validation experiments on several benchmark data sets, that the SVM successfully identifies this type of error significantly. A new version of StarryNite that includes the trained SVM classifier is available at http://starrynite.sourceforge.net. Conclusions We demonstrate the utility of a machine learning approach to error annotation for StarryNite. In the process, we also provide some general methodologies for developing and validating a classifier with respect to a given pattern recognition task.

  8. Quantification of theobromine and caffeine in saliva, plasma and urine via liquid chromatography-tandem mass spectrometry: a single analytical protocol applicable to cocoa intervention studies.

    Science.gov (United States)

    Ptolemy, Adam S; Tzioumis, Emma; Thomke, Arjun; Rifai, Sami; Kellogg, Mark

    2010-02-01

    Targeted analyses of clinically relevant metabolites in human biofluids often require extensive sample preparation (e.g., desalting, protein removal and/or preconcentration) prior to quantitation. In this report, a single ultra-centrifugation based sample pretreatment combined with a designed liquid chromatography-tandem mass spectrometry (LC-MS/MS) protocol provides selective quantification of 3,7-dimethylxanthine (theobromine) and 1,3,7-trimethylxanthine (caffeine) in human saliva, plasma and urine samples. The optimized chromatography permitted elution of both analytes within 1.3 min of the applied gradient. Positive-mode electrospray ionization and a triple quadruple MS/MS instrument operated in multiple reaction mode were used for detection. (13)C(3) isotopically labeled caffeine was included as an internal standard to improve accuracy and precision. Implementing a 20-fold dilution of the isolated low MW biofluid fraction prior to injection effectively minimized the deleterious contributions of all three matrices to quantitation. The assay was linear over a 160-fold concentration range from 2.5 to 400 micromol L(-1) for both theobromine (average R(2) 0.9968) and caffeine (average R(2) 0.9997) respectively. Analyte peak area variations for 2.5 micromol L(-1) caffeine and theobromine in saliva, plasma and urine ranged from 5 and 10% (intra-day, N=10) to 9 and 13% (inter-day, N=25) respectively. The intra- and inter-day precision of theobromine and caffeine elution times were 3 and theobromine ranged from 114 to 118% and 99 to 105% at concentration levels of 10 and 300 micromol L(-1). This validated protocol also permitted the relative saliva, plasma and urine distribution of both theobromine and caffeine to be quantified following a cocoa intervention. 2009 Elsevier B.V. All rights reserved.

  9. Randomized comparison of the clinical outcome of single versus multiple arterial grafts: the ROMA trial-rationale and study protocol.

    Science.gov (United States)

    Gaudino, Mario; Alexander, John H; Bakaeen, Faisal G; Ballman, Karla; Barili, Fabio; Calafiore, Antonio Maria; Davierwala, Piroze; Goldman, Steven; Kappetein, Peter; Lorusso, Roberto; Mylotte, Darren; Pagano, Domenico; Ruel, Marc; Schwann, Thomas; Suma, Hisayoshi; Taggart, David P; Tranbaugh, Robert F; Fremes, Stephen

    2017-12-01

    The primary hypothesis of the ROMA trial is that in patients undergoing primary isolated non-emergent coronary artery bypass grafting, the use of 2 or more arterial grafts compared with a single arterial graft (SAG) is associated with a reduction in the composite outcome of death from any cause, any stroke, post-discharge myocardial infarction and/or repeat revascularization. The secondary hypothesis is that in these patients, the use of 2 or more arterial grafts compared with a SAG is associated with improved survival. The ROMA trial is a prospective, unblinded, randomized event-driven multicentre trial comprising at least 4300 subjects. Patients younger than 70 years with left main and/or multivessel disease will be randomized to a SAG or multiple arterial grafts to the left coronary system in a 1:1 fashion. Permuted block randomization stratified by the centre and the type of second arterial graft will be used. The primary outcome will be a composite of death from any cause, any stroke, post-discharge myocardial infarction and/or repeat revascularization. The secondary outcome will be all-cause mortality. The primary safety outcome will be a composite of death from any cause, any stroke and any myocardial infarction. In all patients, 1 internal thoracic artery will be anastomosed to the left anterior descending coronary artery. For patients randomized to the SAG group, saphenous vein grafts will be used for all non-left anterior descending target vessels. For patients randomized to the multiple arterial graft group, the main target vessel of the lateral wall will be grafted with either a radial artery or a second internal thoracic artery. Additional grafts for the multiple arterial graft group can be saphenous veins or supplemental arterial conduits. To detect a 20% relative reduction in the primary outcome, with 90% power at 5% alpha and assuming a time-to-event analysis, the sample size must include 845 events (and 3650 patients). To detect a 20% relative

  10. Retrospective analysis of 56 edentulous dental arches restored with 344 single-stage implants using an immediate loading fixed provisional protocol: statistical predictors of implant failure.

    Science.gov (United States)

    Kinsel, Richard P; Liss, Mindy

    2007-01-01

    The purpose of this retrospective study was to evaluate the effects of implant dimensions, surface treatment, location in the dental arch, numbers of supporting implant abutments, surgical technique, and generally recognized risk factors on the survival of a series of single-stage Straumann dental implants placed into edentulous arches using an immediate loading protocol. Each patient received between 4 and 18 implants in one or both dental arches. Periapical radiographs were obtained over a 2- to 10-year follow-up period to evaluate crestal bone loss following insertion of the definitive metal-ceramic fixed prostheses. Univariate tests for failure rates as a function of age ( or = 60 years), gender, smoking, bone grafting, dental arch, surface type, anterior versus posterior, number of implants per arch, and surgical technique were made using Fisher exact tests. The Cochran-Armitage test for trend was used to evaluate the presence of a linear trend in failure rates regarding implant length and implant diameter. Logistic regression modeling was used to determine which, if any, of the aforementioned factors would predict patient and implant failure. A significance criterion of P = .05 was utilized. Data were collected for 344 single-stage implants placed into 56 edentulous arches (39 maxillae and 17 mandibles) of 43 patients and immediately loaded with a 1-piece provisional fixed prosthesis. A total of 16 implants failed to successfully integrate, for a survival rate of 95.3%. Increased rates of failure were associated with reduced implant length, placement in the posterior region of the jaw, increased implant diameter, and surface treatment. Implant length emerged as the sole significant predictor of implant failure. In this retrospective analysis of 56 consecutively treated edentulous arches with multiple single-stage dental implants loaded immediately, reduced implant length was the sole significant predictor of failure.

  11. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  12. Supportive text messages for patients with alcohol use disorder and a comorbid depression: a protocol for a single-blind randomised controlled aftercare trial.

    Science.gov (United States)

    Hartnett, Dan; Murphy, Edel; Kehoe, Elizabeth; Agyapong, Vincent; McLoughlin, Declan M; Farren, Conor

    2017-05-29

    Alcohol use disorders (AUDs) and mood disorders commonly co-occur, and are associated with a range of negative outcomes for patients. Mobile phone technology has the potential to provide personalised support for such patients and potentially improve outcomes in this difficult-to-treat cohort. The aim of this study is to examine whether receiving supporting SMS text messages, following discharge from an inpatient dual diagnosis treatment programme, has a positive impact on mood and alcohol abstinence in patients with an AUD and a comorbid mood disorder. The present study is a single-blind randomised controlled trial. Patients aged 18-70 years who meet the criteria for both alcohol dependency syndrome/alcohol abuse and either major depressive disorder or bipolar disorder according to the Structured Clinical Interview for Diagnostic and Statistical Manual of Mental Disorders IV Axis I will be randomised to receive twice-daily supportive SMS text messages for 6 months plus treatment as usual, or treatment as usual alone, and will be followed-up at 3, 6, 9 and 12 months postdischarge. Primary outcome measures will include changes from baseline in cumulative abstinence duration, which will be expressed as the proportion of days abstinent from alcohol in the preceding 90 days, and changes from baseline in Beck Depression Inventory scores. The trial has received full ethical approval from the St. Patrick's Hospital Research Ethics Committee (protocol 13/14). Results of the trial will be disseminated through peer-reviewed journal articles and at academic conferences. NCT02404662; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  13. Implementation of a management protocol for massive bleeding reduces mortality in non-trauma patients: Results from a single centre audit.

    Science.gov (United States)

    Martínez-Calle, N; Hidalgo, F; Alfonso, A; Muñoz, M; Hernández, M; Lecumberri, R; Páramo, J A

    2016-12-01

    To audit the impact upon mortality of a massive bleeding management protocol (MBP) implemented in our center since 2007. A retrospective, single-center study was carried out. Patients transfused after MBP implementation (2007-2012, Group 2) were compared with a historical cohort (2005-2006, Group 1). Massive bleeding is associated to high mortality rates. Available MBPs are designed for trauma patients, whereas specific recommendations in the medical/surgical settings are scarce. After excluding patients who died shortly (<6h) after MBP activation (n=20), a total of 304 were included in the data analysis (68% males, 87% surgical). Our MBP featured goal-directed transfusion with early use of adjuvant hemostatic medications. Primary endpoints were 24-h and 30-day mortality. Fresh frozen plasma-to-red blood cells (FFP:RBC) and platelet-to-RBC (PLT:RBC) transfusion ratios, time to first FFP unit and the proactive MBP triggering rate were secondary endpoints. After MBP implementation (Group 2; n=222), RBC use remained stable, whereas FFP and hemostatic agents increased, when compared with Group 1 (n=82). Increased FFP:RBC ratio (p=0.053) and earlier administration of FFP (p=0.001) were also observed, especially with proactive MBP triggering. Group 2 patients presented lower rates of 24-h (0.5% vs. 7.3%; p=0.002) and 30-day mortality (15.9% vs. 30.2%; p=0.018) - the greatest reduction corresponding to non-surgical patients. Logistic regression showed an independent protective effect of MBP implementation upon 30-day mortality (OR=0.3; 95% CI 0.15-0.61). These data suggest that the implementation of a goal-directed MBP for prompt and aggressive management of non-trauma, massive bleeding patients is associated to reduced 24-h and 30-day mortality rates. Copyright © 2016 Elsevier España, S.L.U. y SEMICYUC. All rights reserved.

  14. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  15. The Dana Farber consortium protocol (DFCP) vs. classic Hyper-CVAD for treatment of acute lymphoblastic leukemia in patients <50 Y. Single institution experience.

    Science.gov (United States)

    Alabdulwahab, Amal S; Elsayed, Hussein G; Sherisher, Mohamed A; Zeeneldin, Ahmed; Alghamdi, Khalofa; Elbjeirami, Wafaa M

    2017-09-01

    The use of intensive pediatric protocols for the treatment of ALL is being extended to older adults. Analysis of the efficacy and toxicity results of pediatric DFCP vs. classic Hyper-CVAD protocol for the treatment of patients with ALL Hyper-CVAD for first line treatment of patients with ALL Hyper-CVAD protocol. CR rate was 90.7% for DFCP vs. 83.7 for Hyper-CVAD (p 0.7). 3 Y Leukemia free survival was 57.4% (70.9% for DFCP vs. 41.6% Hyper-CVAD P 0.1) while 3Y OS was 62.6%% for the whole group, 72.6% DFCP vs. 48.5% Hyper-CVAD, P 0.04. Those with age Hyper-CVAD related to gall stones. Osteonecrosis affected 5 patients on DFCP. pediatric protocols are feasible in patients younger than 50 Y and they are more active than classic adult protocols. Although modifications of adult protocols may improve their results, this had to be investigated in randomized controlled trials. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Viability testing and transplantation of marginal livers (VITTAL) using normothermic machine perfusion: study protocol for an open-label, non-randomised, prospective, single-arm trial.

    Science.gov (United States)

    Laing, Richard W; Mergental, Hynek; Yap, Christina; Kirkham, Amanda; Whilku, Manpreet; Barton, Darren; Curbishley, Stuart; Boteon, Yuri L; Neil, Desley A; Hübscher, Stefan G; Perera, M Thamara P R; Muiesan, Paolo; Isaac, John; Roberts, Keith J; Cilliers, Hentie; Afford, Simon C; Mirza, Darius F

    2017-11-28

    The use of marginal or extended criteria donor livers is increasing. These organs carry a greater risk of initial dysfunction and early failure, as well as inferior long-term outcomes. As such, many are rejected due to a perceived risk of use and use varies widely between centres. Ex situ normothermic machine perfusion of the liver (NMP-L) may enable the safe transplantation of organs that meet defined objective criteria denoting their high-risk status and are currently being declined for use by all the UK transplant centres. Viability testing and transplantation of marginal livers is an open-label, non-randomised, prospective, single-arm trial designed to determine whether currently unused donor livers can be salvaged and safely transplanted with equivalent outcomes in terms of patient survival. The procured rejected livers must meet predefined criteria that objectively denote their marginal condition. The liver is subjected to NMP-L following a period of static cold storage. Organs metabolising lactate to ≤2.5 mmol/L within 4 hours of the perfusion commencing in combination with two or more of the following parameters-bile production, metabolism of glucose, a hepatic arterial flow rate ≥150 mL/min and a portal venous flow rate ≥500 mL/min, a pH ≥7.30 and/or maintain a homogeneous perfusion-will be considered viable and transplanted into a suitable consented recipient. The coprimary outcome measures are the success rate of NMP-L to produce a transplantable organ and 90-day patient post-transplant survival. The protocol was approved by the National Research Ethics Service (London-Dulwich Research Ethics Committee, 16/LO/1056), the Medicines and Healthcare Products Regulatory Agency and is endorsed by the National Health Service Blood and Transplant Research, Innovation and Novel Technologies Advisory Group. The findings of this trial will be disseminated through national and international presentations and peer-reviewed publications. NCT02740608

  17. Comparative study of intravenous urographic bolus (I.U.B.) and intravenous urographic infusion (I.U.I.) in dogs; Estudio comparativo entre el urograma endovenoso en bolo y de infusión en perros

    Energy Technology Data Exchange (ETDEWEB)

    Thibaut L, Julio; Ditzel, G. [Universidad Austral de Chile, Valdivia (Chile); Vargas, L; Born, R; Deppe G, Rodolfo

    1996-07-01

    Two urographic methods were compared: the intravenous urographic bolus (i.u.b.) and the intravenous urographic infusion (i.u.i.). In both methods, two groups of seven healthy adult dogs of both sexes, weighing7.0 to 16.5 kg were used and were anaesthesized with 2% thiopentone sodium in doses of 20 mg/kg via cephalica. In the i.u.b., meglumine diatrizoate (Hypaque-M, 60%) was injected via saphena with a concentration of 282 mg of iodine per mi in doses of 564 mg of iodine per kg. In the i.u.i., meglumine diatrizoate was injected via saphena by drip infusion with a concentration of 200 mg of iodine per mi in doses of 500 mg of iodine per kg. Three series of two X-rays each were taken in ventrodorsal projection 1, 4 and 8 min and left lateral recumbency 30 sec after administering the contrast medium. The X-ray plates obtained were analyzed and compared intra and inter group considering the advance speed of the contrast medium, the radiographic density and outline, and kidney size. The advance speed of the contrast medium was higher in the i.u.i., reaching the kidney, ureter and bladder 1 min after administration in both projections; in ventrodorsal projections in the i.u.b. only the kidneys were reached while in the left lateral recumbency, the kidney and ureters were reached [Spanish] Con el fin de comparar el urograma endovenoso en bolo (u.e.b.) y el urograma endovenoso en infusion (u.e.i.), se trabajo con dos grupos de 7 perros adultos de ambos sexos, clinicamente sanos, con un peso de 7,0 a 16,5kg, anestesiados con tiopental sodico al 2% en dosis de 20 mg/kg via vena cefalica. En el u.e.b. se inyecto via vena safena diatrizoato de meglumina (Hypaque M, 60%) con una concentracion de 282mg de yodo por ml en dosis de 564mg de yodo por kg. En el u.e.i. se inyecto via fleboclisis diatrizoato de meglumina con una concentracion de 200mg de yodo por ml en dosis de 500mg de yodo por kg. Para cada perro se tomaron tres series de dos radiografias cada una, en proyeccion

  18. Standardized Duplex Ultrasound-Based Protocol for Early Diagnosis of Transplant Renal Artery Stenosis: Results of a Single-Institution Retrospective Cohort Study

    Directory of Open Access Journals (Sweden)

    Vincenzo Li Marzi

    2018-01-01

    Full Text Available Transplant renal artery stenosis (TRAS is the most frequent vascular complication after kidney transplantation (KT and has been associated with potentially reversible refractory hypertension, graft dysfunction, and reduced patient survival. The aim of the study is to describe the outcomes of a standardized Duplex Ultrasound- (DU- based screening protocol for early diagnosis of TRAS and for selection of patients potentially requiring endovascular intervention. We retrospectively reviewed our prospectively collected database of KT from January 1998 to select patients diagnosed with TRAS. The follow-up protocol was based on a risk-adapted, dynamic subdivision of eligible KT patients in different risk categories (RC with different protocol strategies (PS. Of 598 patients included in the study, 52 (9% patients had hemodynamically significant TRAS and underwent percutaneous angioplasty (PTA and stent placement. Technical and clinical success rates were 97% and 90%, respectively. 7 cases of restenosis were recorded at follow-up and treated with re-PTA plus stenting. Both DU imaging and clinical parameters improved after stent placement. Prospective high-quality studies are needed to test the efficacy and safety of our protocol in larger series. Accurate trial design and standardized reporting of patient outcomes will be key to address the current clinical needs.

  19. A Proof-of-Concept Clinical Trial of A Single Luteal Use of Long-Acting Gonadotropin-Releasing Hormone Antagonist Degarelix in Controlled Ovarian Stimulation for In Vitro Fertilization: Long Antagonist Protocol

    Directory of Open Access Journals (Sweden)

    Evangelos G. Papanikolaou

    2018-03-01

    Full Text Available IntroductionA drawback of gonadotropin-releasing hormone (GnRH antagonist protocols in in vitro fertilization (IVF is that they have limited flexibility in cycle programming. This proof of concept study explored the efficacy of a single-dose, long-acting GnRH antagonist IVF protocol. Trial registration number is NCT03240159, retrospectively registered on March 08, 2017.Materials and methodsThe efficacy of a single-dose long-acting antagonist, degarelix, was explored initially in healthy donors and subsequently in infertile patients. In the first part, five healthy oocyte donors underwent ovarian stimulation with this new protocol: in the late luteal phase, at day 24, a bolus injection of degarelix was administered subcutaneously to control the LH surge in the follicular phase. Ovarian stimulation with gonadotropins was initiated subsequently from day 7 to day 10. End points were first to inhibit the LH surge later in the follicular phase and, second, to retrieve mature oocytes for IVF. In the second part, five infertile women received the same bolus injection of degarelix administered during the luteal phase at day 24. Different gonadotropin starting days (day 2 through day 8 were tested in order to observe possible differences in ovarian stimulation. In these infertile patients, fresh embryo transfers were performed to assess the pregnancy efficacy of this protocol on pregnancy outcomes and to address any possible negative effects on endometrium receptivity.ResultsIn the first part of the study, all donors were effectively downregulated with a single luteal dose of 0.5 ml of degarelix for up to 22 days until the final oocyte maturation triggering day. Mature oocytes were retrieved after 36 h from all patients and all produced 2–7 blastocysts. In the second part, all five infertile patients achieved sufficient LH downregulation and completed ovarian stimulation without any LH surge. All patients (except one with freeze all strategy had

  20. Changes in co-contraction during stair descent after manual therapy protocol in knee osteoarthritis: A pilot, single-blind, randomized study.

    Science.gov (United States)

    Cruz-Montecinos, Carlos; Flores-Cartes, Rodrigo; Montt-Rodriguez, Agustín; Pozo, Esteban; Besoaín-Saldaña, Alvaro; Horment-Lara, Giselle

    2016-10-01

    Manual therapy has shown clinical results in patients with knee osteoarthritis. However, the biomechanical aspects during functional tasks have not been explored in depth. Through surface electromyography, the medial and lateral co-contractions of the knee were measured while descending stairs, prior and posterior to applying a manual therapy protocol in the knee, with emphasis on techniques of joint mobilization and soft-tissue management. Sixteen females with slight or moderate knee osteoarthritis were recruited (eight experimental, eight control). It was observed that the lateral co-contraction index of the experimental group, posterior to intervention, increased by 11.7% (p = 0.014). The application of a manual therapy protocol with emphasis on techniques of joint mobilization and soft-tissue management modified lateral co-contraction, which would have a protective effect on the joint. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Single-dose fosaprepitant for the prevention of chemotherapy-induced nausea and vomiting associated with cisplatin therapy: randomized, double-blind study protocol--EASE

    DEFF Research Database (Denmark)

    Grunberg, Steven; Chua, Daniel; Maru, Anish

    2011-01-01

    multiple-day NK1RA administration. Preliminary data suggested that single-dose aprepitant before chemotherapy could provide CINV protection throughout the overall risk phase (OP; 0 to 120 hours). This study compared a 3-day oral aprepitant schedule to a regimen containing a single dose of the intravenous...

  2. Reirradiation with alternating docetaxel-based chemotherapy for recurrent head and neck squamous cell carcinoma. Update of a single-center prospective phase II protocol

    International Nuclear Information System (INIS)

    Berger, Bernhard; Weinmann, Martin; Bamberg, Michael; Belka, Claus; Budach, Wilfried; Hehr, Thomas

    2010-01-01

    Purpose: to report follow-up data and results of a dose escalation within a prospective phase II protocol scheduling alternating chemoreirradiation for patients with unresectable locoregional recurrence of head and neck cancer after previous curative-intent radiotherapy. Patients and methods: chemoreirradiation was initially performed in 27 patients by 40.0 Gy split-course reirradiation (re-RT) alternating with three cycles of docetaxel 50 mg/m 2 day 1 and cisplatin 15 mg/m 2 days 2-5 (first cohort). From 2002 onward, 30 consecutively treated patients received a late-course concomitant boost to 49.6 Gy (second cohort). In July 2008, the survival outcome was analyzed separately for both cohorts and the entire collective (n = 57). Results: the Kaplan-Meier estimates for 1- and 2-year overall survival (OS) were 52% and 24%, respectively (median OS 13.4 months). The median time of locoregional control was 9.6 months, and the actuarial 2-year freedom from distant metastasis rate was 55%. The re-RT dose escalation led to a significant improvement of the median OS (17.4 vs. 9.4 months; p = 0.039). Irrespective of the cohort, severe treatment-related toxicities occurred in about one third of patients. Conclusion: the treatment results confirm the efficacy and the safety of escalated re-RT doses in this chemoreirradiation protocol. (orig.)

  3. A randomised controlled trial of intra-uterine insemination versus in vitro fertilisation in patients with idiopathic or mild male infertility.

    Science.gov (United States)

    Elzeiny, Hossam; Garrett, Claire; Toledo, Manuela; Stern, Kate; McBain, John; Baker, Hugh William Gordon

    2014-04-01

    The cause of infertility is unexplained or poorly explained in 30-40% of couples undergoing standard investigations, and treatment ranges from expectant management to IUI and IVF. The aim of this study was to compare the clinical pregnancy rates and costs of intra-uterine insemination (IUI) and in vitro fertilisation (IVF) in women where the same ovarian stimulation led to the development of two or three mature follicles. A randomised controlled clinical trial compared the efficacy of IUI and IVF in a tertiary fertility centre (ISRCTN28780587). Primary outcome measures were fetal heart positive pregnancy rate and cost per live birth. The selection criteria were age: females 18-42 years and males 18-60 years, infertility for one year or more, no IVF or IUI for 12 months prior to the trial, and no coital, tubal or ovulatory disorders, oligospermia, untreated endometriosis or contraindication for multiple pregnancy. All women (n = 102) had the same dose FSH stimulation protocol. Those who developed two or three preovulatory follicles were randomised 3:1 to IUI (n = 33) or IVF (n = 10). IUI or IVF was performed 36 h after hCG administration with single or double embryo transfer on day two. Clinical pregnancy rates (40% vs 12%, P = 0.04) and live birth rate (40% vs 6%, P = 0.01) were higher for IVF than IUI. The cost per live birth was AU$8735 for IVF compared with $42,487 for IUI. This study provides evidence that IVF is more successful and cost-effective than IUI using the same doses of FSH. Further confirmatory studies are required. © 2014 The Royal Australian and New Zealand College of Obstetricians and Gynaecologists.

  4. Retrospective dosimetry: Preliminary use of the single aliquot regeneration (SAR) protocol for the measurement of quartz dose in young house bricks

    DEFF Research Database (Denmark)

    Banerjee, D.; Bøtter-Jensen, L.; Murray, A.S.

    1999-01-01

    with the expected values based on their known age and confirms the absolute accuracy of the SAR method. It is concluded that a similar to 18 mGy fallout dose component can be detected on a background of similar to 100 mGy; this detection limit is controlled by uncertainties in the natural dose rare measurement......In retrospective dosimetry, the total dose absorbed by some pre-existing dosemeters, such as house bricks or tiles, is used to derive the dose to the population arising from a nuclear accident. This paper uses the newly developed SAR protocol to determine the total dose in young house bricks from...... the vicinity of the Chernobyl reactor site and from Roskilde, Denmark. For these samples, it is shown that high precision (similar to 1%) on the mean estimates of total dose can be achieved with similar to 20 independent measurements. The SAR total dose estimates of two Danish house bricks agree...

  5. The patient general satisfaction of mandibular single-implant overdentures and conventional complete dentures: Study protocol for a randomized crossover trial.

    Science.gov (United States)

    Kanazawa, Manabu; Tanoue, Mariko; Miyayasu, Anna; Takeshita, Shin; Sato, Daisuke; Asami, Mari; Lam, Thuy Vo; Thu, Khaing Myat; Oda, Ken; Komagamine, Yuriko; Minakuchi, Shunsuke; Feine, Jocelyne

    2018-05-01

    Mandibular overdentures retained by a single implant placed in the midline of edentulous mandible have been reported to be more comfortable and function better than complete dentures. Although single-implant overdentures are still more costly than conventional complete dentures, there are a few studies which investigated whether mandibular single-implant overdentures are superior to complete dentures when patient general satisfaction is compared. The aim of this study is to assess patient general satisfaction with mandibular single-implant overdentures and complete dentures. This study is a randomized crossover trial to compare mandibular single-implant overdentures and complete dentures in edentulous individuals. Participant recruitment is ongoing at the time of this submission. Twenty-two participants will be recruited. New mandibular complete dentures will be fabricated. A single implant will be placed in the midline of the edentulous mandible. The mucosal surface of the complete denture around the implant will be relieved for 3 months. The participants will then be randomly allocated into 2 groups according to the order of the interventions; group 1 will receive single-implant overdentures first and will wear them for 2 months, followed by complete dentures for 2 months. Group 2 will receive the same treatments in a reverse order. After experiencing the 2 interventions, the participants will choose one of the mandibular prostheses, and yearly follow-up visits are planned for 5 years. The primary outcome of this trial is patient ratings of general satisfaction on 100 mm visual analog scales. Assessments of the prostheses and oral health-related quality of life will also be recorded as patient-reported outcomes. The secondary outcomes are cost and time for treatment. Masticatory efficiency and cognitive capacity will also be recorded. Furthermore, qualitative research will be performed to investigate the factors associated with success of these mandibular

  6. Leprosy Post-Exposure Prophylaxis (LPEP) programme: Study protocol for evaluating the feasibility and impact on case detection rates of contact tracing and single dose rifampicin

    NARCIS (Netherlands)

    Barth-Jaeggi, T. (Tanja); Steinmann, P. (Peter); Mieras, L. (Liesbeth); W.H. van Brakel (Wim); J.H. Richardus (Jan Hendrik); Tiwari, A. (Anuj); Bratschi, M. (Martin); Cavaliero, A. (Arielle); Vander Plaetse, B. (Bart); Mirza, F. (Fareed); Aerts, A. (Ann)

    2016-01-01

    textabstractIntroduction: The reported number of new leprosy patients has barely changed in recent years. Thus, additional approaches or modifications to the current standard of passive case detection are needed to interrupt leprosy transmission. Large-scale clinical trials with single dose

  7. An operational protocol for facilitating start-up of single-stage autotrophic nitrogen-removing reactors based on process stoichiometry

    DEFF Research Database (Denmark)

    Mutlu, Ayten Gizem; Vangsgaard, Anna Katrine; Sin, Gürkan

    2013-01-01

    Start-up and operation of single-stage nitritation–anammox sequencing batch reactors (SBRs) for completely autotrophic nitrogen removal can be challenging and far from trivial. In this study, a step-wise procedure is developed based on stoichiometric analysis of the process performance from...

  8. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  9. Single-implant overdentures retained by the Novaloc attachment system: study protocol for a mixed-methods randomized cross-over trial.

    Science.gov (United States)

    de Souza, Raphael F; Bedos, Christophe; Esfandiari, Shahrokh; Makhoul, Nicholas M; Dagdeviren, Didem; Abi Nader, Samer; Jabbar, Areej A; Feine, Jocelyne S

    2018-04-23

    Overdentures retained by a single implant in the midline have arisen as a minimal implant treatment for edentulous mandibles. The success of this treatment depends on the performance of a single stud attachment that is susceptible to wear-related retention loss. Recently developed biomaterials used in attachments may result in better performance of the overdentures, offering minimal retention loss and greater patient satisfaction. These biomaterials include resistant polymeric matrixes and amorphous diamond-like carbon applied on metallic components. The objective of this explanatory mixed-methods study is to compare Novaloc, a novel attachment system with such characteristics, to a traditional alternative for single implants in the mandible of edentate elderly patients. We will carry out a randomized cross-over clinical trial comparing Novaloc attachments to Locators for single-implant mandibular overdentures in edentate elderly individuals. Participants will be followed for three months with each attachment type; patient-based, clinical, and economic outcomes will be gathered. A sample of 26 participants is estimated to be required to detect clinically relevant differences in terms of the primary outcome (patient ratings of general satisfaction). Participants will choose which attachment they wish to keep, then be interviewed about their experiences and preferences with a single implant prosthesis and with the two attachments. Data from the quantitative and qualitative assessments will be integrated through a mixed-methods explanatory strategy. A last quantitative assessment will take place after 12 months with the preferred attachment; this latter assessment will enable measurement of the attachments' long-term wear and maintenance requirements. Our results will lead to evidence-based recommendations regarding these systems, guiding providers and patients when making decisions on which attachment systems and implant numbers will be most appropriate for

  10. Efficacy of umbilical cord cleansing with a single application of 4% chlorhexidine for the prevention of newborn infections in Uganda: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Nankabirwa, Victoria; Tylleskär, Thorkild; Tumuhamye, Josephine; Tumwine, James K; Ndeezi, Grace; Martines, José C; Sommerfelt, Halvor

    2017-07-12

    Yearly, nearly all the estimated worldwide 2.7 million neonatal deaths occur in low- and middle-income countries. Infections, including those affecting the umbilical cord (omphalitis), are a significant factor in approximately a third of these deaths. In fact, the odds of all-cause mortality are 46% higher among neonates with omphalitis than in those without. Five large randomized controlled trials in Asia and Sub-Saharan Africa (SSA) have examined the effect of multiple cord stump applications with 4% chlorhexidine (CHX) for at least 7 days on the risk of omphalitis and neonatal death. These studies, all community-based, show that multiple CHX applications reduced the risk of omphalitis. Of these trials, only one study from South Asia (the Bangladeshi study) and none from Africa examined the effect of a single application of CHX as soon as possible after birth. In this Bangladeshi trial, CHX led to a reduction in the risk of mild-moderate omphalitis and neonatal death. It is important, in an African setting, to explore the effect of a single application among health-facility births. A single application is programmatically much simpler to implement than daily applications for 7 days. Therefore, our study compares umbilical cord cleansing with a single application of 4% CHX at birth with dry cord care among Ugandan babies born in health facilities, on the risk of omphalitis and severe neonatal illness. The CHX study is a facility-based, individually randomized controlled trial that will be conducted among 4760 newborns in Uganda. The primary outcomes are severe illness and omphalitis during the neonatal period. Analysis will be by intention-to-treat. This study will provide novel evidence, from a Sub-Saharan African setting, of the effect of umbilical cord cleansing with a single application of 4% CHX at birth and identify modifiable risk factors for omphalitis. ClinicalTrials.gov, identifier: NCT02606565 . Registered on 12 November 2015.

  11. Diagnosis of pulmonary artery embolism. Comparison of single-source CT and 3rd generation dual-source CT using a dual-energy protocol regarding image quality and radiation dose

    International Nuclear Information System (INIS)

    Petritsch, Bernhard; Kosmala, Aleksander; Gassenmeier, Tobias; Weng, Andreas Max; Veldhoen, Simon; Kunz, Andreas Steven; Bley, Thorsten Alexander

    2017-01-01

    To compare radiation dose, subjective and objective image quality of 3 rd generation dual-source CT (DSCT) and dual-energy CT (DECT) with conventional 64-slice single-source CT (SSCT) for pulmonary CTA. 180 pulmonary CTA studies were performed in three patient cohorts of 60 patients each. Group 1: conventional SSCT 120 kV (ref.); group 2: single-energy DSCT 100 kV (ref.); group 3: DECT 90/Sn150 kV. CTDIvol, DLP, effective radiation dose were reported, and CT attenuation (HU) was measured on three central and peripheral levels. The signal-to-noise-ratio (SNR) and contrast-to-noise-ratio (CNR) were calculated. Two readers assessed subjective image quality according to a five-point scale. Mean CTDIvol and DLP were significantly lower in the dual-energy group compared to the SSCT group (p < 0.001 [CTDIvol]; p < 0.001 [DLP]) and the DSCT group (p = 0.003 [CTDIvol]; p = 0.003 [DLP]), respectively. The effective dose in the DECT group was 2.79 ± 0.95 mSv and significantly smaller than in the SSCT group (4.60 ± 1.68 mSv, p < 0.001) and the DSCT group (4.24 ± 2.69 mSv, p = 0.003). The SNR and CNR were significantly higher in the DSCT group (p < 0.001). Subjective image quality did not differ significantly among the three protocols and was rated good to excellent in 75 % (135/180) of cases with an inter-observer agreement of 80 %. Dual-energy pulmonary CTA protocols of 3 rd generation dual-source scanners allow for significant reduction of radiation dose while providing excellent image quality and potential additional information by means of perfusion maps. Dual-energy CT with 90/Sn150 kV configuration allows for significant dose reduction in pulmonary CTA. Subjective image quality was similar among the three evaluated CT-protocols (64-slice SSCT, single-energy DSCT, 90/Sn150 kV DECT) and was rated good to excellent in 75% of cases. Dual-energy CT provides potential additional information by means of iodine distribution maps.

  12. Diagnosis of pulmonary artery embolism. Comparison of single-source CT and 3{sup rd} generation dual-source CT using a dual-energy protocol regarding image quality and radiation dose

    Energy Technology Data Exchange (ETDEWEB)

    Petritsch, Bernhard; Kosmala, Aleksander; Gassenmeier, Tobias; Weng, Andreas Max; Veldhoen, Simon; Kunz, Andreas Steven; Bley, Thorsten Alexander [Univ. Hospital Wuerzburg (Germany). Inst. of Diagnostic and Interventional Radiology

    2017-06-15

    To compare radiation dose, subjective and objective image quality of 3 rd generation dual-source CT (DSCT) and dual-energy CT (DECT) with conventional 64-slice single-source CT (SSCT) for pulmonary CTA. 180 pulmonary CTA studies were performed in three patient cohorts of 60 patients each. Group 1: conventional SSCT 120 kV (ref.); group 2: single-energy DSCT 100 kV (ref.); group 3: DECT 90/Sn150 kV. CTDIvol, DLP, effective radiation dose were reported, and CT attenuation (HU) was measured on three central and peripheral levels. The signal-to-noise-ratio (SNR) and contrast-to-noise-ratio (CNR) were calculated. Two readers assessed subjective image quality according to a five-point scale. Mean CTDIvol and DLP were significantly lower in the dual-energy group compared to the SSCT group (p < 0.001 [CTDIvol]; p < 0.001 [DLP]) and the DSCT group (p = 0.003 [CTDIvol]; p = 0.003 [DLP]), respectively. The effective dose in the DECT group was 2.79 ± 0.95 mSv and significantly smaller than in the SSCT group (4.60 ± 1.68 mSv, p < 0.001) and the DSCT group (4.24 ± 2.69 mSv, p = 0.003). The SNR and CNR were significantly higher in the DSCT group (p < 0.001). Subjective image quality did not differ significantly among the three protocols and was rated good to excellent in 75 % (135/180) of cases with an inter-observer agreement of 80 %. Dual-energy pulmonary CTA protocols of 3 rd generation dual-source scanners allow for significant reduction of radiation dose while providing excellent image quality and potential additional information by means of perfusion maps. Dual-energy CT with 90/Sn150 kV configuration allows for significant dose reduction in pulmonary CTA. Subjective image quality was similar among the three evaluated CT-protocols (64-slice SSCT, single-energy DSCT, 90/Sn150 kV DECT) and was rated good to excellent in 75% of cases. Dual-energy CT provides potential additional information by means of iodine distribution maps.

  13. Infections During Induction Therapy of Protocol CCLG-2008 in Childhood Acute Lymphoblastic Leukemia: A Single-center Experience with 256 Cases in China

    Directory of Open Access Journals (Sweden)

    Si-Dan Li

    2015-01-01

    Full Text Available Background: Infections remain a major cause of therapy-associated morbidity and mortality in children with acute lymphoblastic leukemia (ALL. Methods: We retrospectively analyzed the medical charts of 256 children treated for ALL under the CCLG-2008 protocol in Beijing Children′s Hospital. Results: There were 65 infectious complications in 50 patients during vincristine, daunorubicin, L-asparaginase and dexamethasone induction therapy, including microbiologically documented infections (n = 12; 18.5%, clinically documented infections (n = 23; 35.3% and fever of unknown origin (n = 30; 46.2%. Neutropenia was present in 83.1% of the infectious episodes. In all, most infections occurred around the 15 th day of induction treatment (n = 28, and no patients died of infection-associated complications. Conclusions: The infections in this study was independent of treatment response, minimal residual diseases at the end of induction therapy, gender, immunophenotype, infection at first visit, risk stratification at diagnosis, unfavorable karyotypes at diagnosis and morphologic type. The infection rate of CCLG-2008 induction therapy is low, and the outcome of patients is favorable.

  14. A study on pre-heat conditions in equivalent-dose estimation of holocene loess using single-aliquot regenerative-dose (SAR) protocol

    International Nuclear Information System (INIS)

    Jia Yaofeng; Huang Chunchang; Pang Jiangli; Lu Xinwei; Zhang Xu

    2007-01-01

    Through various arrangements of pre-heat and cut-heat temperatures in the equivalent-dose estimation of Holocene loess using a Double-SAR dating protocol, the paper estimated the equivalent-doses from several loess samples by application of IRSL and Post-IR OSL signals, respectively. The measured results present that the equivalent-dose depends on the heat temperature, especially depends on the cut-heat temperature, showing the equivalent-dose increases with the cut-heat temperature; a plateau of equivalent-dose appears at the 200-300 degree C preheat temperatures and the 200-240 degree C cut-heat temperatures, furthermore, the equivalent-doses estimated by IRSL and Post-IR OSL signals respectively are close to each other, which resulted from the similar sensitivity change directions of optical stimulated signals and their smaller change ranges in the measurement cycles using the various temperatures of pre-heat and cut-heat. This suggests that the 200-300 degree C pre-heat temperatures and the 200-240 degree C cut-heat temperatures are fit for dating young Holocene loess samples. (authors)

  15. Cranial CT with 64-, 16-, 4- and single-slice CT systems-comparison of image quality and posterior fossa artifacts in routine brain imaging with standard protocols

    Energy Technology Data Exchange (ETDEWEB)

    Ertl-Wagner, Birgit; Eftimov, Lara; Becker, Christoph; Reiser, Maximilian [University of Munich, Grosshadern (Germany). Institute of Clinical Radiology; Blume, Jeffrey; Cormack, Jean [Brown University, Center for Statistical Sciences, Providence, RI (United States); Bruening, Roland; Brueckmann, Hartmut [University of Munich, Grosshadern (Germany). Department of Neuroradiology

    2008-08-15

    Posterior fossa artifacts constitute a characteristic limitation of cranial CT. To identify practical benefits and drawbacks of newer CT systems with reduced collimation in routine cranial imaging, we aimed to investigate image quality, posterior fossa artifacts and parenchymal delineation in non-enhanced CT (NECT) with 1-, 4-, 16- and 64-slice scanners using standard scan protocols. We prospectively enrolled 25 consecutive patients undergoing NECT on a 64-slice CT. Three groups with 25 patients having undergone NECT on 1-, 4- and 16-slice CT machines were matched regarding age and sex. Standard routine CT parameters were used on each CT system with helical acquisition in the posterior fossa; the parameters varied regarding collimation and radiation dose. Three blinded readers independently assessed the cases regarding image quality, infra- and supratentorial artifacts and delineation of brain parenchymal structures on a five-point ordinal scale. Reading orders were randomized. A proportional odds model that accounted for the correlated nature of the data was fit using generalized estimating equations. Posterior fossa artifacts were significantly reduced, and the delineation of infratentorial brain structures was significantly improved with the thinner collimation used for the newer CT systems (p<0.001). No significant differences were observed for midbrain structures (p>0.5). The thinner collimation available on modern CT systems leads to reduced posterior fossa artifacts and to a better delineation of brain parenchyma in the posterior fossa. (orig.)

  16. The success of opening single chronic total occlusion lesions to improve myocardialviabilitytrial (SOS-COMEDY): Study protocol of a prospective multicenter study.

    Science.gov (United States)

    Huang, Rongchong; Song, Xiantao; Zhang, Haishan; Tian, Wen; Huang, Zheng; Zhang, Xingwei; Yang, Junqing; Zhang, Dongfeng; Wu, Jian; Zhong, Lei; Ting, Henry H

    2018-04-01

    Success of opening single (SOS)-comedy is a prospective multicenter study to compare the improvement in the decrease of myocardial viability by percutaneous coronary intervention (PCI) with that by optimal medical therapy (OMT) alone in patients with chronic total occlusion (CTO) of a single coronary artery. The risks and the benefits of both options (PCI and OMT) were listed in a CTO decision aid (DA). Eligible participants detected by invasive coronary angiography (ICA) or coronary computed tomography angiography (CCTA) were divided into PCI or OMT groups according to patients' choice after shared-decision making process with DA. Participants will undergo positron emission tomography/computed tomography (PET/CT), cardiac magnetic resonance (CMR) and transthoracic echocardiography (TTE), and proceed to ICA and revascularization if possible. Blinded core laboratory interpretation will be performed for ICA, CCTA, PET/CT, CMR, and TTE. All participants will be followed up for 12 months. The primary endpoint is the improvement to the decrease of myocardial viability from baseline assessed with the use of PET/CT after 12-month follow-up. All of the patients are appropriately consented before enrolling in this study, which has been approved by the Ethics Committee. Results of SOS-COMEDY will be helpful to develop a strategy for single CTO patients.

  17. Prenatal Detection of Congenital Heart Diseases: One-Year Survey Performing a Screening Protocol in a Single Reference Center in Brazil

    Directory of Open Access Journals (Sweden)

    Luciane Alves Rocha

    2014-01-01

    Full Text Available Objective. To describe the experience of a tertiary center in Brazil to which patients are referred whose fetuses are at increased risk for congenital heart diseases (CHDs. Methods. This was a cross-sectional observational study. The data was collected prospectively, during the year 2012, through a screening protocol of the fetal heart adapted from the International Society of Ultrasound in Obstetrics and Gynecology (ISUOG guideline. We performed a fetal echocardiogram screening for all pregnant women who were referred to the fetal cardiology outpatient obstetrics clinic of a university hospital. The exams were classified as normal or abnormal. The cases considered abnormal were undergone to a postnatal echocardiogram. We categorized the abnormal fetal heart according to severity in “complex,” “significant,” “minor,” and “others.” Results. We performed 271 fetal heart screening. The incidence of abnormal screenings was 9.96% (27 fetuses. The structural CHD when categorized due to severity showed 48.1% (n=13 of “complex” cases, 18.5% (n=5 “significant” cases, and 7.4% (n=2 “minor” cases. The most common referral reason was by maternal causes (67% followed by fetal causes (33%. The main referral indication was maternal metabolic disease (30%, but there was just one fetus with CHD in such cases (1.2%. CHDs were found in 19/29 fetuses with suspicion of some cardiac abnormality by obstetrician (65.5%. Conclusion. We observed a high rate of CHD in our population. We also found that there was higher incidence of complex cases.

  18. ATTIRE: Albumin To prevenT Infection in chronic liveR failurE: study protocol for a single-arm feasibility trial.

    Science.gov (United States)

    China, Louise; Muirhead, Nicola; Skene, Simon S; Shabir, Zainib; De Maeyer, Roel P H; Maini, Alexander A N; Gilroy, Derek W; O'Brien, Alastair J

    2016-01-25

    Circulating prostaglandin E2 levels are elevated in acutely decompensated cirrhosis and have been shown to contribute to immune suppression. Albumin binds and inactivates this hormone. Human albumin solution could thus be repurposed as an immune restorative drug in these patients.This feasibility study aims to determine whether it is possible and safe to restore serum albumin to >30 g/L and maintain it at this level in patients admitted with acute decompensated cirrhosis using repeated 20% human albumin infusions according to daily serum albumin levels. Albumin To prevenT Infection in chronic liveR failurE (ATTIRE) stage 1 is a multicentre, open label dose feasibility trial. Patients with acutely decompensated cirrhosis admitted to hospital with a serum albumin of albumin solution will be infused, according to serum albumin levels, for up to 14 days or discharge in all patients. The primary end point is daily serum albumin levels for the duration of the treatment period and the secondary end point is plasma-induced macrophage dysfunction. The trial will recruit 80 patients. Outcomes will be used to assist with study design for an 866 patient randomised controlled trial at more than 30 sites across the UK. Research ethics approval was given by the London-Brent research ethics committee (ref: 15/LO/0104). The clinical trials authorisation was issued by the medicines and healthcare products regulatory agency (ref: 20363/0350/001-0001). Will be disseminated through peer reviewed journals and international conferences. Recruitment of the first participant occurred on 26/05/2015. The trial is registered with the European Medicines Agency (EudraCT 2014-002300-24) and has been adopted by the NIHR (ISRCTN 14174793). This manuscript refers to V.4.0 of the protocol; Pre-results. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  19. Clinical outcomes from an innovative protocol using serial ultrasound imaging and a single MR image to guide brachytherapy for locally advanced cervix cancer.

    Science.gov (United States)

    van Dyk, Sylvia; Narayan, Kailash; Bernshaw, David; Kondalsamy-Chennakesavan, Srinivas; Khaw, Pearly; Lin, Ming Yin; Schneider, Michal

    The aim of this study was to report clinical outcomes in a series of patients who underwent serial ultrasound and a single MRI to plan and verify intracavitary brachytherapy. Data for patients who were referred for curative intent radiotherapy for International Federation of Gynecology and Obstetrics (FIGO) Stage 1-1V cervix cancer between January 2007 and March 2012 were analyzed. All patients received external beam radiotherapy with concurrent chemotherapy and sequential high-dose rate brachytherapy. Brachytherapy was planned and verified using serial ultrasound imaging and a single MRI. Data from 191 patients were available for analyses. The median (range) followup time was 5.08 (0.25-8.25) years. Five-year local control, failure-free survival, cancer-specific survival, and overall survival were 86%, 57.3%, 70% and 63%, respectively. Mean (standard deviation) combined external beam radiotherapy and brachytherapy target doses, equivalent to doses in 2 Gy fractions were 80.4 Gy10 (3.89), median (range) 80 (49-96) Gy10. Grade 3 or greater gastrointestinal, genitourinary, or vaginal late toxicity occurred in 3%, 1.6%, and 2% of patients, respectively. Survival, patterns of failure, and late complication rates were similar to published series of MRI/CT-based brachytherapy practices. This large study demonstrates that favorable treatment outcomes can be obtained using a pragmatic and innovative combination of ultrasound and MR imaging. Crown Copyright © 2016. Published by Elsevier Inc. All rights reserved.

  20. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  1. Study Protocol for a Randomized Double Blind, Treatment Control Trial Comparing the Efficacy of a Micronutrient Formula to a Single Vitamin Supplement in the Treatment of Premenstrual Syndrome.

    Science.gov (United States)

    Retallick-Brown, Hannah; Rucklidge, Julia; Blampied, Neville

    2016-12-07

    Background: The recent addition of Premenstrual Dysphoric Disorder (PMDD) to the Diagnostic and Statistical Manual (5th ed.) has highlighted the seriousness of this disorder. Many alternatives to psychoactive medication in the form of vitamins, minerals, and plant extracts have been trialled by women seeking a natural treatment approach. We plan to explore whether a well validated micronutrient formula, EMPowerplus Advanced, can outperform a recognized single nutrient treatment, vitamin B6, for the treatment of Premenstrual Syndrome (PMS). Methods: This will be a randomized treatment control study. Eighty women will be recruited and assigned to one of two treatment groups; EMPowerplus Advanced or vitamin B6. Baseline daily data will be collected for an initial two cycles, followed by three months of active treatment. A natural follow up will take place three cycles post treatment. Results: The primary outcome measure will be PMS change scores as based on results from the Daily Record of Severity of Problems (DRSP). The number of treatment responders for each of the two groups will yield a comparison score between the two treatments, with participants deemed as a responder if they show a total PMS score improvement of 50% from their baseline scores on the DRSP. Conclusion: If a micronutrient formula proves more effective for treating PMS, not only does it give women suffering from the condition a viable treatment option, but it may also suggest one cause of PMS; that is insufficient minerals and vitamins.

  2. Inorganic nitrate as a treatment for acute heart failure: a protocol for a single center, randomized, double-blind, placebo-controlled pilot and feasibility study.

    Science.gov (United States)

    Falls, Roman; Seman, Michael; Braat, Sabine; Sortino, Joshua; Allen, Jason D; Neil, Christopher J

    2017-08-08

    Acute heart failure (AHF) is a frequent reason for hospitalization worldwide and effective treatment options are limited. It is known that AHF is a condition characterized by impaired vasorelaxation, together with reduced nitric oxide (NO) bioavailability, an endogenous vasodilatory compound. Supplementation of inorganic sodium nitrate (NaNO 3 ) is an indirect dietary source of NO, through bioconversion. It is proposed that oral sodium nitrate will favorably affect levels of circulating NO precursors (nitrate and nitrite) in AHF patients, resulting in reduced systemic vascular resistance, without significant hypotension. We propose a single center, randomized, double-blind, placebo-controlled pilot trial, evaluating the feasibility of sodium nitrate as a treatment for AHF. The primary hypothesis that sodium nitrate treatment will result in increased systemic levels of nitric oxide pre-cursors (nitrate and nitrite) in plasma, in parallel with improved vasorelaxation, as assessed by non-invasively derived systemic vascular resistance index. Additional surrogate measures relevant to the known pathophysiology of AHF will be obtained in order to assess clinical effect on dyspnea and renal function. The results of this study will provide evidence of the feasibility of this novel approach and will be of interest to the heart failure community. This trial may inform a larger study.

  3. A single-blind randomised controlled trial of the effects of a web-based decision aid on self-testing for cholesterol and diabetes. study protocol

    Directory of Open Access Journals (Sweden)

    Ickenroth Martine HP

    2012-01-01

    Full Text Available Abstract Background Self-tests, tests on body materials to detect medical conditions, are widely available to the general public. Self-testing does have advantages as well as disadvantages, and the debate on whether self-testing should be encouraged or rather discouraged is still ongoing. One of the concerns is whether consumers have sufficient knowledge to perform the test and interpret the results. An online decision aid (DA with information on self-testing in general, and test specific information on cholesterol and diabetes self-testing was developed. The DA aims to provide objective information on these self-tests as well as a decision support tool to weigh the pros and cons of self-testing. The aim of this study is to evaluate the effect of the online decision aid on knowledge on self-testing, informed choice, ambivalence and psychosocial determinants. Methods/Design A single blind randomised controlled trial in which the online decision aid 'zelftestwijzer' is compared to short, non-interactive information on self-testing in general. The entire trial will be conducted online. Participants will be selected from an existing Internet panel. Consumers who are considering doing a cholesterol or diabetes self-test in the future will be included. Outcome measures will be assessed directly after participants have viewed either the DA or the control condition. Weblog files will be used to record participants' use of the decision aid. Discussion Self-testing does have important pros and cons, and it is important that consumers base their decision whether they want to do a self-test or not on knowledge and personal values. This study is the first to evaluate the effect of an online decision aid for self-testing. Trial registration Dutch Trial Register: NTR3149

  4. Single-session gamified virtual reality exposure therapy for spider phobia vs. traditional exposure therapy: study protocol for a randomized controlled non-inferiority trial.

    Science.gov (United States)

    Miloff, Alexander; Lindner, Philip; Hamilton, William; Reuterskiöld, Lena; Andersson, Gerhard; Carlbring, Per

    2016-02-02

    Traditional one-session exposure therapy (OST) in which a patient is gradually exposed to feared stimuli for up to 3 h in a one-session format has been found effective for the treatment of specific phobias. However, many individuals with specific phobia are reluctant to seek help, and access to care is lacking due to logistic challenges of accessing, collecting, storing, and/or maintaining stimuli. Virtual reality (VR) exposure therapy may improve upon existing techniques by facilitating access, decreasing cost, and increasing acceptability and effectiveness. The aim of this study is to compare traditional OST with in vivo spiders and a human therapist with a newly developed single-session gamified VR exposure therapy application with modern VR hardware, virtual spiders, and a virtual therapist. Participants with specific phobia to spiders (N = 100) will be recruited from the general public, screened, and randomized to either VR exposure therapy (n = 50) or traditional OST (n = 50). A behavioral approach test using in vivo spiders will serve as the primary outcome measure. Secondary outcome measures will include spider phobia questionnaires and self-reported anxiety, depression, and quality of life. Outcomes will be assessed using a non-inferiority design at baseline and at 1, 12, and 52 weeks after treatment. VR exposure therapy has previously been evaluated as a treatment for specific phobias, but there has been a lack of high-quality randomized controlled trials. A new generation of modern, consumer-ready VR devices is being released that are advancing existing technology and have the potential to improve clinical availability and treatment effectiveness. The VR medium is also particularly suitable for taking advantage of recent phobia treatment research emphasizing engagement and new learning, as opposed to physiological habituation. This study compares a market-ready, gamified VR spider phobia exposure application, delivered using consumer VR hardware, with

  5. The SyBil-AA real-time fMRI neurofeedback study: protocol of a single-blind randomized controlled trial in alcohol use disorder.

    Science.gov (United States)

    Gerchen, Martin Fungisai; Kirsch, Martina; Bahs, Nathalie; Halli, Patrick; Gerhardt, Sarah; Schäfer, Axel; Sommer, Wolfgang H; Kiefer, Falk; Kirsch, Peter

    2018-01-17

    Alcohol Use Disorder is a highly prevalent mental disorder which puts a severe burden on individuals, families, and society. The treatment of Alcohol Use Disorder is challenging and novel and innovative treatment approaches are needed to expand treatment options. A promising neuroscience-based intervention method that allows targeting cortical as well as subcortical brain processes is real-time functional magnetic resonance imaging neurofeedback. However, the efficacy of this technique as an add-on treatment of Alcohol Use Disorder in a clinical setting is hitherto unclear and will be assessed in the Systems Biology of Alcohol Addiction (SyBil-AA) neurofeedback study. N = 100 patients with Alcohol Use Disorder will be randomized to 5 parallel groups in a single-blind fashion and receive real-time functional magnetic resonance imaging neurofeedback while they are presented pictures of alcoholic beverages. The groups will either downregulate the ventral striatum, upregulate the right inferior frontal gyrus, negatively modulate the connectivity between these regions, upregulate, or downregulate the auditory cortex as a control region. After receiving 3 sessions of neurofeedback training within a maximum of 2 weeks, participants will be followed up monthly for a period of 3 months and relapse rates will be assessed as the primary outcome measure. The results of this study will provide insights into the efficacy of real-time functional magnetic resonance imaging neurofeedback training in the treatment of Alcohol Use Disorder as well as in the involved brain systems. This might help to identify predictors of successful neurofeedback treatment which could potentially be useful in developing personalized treatment approaches. The study was retrospectively registered in the German Clinical Trials Register (trial identifier: DRKS00010253 ; WHO Universal Trial Number (UTN): U1111-1181-4218) on May 10th, 2016.

  6. Rational design of biophysical imaging protocols to measure the level of intensity of massive delocalized infections under severe HIV-induced immunodeficiency: configuration of novel radioimmunoscintigraphy modalities with single-photon emission tomography (SPECT) and positron emission tomography (PET)

    International Nuclear Information System (INIS)

    Nazarea, A.D.

    1996-01-01

    single-photon emission tomography (SPECT) and positron emission tomography (PET) protocols. (author)

  7. Comparison of single and combination diuretics on glucose tolerance (PATHWAY-3): protocol for a randomised double-blind trial in patients with essential hypertension.

    Science.gov (United States)

    Brown, Morris J; Williams, Bryan; MacDonald, Thomas M; Caulfield, Mark; Cruickshank, J Kennedy; McInnes, Gordon; Sever, Peter; Webb, David J; Salsbury, Jackie; Morant, Steve; Ford, Ian

    2015-08-07

    Thiazide diuretics are associated with increased risk of diabetes mellitus. This risk may arise from K(+)-depletion. We hypothesised that a K(+)-sparing diuretic will improve glucose tolerance, and that combination of low-dose thiazide with K(+)-sparing diuretic will improve both blood pressure reduction and glucose tolerance, compared to a high-dose thiazide. This is a parallel-group, randomised, double-blind, multicentre trial, comparing hydrochlorothiazide 25-50 mg, amiloride 10-20 mg and combination of both diuretics at half these doses. A single-blind placebo run-in of 1 month is followed by 24 weeks of blinded active treatment. There is forced dose-doubling after 3 months. The Primary end point is the blood glucose 2 h after oral ingestion of a 75 g glucose drink (OGTT), following overnight fasting. The primary outcome is the difference between 2 h glucose at weeks 0, 12 and 24. Secondary outcomes include the changes in home systolic blood pressure (BP) and glycated haemoglobin and prediction of response by baseline plasma renin. Eligibility criteria are: age 18-79, systolic BP on permitted background treatment ≥ 140 mm Hg and home BP ≥ 130 mm Hg and one component of the metabolic syndrome additional to hypertension. Principal exclusions are diabetes, estimated-glomerular filtration rate 200 mm Hg or DBP >120 mm Hg (box 2). The sample size calculation indicates that 486 patients will give 80% power at α=0.01 to detect a difference in means of 1 mmol/L (SD=2.2) between 2 h glucose on hydrochlorothiazide and comparators. PATHWAY-3 was approved by Cambridge South Ethics Committee, number 09/H035/19. The trial results will be published in a peer-reviewed scientific journal. Eudract number 2009-010068-41 and clinical trials registration number: NCT02351973. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  8. Leprosy Post-Exposure Prophylaxis (LPEP) programme: study protocol for evaluating the feasibility and impact on case detection rates of contact tracing and single dose rifampicin.

    Science.gov (United States)

    Barth-Jaeggi, Tanja; Steinmann, Peter; Mieras, Liesbeth; van Brakel, Wim; Richardus, Jan Hendrik; Tiwari, Anuj; Bratschi, Martin; Cavaliero, Arielle; Vander Plaetse, Bart; Mirza, Fareed; Aerts, Ann

    2016-11-17

    The reported number of new leprosy patients has barely changed in recent years. Thus, additional approaches or modifications to the current standard of passive case detection are needed to interrupt leprosy transmission. Large-scale clinical trials with single dose rifampicin (SDR) given as post-exposure prophylaxis (PEP) to contacts of newly diagnosed patients with leprosy have shown a 50-60% reduction of the risk of developing leprosy over the following 2 years. To accelerate the uptake of this evidence and introduction of PEP into national leprosy programmes, data on the effectiveness, impact and feasibility of contact tracing and PEP for leprosy are required. The leprosy post-exposure prophylaxis (LPEP) programme was designed to obtain those data. The LPEP programme evaluates feasibility, effectiveness and impact of PEP with SDR in pilot areas situated in several leprosy endemic countries: India, Indonesia, Myanmar, Nepal, Sri Lanka and Tanzania. Complementary sites are located in Brazil and Cambodia. From 2015 to 2018, contact persons of patients with leprosy are traced, screened for symptoms and assessed for eligibility to receive SDR. The intervention is implemented by the national leprosy programmes, tailored to local conditions and capacities, and relying on available human and material resources. It is coordinated on the ground with the help of the in-country partners of the International Federation of Anti-Leprosy Associations (ILEP). A robust data collection and reporting system is established in the pilot areas with regular monitoring and quality control, contributing to the strengthening of the national surveillance systems to become more action-oriented. Ethical approval has been obtained from the relevant ethics committees in the countries. Results and lessons learnt from the LPEP programme will be published in peer-reviewed journals and should provide important evidence and guidance for national and global policymakers to strengthen current

  9. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  10. Impact of body weight, low energy diet and gastric bypass on drug bioavailability, cardiovascular risk factors and metabolic biomarkers: protocol for an open, non-randomised, three-armed single centre study (COCKTAIL).

    Science.gov (United States)

    Hjelmesæth, Jøran; Åsberg, Anders; Andersson, Shalini; Sandbu, Rune; Robertsen, Ida; Johnson, Line Kristin; Angeles, Philip Carlo; Hertel, Jens Kristoffer; Skovlund, Eva; Heijer, Maria; Ek, Anna-Lena; Krogstad, Veronica; Karlsen, Tor-Ivar; Christensen, Hege; Andersson, Tommy B; Karlsson, Cecilia

    2018-05-29

    Roux-en-Y gastric bypass (GBP) is associated with changes in cardiometabolic risk factors and bioavailability of drugs, but whether these changes are induced by calorie restriction, the weight loss or surgery per se, remains uncertain. The COCKTAIL study was designed to disentangle the short-term (6 weeks) metabolic and pharmacokinetic effects of GBP and a very low energy diet (VLED) by inducing a similar weight loss in the two groups. This open, non-randomised, three-armed, single-centre study is performed at a tertiary care centre in Norway. It aims to compare the short-term (6 weeks) and long-term (2 years) effects of GBP and VLED on, first, bioavailability and pharmacokinetics (24 hours) of probe drugs and biomarkers and, second, their effects on metabolism, cardiometabolic risk factors and biomarkers. The primary outcomes will be measured as changes in: (1) all six probe drugs by absolute bioavailability area under the curve (AUC oral /AUC iv ) of midazolam (CYP3A4 probe), systemic exposure (AUC oral ) of digoxin and rosuvastatin and drug:metabolite ratios for omeprazole, losartan and caffeine, levels of endogenous CYP3A biomarkers and genotypic variation, changes in the expression and activity data of the drug-metabolising, drug transport and drug regulatory proteins in biopsies from various organs and (2) body composition, cardiometabolic risk factors and metabolic biomarkers. The COCKTAIL protocol was reviewed and approved by the Regional Committee for Medical and Health Research Ethics (Ref: 2013/2379/REK sørøst A). The results will be disseminated to academic and health professional audiences and the public via presentations at conferences, publications in peer-reviewed journals and press releases and provided to all participants. NCT02386917. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  11. GAME (Goals - Activity - Motor Enrichment): protocol of a single blind randomised controlled trial of motor training, parent education and environmental enrichment for infants at high risk of cerebral palsy.

    Science.gov (United States)

    Morgan, Catherine; Novak, Iona; Dale, Russell C; Guzzetta, Andrea; Badawi, Nadia

    2014-10-07

    Cerebral palsy is the most common physical disability of childhood and early detection is possible using evidence based assessments. Systematic reviews indicate early intervention trials rarely demonstrate efficacy for improving motor outcomes but environmental enrichment interventions appear promising. This study is built on a previous pilot study and has been designed to assess the effectiveness of a goal - oriented motor training and enrichment intervention programme, "GAME", on the motor outcomes of infants at very high risk of cerebral palsy (CP) compared with standard community based care. A two group, single blind randomised controlled trial (n = 30) will be conducted. Eligible infants are those diagnosed with CP or designated "at high risk of CP" on the basis of the General Movements Assessment and/or abnormal neuroimaging. A physiotherapist and occupational therapist will deliver home-based GAME intervention at least fortnightly until the infant's first birthday. The intervention aims to optimize motor function and engage parents in developmental activities aimed at enriching the home learning environment. Primary endpoint measures will be taken 16 weeks after intervention commences with the secondary endpoint at 12 months and 24 months corrected age. The primary outcome measure will be the Peabody Developmental Motor Scale second edition. Secondary outcomes measures include the Gross Motor Function Measure, Bayley Scales of Infant and Toddler Development, Affordances in the Home Environment for Motor Development - Infant Scale, and the Canadian Occupational Performance Measure. Parent well-being will be monitored using the Depression Anxiety and Stress Scale. This paper presents the background, design and intervention protocol of a randomised trial of a goal driven, motor learning approach with customised environmental interventions and parental education for young infants at high risk of cerebral palsy. This trial is registered on the Australian

  12. Improved detection of fill-in using sublingual nitroglycerin in technetium-99m tetrofosmin exercise/rest single photon emission computed tomography one day protocol for old myocardial infarction

    International Nuclear Information System (INIS)

    Miyanaga, Hajime; Kunieda, Yasufumi; Oguni, Atsuhiko; Kamitani, Tadaaki; Kawasaki, Shingo; Takahashi, Toru

    1999-01-01

    Twenty-one patients with old myocardial infarction underwent repeated 99m Tc-tetrofosmin ( 99m Tc) exercise/rest same day protocols with and without the administration of sublingual nitroglycerin (NTG) 5 min before the second injection of 99m Tc for rest SPECT. Twelve of these patients also underwent ordinary exercise/redistribution 201 Tl SPECT. The control study protocol images showed decreased uptake of 99m Tc on exercise in 157 of 420 segments and the presence of fill-in at rest in 58 segments. Images obtained with administration of NTG showed decreased uptake of 99m Tc on exercise in 163 of 420 segments and fill-in in 74 segments at rest. The frequency of fill-in was greater in the NTG protocol than in the control protocol. The segments were scored as different grades according to 99m Tc uptake between 2 protocols. Fill-in was only present or more remarkable in 31 segments in the NTG protocol than in the control protocol. Fill-in was only present or more remarkable in 10 segments in the control protocol than in the NTG protocol. In the NTG protocol, the mean defect score of the exercise images, calculated from the bull's eye image automatically, was higher than that of the rest images. The mean severity score of the exercise images, also calculated from the bull's eye image automatically, was likewise higher than that of the rest images, whereas the mean severity score of the stress images and rest images in the control protocol was not significantly different. Moreover, the mean defect score and severity score of the rest images from the NTG protocol were significantly lower than those obtained from the control protocol. Sublingual NTG administration before the injection of 99m Tc-tetrofosmin at the rest study in the one day exercise/rest studies enhanced fill-in, so may enhance the detection of viable myocardium, allowing more informed decisions regarding cardiac revascularization in patients with chronic coronary artery disease. (K.H.)

  13. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  14. The SIMS trial: adjustable anchored single-incision mini-slings versus standard tension-free midurethral slings in the surgical management of female stress urinary incontinence. A study protocol for a pragmatic, multicentre, non-inferiority randomised controlled trial.

    Science.gov (United States)

    Abdel-Fattah, Mohamed; MacLennan, Graeme; Kilonzo, Mary; Assassa, R Phil; McCormick, Kirsty; Davidson, Tracey; McDonald, Alison; N'Dow, James; Wardle, Judith; Norrie, John

    2017-08-11

    Single-incision mini-slings (SIMS) represent the third generation of midurethral slings. They have been developed with the aim of offering a true ambulatory procedure for treatment of female stress urinary incontinence (SUI) with reduced morbidity and earlier recovery while maintaining similar efficacy to standard midurethral slings (SMUS). The aim of this study is to determine the clinical and cost-effectiveness of adjustable anchored SIMS compared with tension-free SMUS in the surgical management of female SUI, with 3-year follow-up. A pragmatic, multicentre, non-inferiority randomised controlled trial. The primary outcome measure is the patient-reported success rate measured by the Patient Global Impression of Improvement at 12 months. The primary economic outcome will be incremental cost per quality-adjusted life year gained at 12 months. The secondary outcomes measures include adverse events, objective success rates, impact on other lower urinary tract symptoms, health-related quality of life profile and sexual function, and reoperation rates for SUI. Secondary economic outcomes include National Health Service and patient primary and secondary care resource use and costs, incremental cost-effectiveness and incremental net benefit. The statistical analysis of the primary outcome will be by intention-to-treat and also a per-protocol analysis. Results will be displayed as estimates and 95% CIs. CIs around observed differences will then be compared with the prespecified non-inferiority margin. Secondary outcomes will be analysed similarly. The North of Scotland Research Ethics Committee has approved this study (13/NS/0143). The dissemination plans include HTA monograph, presentation at international scientific meetings and publications in high-impact, open-access journals. The results will be included in the updates of the National Institute for Health and Care Excellence and the European Association of Urology guidelines; these two specific guidelines directly

  15. Protocol of a single group prospective observational study on the diagnostic value of 3T susceptibility weighted MRI of nigrosome-1 in patients with parkinsonian symptoms: the N3iPD study (nigrosomal iron imaging in Parkinson's disease).

    Science.gov (United States)

    Schwarz, Stefan T; Xing, Yue; Naidu, Saadnah; Birchall, Jim; Skelly, Rob; Perkins, Alan; Evans, Jonathan; Sare, Gill; Martin-Bastida, Antonio; Bajaj, Nin; Gowland, Penny; Piccini, Paola; Auer, Dorothee P

    2017-12-14

    Parkinson's disease (PD) is the most common movement disorder in the elderly and is characterised clinically by bradykinesia, tremor and rigidity. Diagnosing Parkinson's can be difficult especially in the early stages. High-resolution nigrosome MRI offers promising diagnostic accuracy of patients with established clinical symptoms; however, it is unclear whether this may help to establish the diagnosis in the early stages of PD, when there is diagnostic uncertainty. In this scenario, a single photon emission CT scan using a radioactive dopamine transporter ligand can help to establish the diagnosis, or clinical follow-up may eventually clarify the diagnosis. A non-invasive, cost-effective diagnostic test that could replace this would be desirable. We therefore aim to prospectively test whether nigrosome MRI is as useful as DaTSCAN to establish the correct diagnosis in people with minor or unclear symptoms suspicious for PD. In a prospective study we will recruit 145 patients with unclear symptoms possibly caused by Parkinson's from three movement disorder centres in the UK to take part in the study. We will record the Movement Disorder Society - Unified Parkinson's Disease Rating Scale, and participants will undergo DaTSCAN and high-resolution susceptibility weighted MRI at a field strength of 3T. DaTSCANs will be assessed visually and semiquantitatively; MRI scans will be visually assessed for signal loss in nigrosome-1 by blinded investigators. We will compare how the diagnosis suggested by MRI compares with the diagnosis based on DaTSCAN and will also validate the diagnosis based on the two tests with a clinical examination performed at least 1 year after the initial presentation as a surrogate gold standard diagnostic test. The local ethics commission (Health Research Authority East Midlands - Derby Research Ethics Committee) has approved this study (REC ref.: 16/EM/0229). The study is being carried out under the principles of the Declaration of Helsinki (64

  16. Effects of kinesiotaping added to a rehabilitation programme for patients with rotator cuff tendinopathy: protocol for a single-blind, randomised controlled trial addressing symptoms, functional limitations and underlying deficits.

    Science.gov (United States)

    de Oliveira, Fábio Carlos Lucas; de Fontenay, Benoît Pairot; Bouyer, Laurent Julien; Desmeules, François; Roy, Jean-Sébastien

    2017-09-24

    Rotator cuff tendinopathy (RCTe) is the most frequent cause of shoulder pain, resulting in considerable losses to society and public resources. Muscle imbalance and inadequate sensorimotor control are deficits often associated with RCTe. Kinesiotaping (KT) is widely used by clinicians for rehabilitation of RCTe. While previous studies have examined the immediate effects of KT on shoulder injuries or the effects of KT as an isolated method of treatment, no published study has addressed its mid-term and long-term effects when combined with a rehabilitation programme for patients with RCTe. The primary objective of this randomised controlled trial (RCT) will be to assess the efficacy of therapeutic KT, added to a rehabilitation programme, in reducing pain and disabilities in individuals with RCTe. Secondary objectives will look at the effects of KT on the underlying factors involved in shoulder control, such as muscular activity, acromiohumeral distance (AHD) and range of motion (ROM). A single-blind RCT will be conducted. Fifty-two participants, randomly allocated to one of two groups (KT or no-KT), will take part in a 6-week rehabilitation programme. The KT group will receive KT added to the rehabilitation programme, whereas the no-KT group will receive only the rehabilitation programme. Measurements will be taken at baseline, week 3, week 6, week 12 and 6 months. Primary outcomes will be symptoms and functional limitations assessed by the Disabilities of the Arm, Shoulder and Hand questionnaire. Secondary outcomes will include shoulder ROM, AHD at rest and at 60° of abduction, and muscle activation during arm elevation. The added effects of KT will be assessed through a two-way analysis of variance for repeated measures. Ethics approval was obtained from the Ethics Committee of Quebec Rehabilitation Institute of the Centre Integrated University Health and Social Services. Results will be disseminated through international publications in peer-reviewed journals

  17. RAPP, a systematic e-assessment of postoperative recovery in patients undergoing day surgery: study protocol for a mixed-methods study design including a multicentre, two-group, parallel, single-blind randomised controlled trial and qualitative interview studies.

    Science.gov (United States)

    Nilsson, U; Jaensson, M; Dahlberg, K; Odencrants, S; Grönlund, Å; Hagberg, L; Eriksson, M

    2016-01-13

    Day surgery is a well-established practice in many European countries, but only limited information is available regarding postoperative recovery at home though there is a current lack of a standard procedure regarding postoperative follow-up. Furthermore, there is also a need for improvement of modern technology in assessing patient-related outcomes such as mobile applications. This article describes the Recovery Assessment by Phone Points (RAPP) study protocol, a mixed-methods study to evaluate if a systematic e-assessment follow-up in patients undergoing day surgery is cost-effective and improves postoperative recovery, health and quality of life. This study has a mixed-methods study design that includes a multicentre, two-group, parallel, single-blind randomised controlled trial and qualitative interview studies. 1000 patients >17 years of age who are undergoing day surgery will be randomly assigned to either e-assessed postoperative recovery follow-up daily in 14 days measured via smartphone app including the Swedish web-version of Quality of Recovery (SwQoR) or to standard care (ie, no follow-up). The primary aim is cost-effectiveness. Secondary aims are (A) to explore whether a systematic e-assessment follow-up after day surgery has a positive effect on postoperative recovery, health-related quality of life (QoL) and overall health; (B) to determine whether differences in postoperative recovery have an association with patient characteristic, type of surgery and anaesthesia; (C) to determine whether differences in health literacy have a substantial and distinct effect on postoperative recovery, health and QoL; and (D) to describe day surgery patient and staff experiences with a systematic e-assessment follow-up after day surgery.The primary aim will be measured at 2 weeks postoperatively and secondary outcomes (A-C) at 1 and 2 weeks and (D) at 1 and 4 months. NCT02492191; Pre-results. Published by the BMJ Publishing Group Limited. For permission to use

  18. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  19. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  20. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  1. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  2. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  3. Implementation of the Enhanced Moderated Online Social Therapy (MOST+) Model Within a National Youth E-Mental Health Service (eheadspace): Protocol for a Single Group Pilot Study for Help-Seeking Young People.

    Science.gov (United States)

    Rice, Simon; Gleeson, John; Leicester, Steven; Bendall, Sarah; D'Alfonso, Simon; Gilbertson, Tamsyn; Killackey, Eoin; Parker, Alexandra; Lederman, Reeva; Wadley, Greg; Santesteban-Echarri, Olga; Pryor, Ingrid; Mawren, Daveena; Ratheesh, Aswin; Alvarez-Jimenez, Mario

    2018-02-22

    There is a substantial need for youth electronic mental health (e-mental health) services. In addressing this need, our team has developed a novel moderated online social therapy intervention called enhanced moderated online social therapy (MOST+). MOST+ integrates real-time, clinician-delivered Web chat counseling, interactive user-directed online therapy, expert and peer moderation, and private and secure peer-to-peer social networking. MOST+ has been designed to give young people immediate, 24-hour access to anonymous, evidence-based, and short-term mental health care. The primary aims of this pilot study were to determine the feasibility, acceptability, and safety of the intervention. Secondary aims were to assess prepost changes in key psychosocial outcomes and collect qualitative data for future intervention refinement. MOST+ will be embedded within eheadspace, an Australian youth e-mental health service, and will be evaluated via an uncontrolled single-group study. Approximately 250 help-seeking young people (16-25 years) will be progressively recruited to the intervention from the eheadspace home page over the first 4 weeks of an 8-week intervention period. All participants will have access to evidence-based therapeutic content and integrated Web chat counseling. Additional access to moderated peer-to-peer social networking will be granted to individuals for whom it is deemed safe and appropriate, through a three-tiered screening process. Participants will be enrolled in the MOST+ intervention for 1 week, with the option to renew their enrollment across the duration of the pilot. Participants will complete a survey at enrollment to assess psychological well-being and other mental health outcomes. Additional assessment will occur following account deactivation (ie, after participant has opted not to renew their enrollment, or at trial conclusion) and will include an online survey and telephone interview assessing psychological well-being and experience of

  4. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  5. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  6. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  7. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...

  8. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  9. Minimal computational-space implementation of multiround quantum protocols

    International Nuclear Information System (INIS)

    Bisio, Alessandro; D'Ariano, Giacomo Mauro; Perinotti, Paolo; Chiribella, Giulio

    2011-01-01

    A single-party strategy in a multiround quantum protocol can be implemented by sequential networks of quantum operations connected by internal memories. Here, we provide an efficient realization in terms of computational-space resources.

  10. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  11. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  12. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  13. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  14. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  15. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  16. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  17. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  18. Negative pressure wound treatment improves Acute Physiology and Chronic Health Evaluation II score in mediastinitis allowing a successful elective pectoralis muscle flap closure: six-year experience of a single protocol.

    Science.gov (United States)

    Salica, Andrea; Weltert, Luca; Scaffa, Raffaele; Guerrieri Wolf, Lorenzo; Nardella, Saverio; Bellisario, Alessandro; De Paulis, Ruggero

    2014-11-01

    Optimal management of poststernotomy mediastinitis is controversial. Negative pressure wound treatment improves wound environment and sternal stability with low surgical invasiveness. Our protocol was based on negative pressure followed by delayed surgical closure. The aim of this study was to provide the results at early follow-up and to identify the risk factors for adverse outcome. In 5400 cardiac procedures, 44 consecutive patients with mediastinitis were enrolled in the study. Mediastinitis treatment was based on urgent debridement and negative pressure as the first-line approach. After wound sterilization, chest closure was achieved by elective pectoralis muscle advancement flap. Each patient's hospital data were collected prospectively. Variables included patient demographics and clinical and biological data. Acute Physiology and Chronic Health Evaluation (APACHE) II score was calculated at the time of diagnosis and 48 hours after debridement. Focus outcome measures were mediastinitis-related death and need for reintervention after pectoralis muscle closure. El Oakley type I and type IIIA mediastinitis were the most frequent types (63.6%). Methicillin-resistant Staphylococcus aureus was present in 25 patients (56.8%). Mean APACHE II score was 19.4±4 at the time of diagnosis, and 30 patients (68.2%) required intensive care unit transfer before surgical debridement. APACHE II score improved 48 hours after wound debridement and negative pressure application (mean value, 19.4±4 vs 7.2±2; P=.005) independently of any other variables included in the study. One patient in septic shock at the time of diagnosis died (2.2%). Negative pressure promotes a significant improvement in clinical status according to APACHE II score and allows a successful elective surgical closure. Copyright © 2014 The American Association for Thoracic Surgery. Published by Elsevier Inc. All rights reserved.

  19. Perioperative complications of radical cystectomy after induction chemoradiotherapy in bladder-sparing protocol against muscle-invasive bladder cancer. A single institutional retrospective comparative study with primary radical cystectomy

    International Nuclear Information System (INIS)

    Iwai, Aki; Koga, Fumitaka; Fujii, Yasuhisa; Masuda, Hitoshi; Saito, Kazutaka; Numao, Noboru; Sakura, Mizuaki; Kawakami, Satoru; Kihara, Kazunori

    2011-01-01

    The objective of this study was to compare rates of early morbidity after radical cystectomy in patients treated with or without induction chemoradiotherapy (CRT) using a standardized reporting methodology. All 193 consecutive patients undergoing radical cystectomy for bladder cancer between 1989 and 2010 were retrospectively reviewed. Induction chemoradiotherapy consists of radiation at 40 Gy to the small pelvis and two cycles of concurrent cisplatin at 20 mg/day for 5 days. Deaths within 90 days after radical cystectomy and complications arising within 30 days were recorded and graded according to the Clavien-Dindo classification. Grades 1-2 were considered minor; Grades 3-5 were considered major. Eighty-seven patients underwent radical cystectomy following chemoradiotherapy (chemoradiotherapy group) while the remaining 106 primarily underwent radical cystectomy (no chemoradiotherapy group). No Grade 4-5 complication was observed. Overall, 118 patients (61%) experienced 36 major and 122 minor complications. There was no significant difference in the incidence of overall complications between the chemoradiotherapy and no chemoradiotherapy groups (67 vs. 57%). Overall urinary anastomosis-related complications and major gastrointestinal complications, most of which were Grade 3 ileus, were more frequent in the chemoradiotherapy group than the no chemoradiotherapy group (11 vs. 2%, P=0.007; and 14 vs. 4%, P=0.02; respectively). Multivariate analysis identified induction chemoradiotherapy as an independent risk factor for overall urinary anastomosis-related complications (relative risk 6.0, P=0.01) but not for major gastrointestinal complications. Induction chemoradiotherapy at 40 Gy in bladder-sparing protocols against MIBC is unlikely to increase the rate of severe complications of radical cystectomy. (author)

  20. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  1. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  2. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  3. Intravenous iron isomaltoside 1000 administered by high single-dose infusions or standard medical care for the treatment of fatigue in women after postpartum haemorrhage: study protocol for a randomised controlled trial.

    Science.gov (United States)

    Holm, Charlotte; Thomsen, Lars Lykke; Norgaard, Astrid; Langhoff-Roos, Jens

    2015-01-14

    Postpartum haemorrhage can lead to iron deficiency with and without anaemia, the clinical consequences of which include physical fatigue. Although oral iron is the standard treatment, it is often associated with gastrointestinal side effects and poor compliance. To date, no published randomised controlled studies have compared the clinical efficacy and safety of standard medical care with intravenous administration of iron supplementation after postpartum haemorrhage.The primary objective of this study is to compare the efficacy of an intravenous high single-dose of iron isomaltoside 1000 with standard medical care on physical fatigue in women with postpartum haemorrhage. In a single centre, open-labelled, randomised trial, women with postpartum haemorrhage exceeding 700 mL will be allocated to either a single dose of 1,200 mg of iron isomaltoside 1000 or standard medical care. Healthy parturients with a singleton pregnancy will be included within 48 hours after delivery.Participants will complete structured questionnaires that focus on several dimensions of fatigue and mental health (Multidimensional Fatigue Inventory, Edinburgh Postnatal Depression Scale and the Postpartum Questionnaire), at inclusion and at follow-up visits after three days, one week, three weeks, eight weeks, and 12 weeks postpartum. The primary endpoint is the aggregated change in physical fatigue score within 12 weeks postpartum, as measured by a subscale of the Multidimensional Fatigue Inventory. The primary objective will be considered to have been met if an intravenous high single dose of iron isomaltoside 1000 is shown to be superior to standard medical care in women after postpartum haemorrhage regarding physical fatigue.For claiming superiority, we set the minimal clinically relevant difference between the mean scores at 1.8, and the assumed standard deviation at 4.2. Hence, 87 participants per treatment group are needed in order to demonstrate superiority; to provide an extra margin

  4. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  5. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  6. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  7. Assessing the effect of high-repetitive single limb exercises (HRSLE on exercise capacity and quality of life in patients with chronic obstructive pulmonary disease (COPD: study protocol for randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Nyberg Andre

    2012-07-01

    Full Text Available Abstract Background Single-limb knee extension exercises have been found to be effective at improving lower extremity exercise capacity in patients with chronic obstructive pulmonary disease (COPD. Since the positive local physiological effects of exercise training only occur in the engaged muscle(s, should upper extremity muscles also be included to determine the effect of single limb exercises in COPD patients. Methods/design Trial design: a prospective, assessor-blind, block randomized controlled, parallel-group multicenter trial. Participants: stage II-IV COPD patients, > 40 years of age, ex-smokers, with stable medical treatment will be included starting May 2011. Recruitment at three locations in Sweden. Interventions: 1 high-repetitive single limb exercise (HRSLE training with elastic bands, 60 minutes, three times/week for 8 weeks combined with four sessions of 60 minutes patient education, or 2 the same patient education alone. Outcomes: Primary: determine the effects of HRSLE on local muscle endurance capacity (measured as meters walked during 6-minute walk test and rings moved on 6-minute ring and pegboard test and quality of life (measured as change on the Swedish version of the Chronic Respiratory Disease Questionnaire. Secondary: effects on maximal strength, muscular endurance, dyspnea, self-efficacy, anxiety and depression. The relationship between changes in health-related variables and changes in exercise capacity, sex-related differences in training effects, feasibility of the program, strategies to determine adequate starting resistance and provide accurate resistance for each involved movement and the relationship between muscle fatigue and dyspnea in the different exercise tests will also be analyzed. Randomization: performed by a person independent of the recruitment process and using a computer random number generator. Stratification by center and gender with a 1:1 allocation to the intervention or control using random

  8. Does the addition of virtual reality training to a standard program of inpatient rehabilitation improve sitting balance ability and function after stroke? Protocol for a single-blind randomized controlled trial.

    Science.gov (United States)

    Sheehy, L; Taillon-Hobson, A; Sveistrup, H; Bilodeau, M; Fergusson, D; Levac, D; Finestone, H

    2016-03-31

    Sitting ability and function are commonly impaired after stroke. Balance training has been shown to be helpful, but abundant repetitions are required for optimal recovery and patients must be motivated to perform rehabilitation exercises repeatedly to maximize treatment intensity. Virtual reality training (VRT), which allows patients to interact with a virtual environment using computer software and hardware, is enjoyable and may encourage greater repetition of therapeutic exercises. However, the potential for VRT to promote sitting balance has not yet been explored. The objective of this study is to determine if supplemental VRT-based sitting balance exercises improve sitting balance ability and function in stroke rehabilitation inpatients. This is a single-site, single-blind, parallel-group randomized control trial. Seventy six stroke rehabilitation inpatients who cannot stand independently for greater than one minute but can sit for at least 20 minutes (including at least one minute without support) are being recruited from a tertiary-care dedicated stroke rehabilitation unit. Participants are randomly allocated to experimental or control groups. Both participate in 10-12 sessions of 30-45 minutes of VRT performed in sitting administered by a single physiotherapist, in addition to their traditional therapy. The experimental group plays five games which challenge sitting balance while the control group plays five games which minimize trunk lean. Outcome measures of sitting balance ability (Function in Sitting Test, Ottawa Sitting Scale, quantitative measures of postural sway) and function (Reaching Performance Scale, Wolf Motor Function Test, quantitative measures of the limits of stability) are administered prior to, immediately following, and one month following the intervention by a second physiotherapist blind to the participant's group allocation. The treatment of sitting balance post-stroke with VRT has not yet been explored. Results from the current study

  9. The immediate and long-term effects of exercise and patient education on physical, functional, and quality-of-life outcome measures after single-level lumbar microdiscectomy: a randomized controlled trial protocol.

    Science.gov (United States)

    Selkowitz, David M; Kulig, Kornelia; Poppert, Elizabeth M; Flanagan, Sean P; Matthews, Ndidiamaka D; Beneck, George J; Popovich, John M; Lona, Jose R; Yamada, Kimiko A; Burke, Wendy S; Ervin, Carolyn; Powers, Christopher M

    2006-08-25

    Low back pain remains a costly quality-of-life-related health problem. Microdiscectomy is often the surgical procedure of choice for a symptomatic, single-level, lumbar disc herniation in younger and middle-aged adults. The question of whether a post-microdiscectomy exercise program enhances function, quality of life, and disability status has not been systematically explored. Thus, the overall purpose of this study is to assess immediate and long-term outcomes of an exercise program, developed at University of Southern California (USC), targeting the trunk and lower extremities (USC Spine Exercise Program) for persons who have undergone a single-level microdiscectomy for the first time. One hundred individuals between the ages of 18 and 60 who consent to undergo lumbar microdiscectomy will be recruited to participate in this study. Subjects will be randomly assigned to one of two groups: 1) one session of back care education, or 2) a back care education session followed by the 12-week USC Spine Exercise Program. The outcome examiners (evaluators), as well as the data managers, will be blinded to group allocation. Education will consist of a one-hour "one-on-one" session with the intervention therapist, guided by an educational booklet specifically designed for post-microdiscectomy care. This session will occur four to six weeks after surgery. The USC Spine Exercise Program consists of two parts: back extensor strength and endurance, and mat and upright therapeutic exercises. This exercise program is goal-oriented, performance-based, and periodized. It will begin two to three days after the education session, and will occur three times a week for 12 weeks. Primary outcome measures include the Oswestry Disability Questionnaire, Roland-Morris Disability Questionnaire, SF-36 quality of life assessment, Subjective Quality of Life Scale, 50-foot Walk, Repeated Sit-to-Stand, and a modified Sorensen test. The outcome measures in the study will be assessed before and after

  10. Compositional mining of multiple object API protocols through state abstraction.

    Science.gov (United States)

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments.

  11. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  12. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  13. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  14. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  15. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  16. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  17. Gene probes : principles and protocols [Methods in molecular biology, v. 179

    National Research Council Canada - National Science Library

    Rapley, Ralph; Aquino de Muro, Marilena

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  18. A study protocol for a single-blind, randomized controlled trial of adjunctive transcranial direct current stimulation (tDCS) for chronic pain among patients receiving specialized, inpatient multimodal pain management.

    Science.gov (United States)

    Janice Jimenez-Torres, G; Weinstein, Benjamin L; Walker, Cory R; Christopher Fowler, J; Ashford, Philippa; Borckardt, Jeffrey J; Madan, Alok

    2017-03-01

    Available treatments for chronic pain (CP) are modestly effective or associated with iatrogenic harm. Transcranial direct current stimulation (tDCS) is a non-invasive brain stimulation technique that may be an effective, adjunctive treatment to non-opioid therapies. In this randomized control trial (RCT), we compare adjunctive active versus sham tDCS among patients in a multimodal inpatient pain management program. The primary objectives of the RCT are to improve pain tolerance and subjective pain experience. Patients admitted to the Pain Management Program at The Menninger Clinic in Houston, Texas are eligible for this trial. Eighty-four participants will be randomized (1:1) into a single-blind, 2×12 (group×time) controlled trial. A battery-powered direct and constant current stimulator (Soterix Medical Inc. 2014) delivers anodal stimulation over the left dorsolateral prefrontal cortex (DLPFC) and cathodal stimulation over the right DLPFC. Active tDCS is applied by supplying a 2mA current for 20min/session over 10 sessions. Participants complete self-report and performance-based assessments on a weekly basis just prior to brain stimulation. Self-report assessments are collected via Chronic Pain Tracker version 3.6, an iPad interfaced application. The performance-based pain tolerance task is completed through the cold presser task. Interventions with cross-symptomatic therapeutic potential are absolutely essential in the context of CP, in which psychiatric comorbidity is the norm. Modalities that can be used in tandem with evidence-based, non-opioid therapies have the potential to have a synergistic effect, resulting in increased effectiveness of what have been modestly effective treatments to date. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Effects of a tele-prehabilitation program or an in-person prehabilitation program in surgical candidates awaiting total hip or knee arthroplasty: Protocol of a pilot single blind randomized controlled trial.

    Science.gov (United States)

    Doiron-Cadrin, Patrick; Kairy, Dahlia; Vendittoli, Pascal-André; Lowry, Véronique; Poitras, Stéphane; Desmeules, François

    2016-12-15

    The accessibility for total joint arthroplasty often comes up against long wait lists, and may lead to deleterious effects for the awaiting patients. This pilot single blind randomized controlled trial aims to evaluate the impact of a telerehabilitation prehabilitation program before a hip or knee arthroplasty compared to in-person prehabilitation or to usual wait for surgery. Thirty-six patients on a wait list for a total hip or knee arthroplasty will be recruited and randomly assigned to one of three groups. The in-person prehabilitation group (n = 12) will receive a 12-week rehabilitation program (2 sessions/week) including education, exercises of the lower limb and cardiovascular training. Patients in the tele-prehabilitation group (n = 12) will receive the same intervention using a telecommunication software. The control group (n = 12) will be provided with the hospital's usual documentation before surgery. The Lower Extremity Functional Scale (LEFS) will be the primary outcome measure taken at baseline and at 12 weeks. Secondary measures will include self-reported function and quality of life as well as performance tests. A mixed-model, 2-way repeated-measure ANOVA will be used to analyse the effects of the rehabilitation programs. This pilot study is the first to evaluate the feasibility and the impact of a telerehabilitation prehabilitation program for patients awaiting a total joint arthroplasty. The results of this pilot-RCT will set the foundations for further research in the fields of rehabilitation and tele-medicine for patients suffering from lower limb osteoarthritis. ClinicalTrials.gov: NCT02636751.

  20. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  1. Distributed Processing Using Single-chip Microcomputers

    National Research Council Canada - National Science Library

    Pritchett, William

    1996-01-01

    This project investigates the use of single-chip microprocessors as nodes in a token ring control network and explores the implementation of a protocol to manage communication across such a network...

  2. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  3. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  4. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  5. A single-center randomized, controlled trial investigating the efficacy of a mHealth ECG technology intervention to improve the detection of atrial fibrillation: the iHEART study protocol.

    Science.gov (United States)

    Hickey, Kathleen T; Hauser, Nicole R; Valente, Laura E; Riga, Teresa C; Frulla, Ashton P; Masterson Creber, Ruth; Whang, William; Garan, Hasan; Jia, Haomiao; Sciacca, Robert R; Wang, Daniel Y

    2016-07-16

    Atrial fibrillation is a major public health problem and is the most common cardiac arrhythmia, affecting an estimated 2.7 million Americans. The true prevalence of atrial fibrillation is likely underestimated because episodes are often sporadic; therefore, it is challenging to detect and record an occurrence in a "real world" setting. To date, mobile health tools that promote earlier detection and treatment of atrial fibrillation and improvement in self-management behaviors and knowledge have not been evaluated. This study will be the first to address the epidemic problem of atrial fibrillation with a novel approach utilizing advancements in mobile health electrocardiogram technology to empower patients to actively engage in their healthcare and to evaluate impact on quality of life and quality-adjusted life years. Furthermore, sending a daily electrocardiogram transmission, coupled with receiving educational and motivational text messages aimed at promoting self-management and a healthy lifestyle may improve the management of chronic cardiovascular conditions (e.g., hypertension, diabetes, heart failure, etc.). Therefore, we are currently conducting a randomized controlled trial to assess the efficacy of a mobile health intervention, iPhone® Helping Evaluate Atrial fibrillation Rhythm through Technology (iHEART) versus usual cardiac care. The iHEART study is a single center, prospective, randomized controlled trial. A total of 300 participants with a recent history of atrial fibrillation will be enrolled. Participants will be randomized 1:1 to receive the iHEART intervention, receiving an iPhone® equipped with an AliveCor® Mobile ECG and accompanying Kardia application and behavioral altering motivational text messages or usual cardiac care for 6 months. This will be the first study to investigate the utility of a mobile health intervention in a "real world" setting. We will evaluate the ability of the iHEART intervention to improve the detection and

  6. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  7. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  8. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  9. Radon in large buildings: The development of a protocol

    International Nuclear Information System (INIS)

    Wilson, D.L.; Dudney, C.S.; Gammage, R.B.

    1993-01-01

    Over the past several years, considerable research has been devoted by the US Environmental Protection Agency (USEPA) and others to develop radon sampling protocols for single family residences and schools. However, very little research has been performed on measuring radon in the work place. To evaluate possible sampling protocols, 833 buildings throughout the United States were selected for extensive radon testing. The buildings tested (warehouses, production plants and office buildings) were representative of commercial buildings across the country both in design, size and use. Based on the results, preliminary radon sampling protocols for the work place have been developed

  10. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    Science.gov (United States)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  11. Thermogravimetric Analysis of Single-Wall Carbon Nanotubes

    Science.gov (United States)

    Arepalli, Sivram; Nikolaev, Pavel; Gorelik, Olga

    2010-01-01

    An improved protocol for thermogravimetric analysis (TGA) of samples of single-wall carbon nanotube (SWCNT) material has been developed to increase the degree of consistency among results so that meaningful comparisons can be made among different samples. This improved TGA protocol is suitable for incorporation into the protocol for characterization of carbon nanotube material. In most cases, TGA of carbon nanotube materials is performed in gas mixtures that contain oxygen at various concentrations. The improved protocol is summarized.

  12. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  13. Single-electron quantum tomography in quantum Hall edge channels

    International Nuclear Information System (INIS)

    Grenier, Ch; Degiovanni, P; Herve, R; Bocquillon, E; Parmentier, F D; Placais, B; Berroir, J M; Feve, G

    2011-01-01

    We propose a quantum tomography protocol to measure single-electron coherence in quantum Hall edge channels, and therefore access for the first time the wavefunction of single-electron excitations propagating in ballistic quantum conductors. Its implementation would open the way to quantitative studies of single-electron decoherence and would provide a quantitative tool for analyzing single- to few-electron sources. We show how this protocol could be implemented using ultrahigh-sensitivity noise measurement schemes.

  14. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  15. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  16. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  17. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  18. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chaojing; Zhang Quan

    2011-01-01

    It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function. (general)

  19. Gamma camera performance: technical assessment protocol

    International Nuclear Information System (INIS)

    Bolster, A.A.; Waddington, W.A.

    1996-01-01

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera's computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author)

  20. Gamma camera performance: technical assessment protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bolster, A.A. [West Glasgow Hospitals NHS Trust, London (United Kingdom). Dept. of Clinical Physics; Waddington, W.A. [University College London Hospitals NHS Trust, London (United Kingdom). Inst. of Nuclear Medicine

    1996-12-31

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera`s computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author).

  1. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  2. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Beckers, Catherine; Hustinx, Roland

    2014-01-01

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  3. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  4. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  5. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  6. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  7. Blind quantum computation protocol in which Alice only makes measurements

    Science.gov (United States)

    Morimae, Tomoyuki; Fujii, Keisuke

    2013-05-01

    Blind quantum computation is a new secure quantum computing protocol which enables Alice (who does not have sufficient quantum technology) to delegate her quantum computation to Bob (who has a full-fledged quantum computer) in such a way that Bob cannot learn anything about Alice's input, output, and algorithm. In previous protocols, Alice needs to have a device which generates quantum states, such as single-photon states. Here we propose another type of blind computing protocol where Alice does only measurements, such as the polarization measurements with a threshold detector. In several experimental setups, such as optical systems, the measurement of a state is much easier than the generation of a single-qubit state. Therefore our protocols ease Alice's burden. Furthermore, the security of our protocol is based on the no-signaling principle, which is more fundamental than quantum physics. Finally, our protocols are device independent in the sense that Alice does not need to trust her measurement device in order to guarantee the security.

  8. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  9. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  10. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  11. Protocols for BNCT of glioblastoma multiforme at Brookhaven: Practical considerations

    Energy Technology Data Exchange (ETDEWEB)

    Chanana, A.D.; Coderre, J.A.; Joel, D.D.; Slatkin, D.N.

    1996-12-31

    In this report we discuss some issues considered in selecting initial protocols for boron neutron capture therapy (BNCT) of human glioblastoma multiforme. First the tolerance of normal tissues, especially the brain, to the radiation field. Radiation doses limits were based on results with human and animal exposures. Estimates of tumor control doses were based on the results of single-fraction photon therapy and single fraction BNCT both in humans and experimental animals. Of the two boron compounds (BSH and BPA), BPA was chosen since a FDA-sanctioned protocol for distribution in humans was in effect at the time the first BNCT protocols were written and therapy studies in experimental animals had shown it to be more effective than BSH.

  12. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  13. Design of a 1-chip IBM-3270 protocol handler

    NARCIS (Netherlands)

    Spaanenburg, L.

    1989-01-01

    The single-chip design of a 20MHz IBM-3270 coax protocol handler in a conventional 3 μ CMOS process-technology is discussed. The harmonious combination of CMOS circuit tricks and high-level design disciplines allows the 50k transistor design to be compiled and optimized into a 35 mm**2 chip in 4

  14. Hybrid quantum repeater protocol with fast local processing

    DEFF Research Database (Denmark)

    Borregaard, Johannes; Brask, Jonatan Bohr; Sørensen, Anders Søndberg

    2012-01-01

    -photon states are produced and grown into superpositions of coherent states, known as two-mode cat states. The entanglement is then distributed using homodyne detection. To improve the protocol, we replace the time-consuming nonlocal growth of cat states with local growth of single-mode cat states, eliminating...

  15. Desensitization to Mycofenolate Mofetil: a novel 12 step protocol.

    Science.gov (United States)

    Smith, M; Gonzalez-Estrada, A; Fernandez, J; Subramanian, A

    2016-07-01

    The use of MMF has become standard practice in many solid organ transplant recipients due its efficacy and favorable risk profile compared to other immunosuppressants. There has been a single case report of successful MMF desensitization. However, this protocol did not follow current Drug practice parameters. We report a successful desensitization to MMF in a double heart-kidney transplant recipient.

  16. CArbon dioxide surgical field flooding and aortic NO-touch off-pump coronary artery bypass grafting to reduce Neurological injuries after surgical coronary revascularisation (CANON): protocol for a randomised, controlled, investigator and patient blinded single-centre superiority trial with three parallel arms

    Science.gov (United States)

    Szwed, Krzysztof; Pawliszak, Wojciech; Serafin, Zbigniew; Kowalewski, Mariusz; Tomczyk, Remigiusz; Perlinski, Damian; Szwed, Magdalena; Tomaszewska, Marta; Anisimowicz, Lech; Borkowska, Alina

    2017-01-01

    Introduction Neurological injuries remain a major concern following coronary artery bypass grafting (CABG) that offsets survival benefit of CABG over percutaneous coronary interventions. Among numerous efforts to combat this issue is the development of off-pump CABG (OPCABG) that obviates the need for extracorporeal circulation and is associated with improved neurological outcomes. The objective of this study is to examine whether the neuroprotective effect of OPCABG can be further pronounced by the use of two state-of-the-art operating techniques. Methods and analysis In this randomised, controlled, investigator and patient blinded single-centre superiority trial with three parallel arms, a total of 360 patients will be recruited. They will be allocated in a 1:1:1 ratio to two treatment arms and one control arm. Treatment arms undergoing either aortic no-touch OPCABG or OPCABG with partial clamp applying carbon dioxide surgical field flooding will be compared against control arm undergoing OPCABG with partial clamp. The primary endpoint will be the appearance of new lesions on control brain MRI 3 days after surgery. Secondary endpoints will include the prevalence of new focal neurological deficits in the first 7 days after surgery, the occurrence of postoperative cognitive dysfunction at either 1 week or 3 months after surgery and the incidence of delirium in the first 7 days after surgery. Data will be analysed on intention-to-treat principles and a per protocol basis. Ethics and dissemination Ethical approval has been granted for this study. Results will be disseminated through peer-reviewed media. Trial registration number NCT03074604; Pre-results. Date and version identifier 10-Mar-2017 Original PMID:28698347

  17. Comparative efficacy of combination of 1 L polyethylene glycol, castor oil and ascorbic acid versus 2 L polyethylene glycol plus castor oil versus 3 L polyethylene glycol for colon cleansing before colonoscopy: Study protocol of a randomized, double-blind, single-center study.

    Science.gov (United States)

    Tian, Xu; Chen, Wei-Qing; Liu, Xiao-Ling; Chen, Hui; Liu, Bang-Lun; Pi, Yuan-Ping

    2018-04-01

    Colonoscopy has been regarded as an important method of early diagnosing and treating gastrointestinal lesions; however adequate bowel preparation is critical one of many factors needed for successful colonoscopy. Although several modified or novel regimes have been developed, desired quality of bowel preparation has not yet been generated. Scattered evidences revealed that castor oil may have potential of effectively cleansing colon. It is noted that, however, prospective trial of exploring the value of castor oil in preparing bowel before colonoscopy is lacking. The aims of this study are to test the hypotheses that low dose castor oil (30 mL) may enhance potential of polyethylene glycol (PEG) and combination of low castor oil and ascorbic acid may halve the volume of PEG.This is a randomized, double-blind (endoscopist and assessor), single center trial with three-arm design. We will randomly assign 282 adult patients (≥18 years but castor oil or combination of 1 L PEG, 30 mL castor oil and 5 g ascorbic acid. The bowel preparation quality based on Boston Bowel Preparation Scale (BBPS) is the primary outcome. The secondary outcomes include the first defecation time, total number of defecation, time of cecal intubation, detection rate of polyp and adenoma, willing to repeat the same regime, tolerance to regime, and adverse events.The study protocol has been approved by the Clinical Research Ethics Committees of Chongqing University Cancer Hospital & Chongqing Cancer Institute & Chongqing Cancer Hospital & Chongqing Cancer Center (2017[107]). The results from this trial will be submitted for publication in peer-reviewed journals, and will be presented at national and international conferences.

  18. CArbon dioxide surgical field flooding and aortic NO-touch off-pump coronary artery bypass grafting to reduce Neurological injuries after surgical coronary revascularisation (CANON): protocol for a randomised, controlled, investigator and patient blinded single-centre superiority trial with three parallel arms.

    Science.gov (United States)

    Krzysztof, Szwed; Wojciech, Pawliszak; Zbigniew, Serafin; Mariusz, Kowalewski; Remigiusz, Tomczyk; Damian, Perlinski; Magdalena, Szwed; Marta, Tomaszewska; Lech, Anisimowicz; Alina, Borkowska

    2017-07-10

    Neurological injuries remain a major concern following coronary artery bypass grafting (CABG) that offsets survival benefit of CABG over percutaneous coronary interventions. Among numerous efforts to combat this issue is the development of off-pump CABG (OPCABG) that obviates the need for extracorporeal circulation and is associated with improved neurological outcomes. The objective of this study is to examine whether the neuroprotective effect of OPCABG can be further pronounced by the use of two state-of-the-art operating techniques. In this randomised, controlled, investigator and patient blinded single-centre superiority trial with three parallel arms, a total of 360 patients will be recruited. They will be allocated in a 1:1:1 ratio to two treatment arms and one control arm. Treatment arms undergoing either aortic no-touch OPCABG or OPCABG with partial clamp applying carbon dioxide surgical field flooding will be compared against control arm undergoing OPCABG with partial clamp. The primary endpoint will be the appearance of new lesions on control brain MRI 3 days after surgery. Secondary endpoints will include the prevalence of new focal neurological deficits in the first 7 days after surgery, the occurrence of postoperative cognitive dysfunction at either 1 week or 3 months after surgery and the incidence of delirium in the first 7 days after surgery. Data will be analysed on intention-to-treat principles and a per protocol basis. Ethical approval has been granted for this study. Results will be disseminated through peer-reviewed media. NCT03074604; Pre-results. 10-Mar-2017 Original. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  19. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  20. Survey of protocols for the manual segmentation of the hippocampus: preparatory steps towards a joint EADC-ADNI harmonized protocol.

    Science.gov (United States)

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G; de Leon, Mony J; deToledo-Morrell, Leyla; Killiany, Ronald J; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C; Soininen, H; Watson, Craig; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B

    2011-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer's disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols' interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol.

  1. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  2. On the ARQ protocols over the Z-interference channels: Diversity-multiplexing-delay tradeoff

    KAUST Repository

    Nafea, Mohamed S.; Hamza, D.; Seddik, Karim G.; Nafie, Mohamed; Gamal, Hesham El

    2012-01-01

    We characterize the achievable three-dimensional tradeoff between diversity, multiplexing, and delay of the single antenna Automatic Retransmission reQuest (ARQ) Z-interference channel. Non-cooperative and cooperative ARQ protocols are adopted under

  3. Recyclable amplification for single-photon entanglement from photon loss and decoherence

    Science.gov (United States)

    Zhou, Lan; Chen, Ling-Quan; Zhong, Wei; Sheng, Yu-Bo

    2018-01-01

    We put forward a highly efficient recyclable single-photon assisted amplification protocol, which can protect single-photon entanglement (SPE) from photon loss and decoherence. Making use of quantum nondemolition detection gates constructed with the help of cross-Kerr nonlinearity, our protocol has some attractive advantages. First, the parties can recover less-entangled SPE to be maximally entangled SPE, and reduce photon loss simultaneously. Second, if the protocol fails, the parties can repeat the protocol to reuse some discarded items, which can increase the success probability. Third, when the protocol is successful, they can similarly repeat the protocol to further increase the fidelity of the SPE. Thereby, our protocol provides a possible way to obtain high entanglement, high fidelity and high success probability simultaneously. In particular, our protocol shows higher success probability in the practical high photon loss channel. Based on the above features, our amplification protocol has potential for future application in long-distance quantum communication.

  4. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  5. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  6. Authenticated Quantum Key Distribution with Collective Detection using Single Photons

    Science.gov (United States)

    Huang, Wei; Xu, Bing-Jie; Duan, Ji-Tong; Liu, Bin; Su, Qi; He, Yuan-Hang; Jia, Heng-Yue

    2016-10-01

    We present two authenticated quantum key distribution (AQKD) protocols by utilizing the idea of collective (eavesdropping) detection. One is a two-party AQKD protocol, the other is a multiparty AQKD protocol with star network topology. In these protocols, the classical channels need not be assumed to be authenticated and the single photons are used as the quantum information carriers. To achieve mutual identity authentication and establish a random key in each of the proposed protocols, only one participant should be capable of preparing and measuring single photons, and the main quantum ability that the rest of the participants should have is just performing certain unitary operations. Security analysis shows that these protocols are free from various kinds of attacks, especially the impersonation attack and the man-in-the-middle (MITM) attack.

  7. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  8. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  9. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  10. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  11. Semi-quantum Dialogue Based on Single Photons

    Science.gov (United States)

    Ye, Tian-Yu; Ye, Chong-Qiang

    2018-02-01

    In this paper, we propose two semi-quantum dialogue (SQD) protocols by using single photons as the quantum carriers, where one requires the classical party to possess the measurement capability and the other does not have this requirement. The security toward active attacks from an outside Eve in the first SQD protocol is guaranteed by the complete robustness of present semi-quantum key distribution (SQKD) protocols, the classical one-time pad encryption, the classical party's randomization operation and the decoy photon technology. The information leakage problem of the first SQD protocol is overcome by the classical party' classical basis measurements on the single photons carrying messages which makes him share their initial states with the quantum party. The security toward active attacks from Eve in the second SQD protocol is guaranteed by the classical party's randomization operation, the complete robustness of present SQKD protocol and the classical one-time pad encryption. The information leakage problem of the second SQD protocol is overcome by the quantum party' classical basis measurements on each two adjacent single photons carrying messages which makes her share their initial states with the classical party. Compared with the traditional information leakage resistant QD protocols, the advantage of the proposed SQD protocols lies in that they only require one party to have quantum capabilities. Compared with the existing SQD protocol, the advantage of the proposed SQD protocols lies in that they only employ single photons rather than two-photon entangled states as the quantum carriers. The proposed SQD protocols can be implemented with present quantum technologies.

  12. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  13. single crystals

    Indian Academy of Sciences (India)

    2018-05-18

    May 18, 2018 ... Abstract. 4-Nitrobenzoic acid (4-NBA) single crystals were studied for their linear and nonlinear optical ... studies on the proper growth, linear and nonlinear optical ..... between the optic axes and optic sign of the biaxial crystal.

  14. Single-step affinity purification for fungal proteomics.

    Science.gov (United States)

    Liu, Hui-Lin; Osmani, Aysha H; Ukil, Leena; Son, Sunghun; Markossian, Sarine; Shen, Kuo-Fang; Govindaraghavan, Meera; Varadaraj, Archana; Hashmi, Shahr B; De Souza, Colin P; Osmani, Stephen A

    2010-05-01

    A single-step protein affinity purification protocol using Aspergillus nidulans is described. Detailed protocols for cell breakage, affinity purification, and depending on the application, methods for protein release from affinity beads are provided. Examples defining the utility of the approaches, which should be widely applicable, are included.

  15. Single-Step Affinity Purification for Fungal Proteomics ▿ †

    OpenAIRE

    Liu, Hui-Lin; Osmani, Aysha H.; Ukil, Leena; Son, Sunghun; Markossian, Sarine; Shen, Kuo-Fang; Govindaraghavan, Meera; Varadaraj, Archana; Hashmi, Shahr B.; De Souza, Colin P.; Osmani, Stephen A.

    2010-01-01

    A single-step protein affinity purification protocol using Aspergillus nidulans is described. Detailed protocols for cell breakage, affinity purification, and depending on the application, methods for protein release from affinity beads are provided. Examples defining the utility of the approaches, which should be widely applicable, are included.

  16. Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol

    Directory of Open Access Journals (Sweden)

    Xing Hu

    2017-01-01

    Full Text Available In high diversity node situation, multichannel MAC protocol can improve the frequency efficiency, owing to fewer collisions compared with single-channel MAC protocol. And the performance of cyclic quorum-based multichannel (CQM MAC protocol is outstanding. Based on cyclic quorum system and channel slot allocation, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel-hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF, is proposed. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm. In addition, to improve the performance of CQM protocol in unsaturation situation, a dynamic channel slot allocation of CQM (DCQM protocol is proposed, based on wavelet neural network. Finally, the performance of CQM protocol and DCQM protocol is simulated by Qualnet platform. And the simulation results show that the analytic and simulation results match very well; the DCQM performs better in unsaturation situation.

  17. Minimal sampling protocol for accurate estimation of urea production: a study with oral [13C]urea in fed and fasted piglets

    NARCIS (Netherlands)

    Oosterveld, Michiel J. S.; Gemke, Reinoud J. B. J.; Dainty, Jack R.; Kulik, Willem; Jakobs, Cornelis; de Meer, Kees

    2005-01-01

    An oral [13C]urea protocol may provide a simple method for measurement of urea production. The validity of single pool calculations in relation to a reduced sampling protocol was assessed. In eight fed and five fasted piglets, plasma urea enrichments from a 10 h sampling protocol were measured

  18. Process tomography via sequential measurements on a single quantum system

    CSIR Research Space (South Africa)

    Bassa, H

    2015-09-01

    Full Text Available The authors utilize a discrete (sequential) measurement protocol to investigate quantum process tomography of a single two-level quantum system, with an unknown initial state, undergoing Rabi oscillations. The ignorance of the dynamical parameters...

  19. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  20. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  1. Chest magnetic resonance imaging: a protocol suggestion

    Directory of Open Access Journals (Sweden)

    Bruno Hochhegger

    2015-12-01

    Full Text Available Abstract In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation.

  2. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  3. Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2014-07-01

    OSPF (Open Shortest Path First and EIGRP (Enhanced Interior Gateway Routing Protocol are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost and metric compared with the simulation results. The result can be OSPF and EIGRP redistribution process. Value delay redistribution 1% better than OSPF and EIGRP 2-3% under traffic density dependent. In calculating the trace route redistribution is done 2 calculations, the cost for OSPF area and the area of the EIGRP metric. Making primary and alternate paths based on the packet delivery rate and the cost of the smallest metric, it is proved by calculation and simulation. Keywords: OSPF, EIGRP, Redistribution, Delay, Cost, Metric.

  4. Cost effectiveness of a protocol using palivizumab in preterm infants

    Directory of Open Access Journals (Sweden)

    Yolanda Hernández-Gago

    2017-03-01

    Full Text Available Objective: The main objective was to evaluate the cost-effectiveness of protocol use of palivizumab in premature established by consensus in our Hospital comparing it based on the recommendations of various Scientific Societies. As a secondary objective risk factors and severity of hospitalized patients attending the established protocol in our Hospital were analyzed. Methods: The study period was 4 seasons with the expanded protocol (retrospective data versus 2 with restricted or agreed protocol (prospective data. The perspective of the study was the Health System, including the costs of hospitalization and palivizumab our center. The calculation of the effectiveness was determined with the admission rate of premature patients stratified by weeks of gestational age <29, <32; and <35. For the analysis of risk factors and severity in patients admitted seasons with the new protocol are collected prospectively clinical data and environmental and social factors. Results: In the range of gestational age <29 years old and <32 greater effectiveness of the extended protocol was not demonstrated against the consensus. Only more effective for EG <35 in the accumulated data and comparing seasons 12/13 and 08/09 to 13/14 for individual data was observed. This range has an associated incremental cost effectiveness ratio of € 53 250,07 (range: € 14 793,39 to € 90 446,47 for singles data and € 50 525,53 (€ 28 688.22 to € 211 575,65 for accumulated. The establishment of this protocol in our center meant an average saving per season € 169 911,51. A cost- effectiveness of the extended protocol appropriate relationship is found if the cost of palivizumab per patient was less than € 1 206,67 (calculated for maximum use of the vial and a higher rate of hospitalization of 9.21%. Children entering the season with the new protocol (season 12/13 and 13/14 are 63.4% in children under 3 months and 90% are term infants who do not belong to any population at

  5. Experimental quantum tossing of a single coin

    International Nuclear Information System (INIS)

    Nguyen, A T; Frison, J; Massar, S; Huy, K Phan

    2008-01-01

    The cryptographic protocol of coin tossing consists of two parties, Alice and Bob, who do not trust each other, but want to generate a random bit. If the parties use a classical communication channel and have unlimited computational resources, one of them can always cheat perfectly. If the parties use a quantum communication channel, there exist protocols such that neither party can cheat perfectly, although they may be able to significantly bias the coin. Here, we analyze in detail how the performance of a quantum coin tossing experiment should be compared to classical protocols, taking into account the inevitable experimental imperfections. We then report an all-optical fiber experiment in which a single coin is tossed whose randomness is higher than achievable by any classical protocol and present some easily realizable cheating strategies by Alice and Bob

  6. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  7. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  8. Quantum private comparison with d-level single-particle states

    International Nuclear Information System (INIS)

    Yu, Chao-Hua; Guo, Gong-De; Lin, Song

    2013-01-01

    In this paper, a quantum private comparison protocol with d-level single-particle states is proposed. In the protocol, a semi-honest third party is introduced to help two participants compare the size relationship of their secrets without revealing them to any other people. It is shown that the protocol is secure in theory. Moreover, the security of the protocol in real circumstance is also discussed. (paper)

  9. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  10. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  11. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  12. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  13. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  14. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  15. High Entropy Random Selection Protocols

    NARCIS (Netherlands)

    H. Buhrman (Harry); M. Christandl (Matthias); M. Koucky (Michal); Z. Lotker (Zvi); B. Patt-Shamir; M. Charikar; K. Jansen; O. Reingold; J. Rolim

    2007-01-01

    textabstractIn this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome.

  16. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  17. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  18. Highly multiplexed targeted DNA sequencing from single nuclei.

    Science.gov (United States)

    Leung, Marco L; Wang, Yong; Kim, Charissa; Gao, Ruli; Jiang, Jerry; Sei, Emi; Navin, Nicholas E

    2016-02-01

    Single-cell DNA sequencing methods are challenged by poor physical coverage, high technical error rates and low throughput. To address these issues, we developed a single-cell DNA sequencing protocol that combines flow-sorting of single nuclei, time-limited multiple-displacement amplification (MDA), low-input library preparation, DNA barcoding, targeted capture and next-generation sequencing (NGS). This approach represents a major improvement over our previous single nucleus sequencing (SNS) Nature Protocols paper in terms of generating higher-coverage data (>90%), thereby enabling the detection of genome-wide variants in single mammalian cells at base-pair resolution. Furthermore, by pooling 48-96 single-cell libraries together for targeted capture, this approach can be used to sequence many single-cell libraries in parallel in a single reaction. This protocol greatly reduces the cost of single-cell DNA sequencing, and it can be completed in 5-6 d by advanced users. This single-cell DNA sequencing protocol has broad applications for studying rare cells and complex populations in diverse fields of biological research and medicine.

  19. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  20. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  1. Singled out?

    Science.gov (United States)

    Waller, Frank

    2004-03-01

    The increasing use of single use medical devices is being driven by a growing awareness of iatrogenic (from the Greek; caused by the doctor) and nosocomial infections. Public health perceptions relating to transmissible spongiform encephalopathies, specifically variant Creutzfeldt-Jakob disease (vCJD), the Human Immunodeficiency Virus (HIV) and Hepatitis B are high on the political agenda and a matter of concern to healthcare professionals.

  2. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  3. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  4. Carboplatin hypersensitivity: evaluation and successful desensitization protocol.

    Science.gov (United States)

    Bruchim, Ilan; Goldberg, Arnon; Fishman, Ami; Confino-Cohen, Ronit

    2014-01-01

    Carboplatin-induced immediate hypersensitivity reactions are relatively common among patients with gynecological malignancies. Once this occurs, the patient might be at risk for future carboplatin-induced reactions. This study evaluated the efficacy of allergic consultation, carboplatin skin testing and desensitization as a single intervention strategy in this population. Patients with a well-documented immediate reaction to carboplatin were offered allergy consultation, carboplatin skin testing and a desensitization plan in a single visit between scheduled chemotherapy sessions. Fifty-five patients with an immediate reaction were evaluated. After allergist assessment, 44 (89%) of 49 patients skin tested had a positive result. A total of 207 carboplatin desensitization cycles were administered to 49 women. Among them, 10 patients had a mild immediate hypersensitivity reaction during desensitization. Five patients subsequently tolerated carboplatin administered in the prolonged desensitization protocol. In the data presented, we propose a strategy that is both cost effective and very convenient for the patient. The diagnostic procedure, including allergist consultation and skin test, can be completed in less than 2 h. In most cases where carboplatin is indispensable, desensitization can be administered without overnight hospitalization.

  5. Update protocols for evaluating nuclear cardiology and management of coronary heart disease. Chilean Society of Cardiology and Cardiovascular Surgery

    International Nuclear Information System (INIS)

    Massardo, Teresa; Jaimovich, Rodrigo; Canessa, Jose; Castro, Gabriel; Soto, Juan Ramon

    2010-01-01

    Protocols are reviewed nuclear cardiology present, with emphasis on imaging studies Single photon ( S PECT ) myocardial perfusion mainly in assessment of coronary heart disease (EC). The indications and protocols used are detailed as well as the literature review relevant both to clinical use as a quality control and interpretation of studies

  6. Dosimetric evaluation of cone beam computed tomography scanning protocols

    International Nuclear Information System (INIS)

    Soares, Maria Rosangela

    2015-01-01

    It was evaluated the cone beam computed tomography, CBCT scanning protocols, that was introduced in dental radiology at the end of the 1990's, and quickly became a fundamental examination for various procedures. Its main characteristic, the difference of medical CT is the beam shape. This study aimed to calculate the absorbed dose in eight tissues / organs of the head and neck, and to estimate the effective dose in 13 protocols and two techniques (stitched FOV e single FOV) of 5 equipment of different manufacturers of cone beam CT. For that purpose, a female anthropomorphic phantom was used, representing a default woman, in which were inserted thermoluminescent dosimeters at several points, representing organs / tissues with weighting values presented in the standard ICRP 103. The results were evaluated by comparing the dose according to the purpose of the tomographic image. Among the results, there is a difference up to 325% in the effective dose in relation to protocols with the same image goal. In relation to the image acquisition technique, the stitched FOV technique resulted in an effective dose of 5.3 times greater than the single FOV technique for protocols with the same image goal. In the individual contribution, the salivary glands are responsible for 31% of the effective dose in CT exams. The remaining tissues have also a significant contribution, 36%. The results drew attention to the need of estimating the effective dose in different equipment and protocols of the market, besides the knowledge of the radiation parameters and equipment manufacturing engineering to obtain the image. (author)

  7. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  8. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  9. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  10. Quantum broadcast communication and authentication protocol with a quantum one-time pad

    International Nuclear Information System (INIS)

    Chang Yan; Xu Chun-Xiang; Zhang Shi-Bin; Yan Li-Li

    2014-01-01

    A quantum broadcast communication and authentication protocol with a quantum one-time pad based on the Greenberger—Horne—Zeilinger state is proposed. A binary string is used to express the identity of the receiver, which is encoded as a single sequence of photons. The encoded photon sequence acts as a detection sequence and implements authentication. An XOR operation serves as a one-time pad and is used to ensure the security of the protocol. The binary string is reused even in a noisy channel and proves to be unconditionally secure. In contrast with the protocols proposed by Wang et al. [Chin. Phys. 16 1868 (2007)] and Yang et al. [Chin. Phys. B 19 070304 (2010)], the protocol in this study implements the identity authentication with a reusable binary string; no hash function or local unitary operation is used. The protocol in this study is also easier to implement and highly efficient without losing security. (general)

  11. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  12. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  13. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    : multiple tries with invalid passwords caused the expected error message (too many retries). but let the user nevertheless pass. Finally, security can be compromised by silly implementation bugs or design decisions. In a commercial VPN software, all calls to the encryption routines were incidentally replaced by stubs, probably during factory testing. The product worked nicely. and the error (an open VPN) would have gone undetected, if a team member had not inspected the low-level traffic out of curiosity. Also, the use secret proprietary encryption routines can backfire, because such algorithms often exhibit weaknesses which can be exploited easily (see e.g., DVD encoding). Summarizing, there is large number of possibilities to make errors which can compromise the security of a protocol. In today s world with short time-to-market and the use of security protocols in open and hostile networks for safety-critical applications (e.g., power or air-traffic control), such slips could lead to catastrophic situations. Thus, formal methods and automatic reasoning techniques should not be used just for the formal proof of absence of an attack, but they ought to be used to provide an end-to-end tool-supported framework for security software. With such an approach all required artifacts (code, documentation, test cases) , formal analyses, and reliable certification will be generated automatically, given a single, high level specification. By a combination of program synthesis, formal protocol analysis, certification; and proof-carrying code, this goal is within practical reach, since all the important technologies for such an approach actually exist and only need to be assembled in the right way.

  14. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  15. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  16. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  17. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  18. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  19. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  20. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  1. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  2. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  3. The RAPID protocol enhances patient recovery after both laparoscopic and open colorectal resections.

    LENUS (Irish Health Repository)

    Lloyd, G M

    2010-06-01

    Enhanced recovery after surgery (ERAS) programs can accelerate recovery and shorten the hospital stay after colorectal resections. The RAPID (remove, ambulate, postoperative analgesia, introduce diet) protocol is a simplified ERAS program that consists of a simplified, user-friendly single-page pro forma schedule. This study aimed to evaluate the impact of the RAPID protocol on patients undergoing both laparoscopic and open colorectal resections in two specialized colorectal units.

  4. Evaluation of Two Estrus Synchronization Protocols in Dairy Cattle at North Shoa Zone Ethiopia

    OpenAIRE

    Chanyalew, Yeshimebet; Zewde, Tesfaye; Gatew, Hulunim; Girma, Lina; Kassa, Getachew; Demis, Chekol; Bihon, Amare; Tsegaye, Yeshak

    2017-01-01

    This study was initiated to change the hesitation of the farmer on the effectiveness of estrus synchronization under their (Ethiopian small holder) livestock management system using two synchronization protocols. Non-pregnant animals with normal reproductive tract and that fulfilled the preconditions for estrus synchronization were considered for treatment & assigned into two synchronization protocols (single PGF2α injection; and double PGF2α injection). Among 94 (27 heifer and 67 cows) synch...

  5. Asynchronous transfer mode and Local Area Network emulation standards, protocols, and security implications

    OpenAIRE

    Kirwin, John P.

    1999-01-01

    A complex networking technology called Asynchronous Transfer Mode (ATM) and a networking protocol called Local Area Network Emulation (LANE) are being integrated into many naval networks without any security-driven naval configuration guidelines. No single publication is available that describes security issues of data delivery and signaling relating to the transition of Ethernet to LANE and ATM. The thesis' focus is to provide: (1) an overview and security analysis of standardized protocols ...

  6. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  7. Experimental protocol for packaging and encrypting multiple data

    International Nuclear Information System (INIS)

    Barrera, John Fredy; Trejos, Sorayda; Tebaldi, Myrian; Torroba, Roberto

    2013-01-01

    We present a novel single optical packaging and encryption (SOPE) procedure for multiple inputs. This procedure is based on a merging of a 2f scheme with a digital holographic technique to achieve efficient handling of multiple data. Through the 2f system with a random phase mask attached in its input plane, and the holographic technique, we obtain each processed input. A posteriori filtering and repositioning protocol on each hologram followed by an addition of all processed data, allows storing these data to form a single package. The final package is digitally multiplied by a second random phase mask acting as an encryption mask. In this way, the final user receives only one encrypted information unit and a single key, instead of a conventional multiple-image collecting method and several keys. Processing of individual images is cast into an optimization problem. The proposed optimization aims to simplify the handling and recovery of images while packing all of them into a single unit. The decoding process does not have the usual cross-talk or noise problems involved in other methods, as filtering and repositioning precedes the encryption step. All data are recovered in just one step at the same time by applying a simple Fourier transform operation and the decoding key. The proposed protocol takes advantage of optical processing and the versatility of the digital format. Experiments have been conducted using a Mach–Zehnder interferometer. An application is subsequently demonstrated to illustrate the feasibility of the SOPE procedure. (paper)

  8. A False-name-Proof Double Auction Protocol for Arbitrary Evaluation Values

    Science.gov (United States)

    Sakurai, Yuko; Yokoo, Makoto

    We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategy-proofness by incorporating the possibility of false-name bids, e.g., bids submitted using multiple e-mail addresses. An existing protocol called TPD protocol is false-name-proof but can handle only the cases where marginal utilities of each agent always decrease, while our new GTPD protocol can handle arbitrary evaluation values. When marginal utilities can increase, some bids cannot be divided into a single unit (e.g., an all-or-nothing bid). Due to the existence of such indivisible bids, meeting supply/demand becomes difficult. Furthermore, a seller/buyer can submit a false-name-bid by pretending to be a potential buyer/seller to manipulate allocations and payments. In the GTPD protocol, the auctioneer is required to absorb the supply-demand imbalance up to a given upper-bound. Also, the GTPD incorporate a new false-name-proof one-sided auction protocol that is guaranteed to sell/buy a certain number of units. Simulation results show that when the threshold price is set appropriately, this protocol can obtain a good social surplus, and the number of absorbed units is much smaller than the given upper-bound.

  9. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  10. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  11. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  12. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  13. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  14. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  15. Protein blotting protocol for beginners.

    Science.gov (United States)

    Petrasovits, Lars A

    2014-01-01

    The transfer and immobilization of biological macromolecules onto solid nitrocellulose or nylon (polyvinylidene difluoride (PVDF)) membranes subsequently followed by specific detection is referred to as blotting. DNA blots are called Southerns after the inventor of the technique, Edwin Southern. By analogy, RNA blots are referred to as northerns and protein blots as westerns (Burnette, Anal Biochem 112:195-203, 1981). With few exceptions, western blotting involves five steps, namely, sample collection, preparation, separation, immobilization, and detection. In this chapter, protocols for the entire process from sample collection to detection are described.

  16. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  17. Blockchain protocols in clinical trials: Transparency and traceability of consent

    Science.gov (United States)

    Benchoufi, Mehdi; Porcher, Raphael; Ravaud, Philippe

    2018-01-01

    Clinical trial consent for protocols and their revisions should be transparent for patients and traceable for stakeholders. Our goal is to implement a process allowing for collection of patients’ informed consent, which is bound to protocol revisions, storing and tracking the consent in a secure, unfalsifiable and publicly verifiable way, and enabling the sharing of this information in real time. For that, we build a consent workflow using a trending technology called Blockchain. This is a distributed technology that brings a built-in layer of transparency and traceability. From a more general and prospective point of view, we believe Blockchain technology brings a paradigmatical shift to the entire clinical research field. We designed a Proof-of-Concept protocol consisting of time-stamping each step of the patient’s consent collection using Blockchain, thus archiving and historicising the consent through cryptographic validation in a securely unfalsifiable and transparent way. For each protocol revision, consent was sought again.  We obtained a single document, in an open format, that accounted for the whole consent collection process: a time-stamped consent status regarding each version of the protocol. This document cannot be corrupted and can be checked on any dedicated public website. It should be considered a robust proof of data. However, in a live clinical trial, the authentication system should be strengthened to remove the need for third parties, here trial stakeholders, and give participative control to the peer users. In the future, the complex data flow of a clinical trial could be tracked by using Blockchain, which core functionality, named Smart Contract, could help prevent clinical trial events not occurring in the correct chronological order, for example including patients before they consented or analysing case report form data before freezing the database. Globally, Blockchain could help with reliability, security, transparency and could be

  18. Blockchain protocols in clinical trials: Transparency and traceability of consent.

    Science.gov (United States)

    Benchoufi, Mehdi; Porcher, Raphael; Ravaud, Philippe

    2017-01-01

    Clinical trial consent for protocols and their revisions should be transparent for patients and traceable for stakeholders. Our goal is to implement a process allowing for collection of patients' informed consent, which is bound to protocol revisions, storing and tracking the consent in a secure, unfalsifiable and publicly verifiable way, and enabling the sharing of this information in real time. For that, we build a consent workflow using a trending technology called Blockchain. This is a distributed technology that brings a built-in layer of transparency and traceability. From a more general and prospective point of view, we believe Blockchain technology brings a paradigmatical shift to the entire clinical research field. We designed a Proof-of-Concept protocol consisting of time-stamping each step of the patient's consent collection using Blockchain, thus archiving and historicising the consent through cryptographic validation in a securely unfalsifiable and transparent way. For each protocol revision, consent was sought again.  We obtained a single document, in an open format, that accounted for the whole consent collection process: a time-stamped consent status regarding each version of the protocol. This document cannot be corrupted and can be checked on any dedicated public website. It should be considered a robust proof of data. However, in a live clinical trial, the authentication system should be strengthened to remove the need for third parties, here trial stakeholders, and give participative control to the peer users. In the future, the complex data flow of a clinical trial could be tracked by using Blockchain, which core functionality, named Smart Contract, could help prevent clinical trial events not occurring in the correct chronological order, for example including patients before they consented or analysing case report form data before freezing the database. Globally, Blockchain could help with reliability, security, transparency and could be a

  19. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  20. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  1. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  2. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  3. Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2016-02-01

    Full Text Available Abstrak OSPF (Open Shortest Path First dan EIGRP (Enhanced Interior Gateway Routing Protocol adalah dua routing protokol yang banyak digunakan dalam jaringan komputer. Perbedaan karakteristik antar routing protokol menimbulkan masalah dalam pengiriman paket data. Teknik redistribution adalah solusi untuk melakukan komunikasi antar routing protokol. Dengan menggunakan software Cisco Packet Tracer 5.3 pada penelitian ini dibuat simulasi OSPF dan EIGRP yang dihubungkan oleh teknik redistribution, kemudian dibandingkan kualitasnya dengan single routing protokol EIGRP dan OSPF. Parameter pengujian dalam penelitian ini adalah nilai time delay dan trace route. Nilai trace route berdasarkan perhitungan langsung cost dan metric dibandingkan dengan hasil simulasi. Hasilnya dapat dilakukan proses redistribution OSPF dan EIGRP. Nilai delay redistribution lebih baik 1% dibanding OSPF dan 2-3% di bawah EIGRP tergantung kepadatan traffic. Dalam perhitungan trace route redistribution dilakukan 2 perhitungan, yaitu cost untuk area OSPF dan metric pada area EIGRP. Pengambilan jalur utama dan alternatif pengiriman paket berdasarkan nilai cost dan metric yang terkecil, hal ini terbukti berdasarkan perhitungan dan simulasi. Kata kunci: OSPF, EIGRP, Redistribution, Delay, Cost, Metric. Abstract OSPF (Open Shortest Path First and EIGRP (Enhanced Interior Gateway Routing Protocol are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost

  4. A novel protocol for dispatcher assisted CPR improves CPR quality and motivation among rescuers-A randomized controlled simulation study.

    Science.gov (United States)

    Rasmussen, Stinne Eika; Nebsbjerg, Mette Amalie; Krogh, Lise Qvirin; Bjørnshave, Katrine; Krogh, Kristian; Povlsen, Jonas Agerlund; Riddervold, Ingunn Skogstad; Grøfte, Thorbjørn; Kirkegaard, Hans; Løfgren, Bo

    2017-01-01

    Emergency dispatchers use protocols to instruct bystanders in cardiopulmonary resuscitation (CPR). Studies changing one element in the dispatcher's protocol report improved CPR quality. Whether several changes interact is unknown and the effect of combining multiple changes previously reported to improve CPR quality into one protocol remains to be investigated. We hypothesize that a novel dispatch protocol, combining multiple beneficial elements improves CPR quality compared with a standard protocol. A novel dispatch protocol was designed including wording on chest compressions, using a metronome, regular encouragements and a 10-s rest each minute. In a simulated cardiac arrest scenario, laypersons were randomized to perform single-rescuer CPR guided with the novel or the standard protocol. a composite endpoint of time to first compression, hand position, compression depth and rate and hands-off time (maximum score: 22 points). Afterwards participants answered a questionnaire evaluating the dispatcher assistance. The novel protocol (n=61) improved CPR quality score compared with the standard protocol (n=64) (mean (SD): 18.6 (1.4)) points vs. 17.5 (1.7) points, pCPR. A novel bundle of care protocol improved CPR quality score and motivation among rescuers. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  5. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  6. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  7. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  8. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  9. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  10. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  11. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  12. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  13. An Hourly Dose-Escalation Desensitization Protocol for Aspirin-Exacerbated Respiratory Disease.

    Science.gov (United States)

    Chen, Justin R; Buchmiller, Brett L; Khan, David A

    2015-01-01

    Aspirin desensitization followed by maintenance therapy effectively improves symptom control in patients with aspirin exacerbated respiratory disease (AERD). The majority of current desensitization protocols use 3-hour dosing intervals and often require 2 to 3 days to complete. We evaluated hourly dose escalations in a subset of patients with chronic rhinosinusitis, nasal polyps, and asthma who historically reacted to aspirin within 1 hour or were avoiding aspirin with the goal of developing a safe and efficient desensitization protocol. Fifty-seven aspirin desensitizations were performed under the hourly protocol. All patients had refractory nasal polyposis as an indication for aspirin desensitization. The clinical characteristics of each subject were analyzed in relation to aspects of his or her reactions during the procedure. Ninety-eight percent of study patients were successfully treated under the hourly protocol, including those with a history of severe reactions and intubation. None required further medication than is available in an outpatient allergy clinic. A total of 96% of reactors recorded a bronchial or naso-ocular reaction within 1 hour of the preceding dose. Of the total patients on this protocol, 40% were able to complete the procedure in a single day, and 60% within 2 days. Patients with AERD who have a history of symptoms less than 1 hour after aspirin exposure can be safely desensitized with a 1-hour dose-escalation protocol that can often be completed in a single day. Copyright © 2015 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  14. Telomerase Repeated Amplification Protocol (TRAP).

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W

    2015-11-20

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al. , 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC - counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al. , 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  15. Efficient electronic entanglement concentration assisted by single mobile electrons

    International Nuclear Information System (INIS)

    Sheng Yu-Bo; Zhou Lan

    2013-01-01

    We present an efficient entanglement concentration protocol (ECP) for mobile electrons with charge detection. This protocol is quite different from other ECPs for one can obtain a maximally entangled pair from a pair of less-entangled state and a single mobile electron with a certain probability. With the help of charge detection, it can be repeated to reach a higher success probability. It also does not need to know the coefficient of the original less-entangled states. All these advantages may make this protocol useful in current distributed quantum information processing

  16. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  17. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  18. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  19. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  20. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  1. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  2. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  3. Software for simulating IMRT protocol

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de, E-mail: tcff@ufmg.b, E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Nuclear

    2009-07-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  4. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de

    2009-01-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  5. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    Prayer, Daniela; Brugger, Peter Christian; Prayer, Lucas

    2004-01-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  6. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  7. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  8. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  9. Lyceum: A Multi-Protocol Digital Library Gateway

    Science.gov (United States)

    Maa, Ming-Hokng; Nelson, Michael L.; Esler, Sandra L.

    1997-01-01

    Lyceum is a prototype scalable query gateway that provides a logically central interface to multi-protocol and physically distributed, digital libraries of scientific and technical information. Lyceum processes queries to multiple syntactically distinct search engines used by various distributed information servers from a single logically central interface without modification of the remote search engines. A working prototype (http://www.larc.nasa.gov/lyceum/) demonstrates the capabilities, potentials, and advantages of this type of meta-search engine by providing access to over 50 servers covering over 20 disciplines.

  10. Optimal linear detectors for nonorthogonal amplify-and-forward protocol

    KAUST Repository

    Ahmed, Qasim Zeeshan; Park, Kihong; Alouini, Mohamed-Slim; Aissa, Sonia

    2013-01-01

    In this paper, we propose optimal linear detectors for non-orthogonal amplify-and-forward cooperative protocol when considering a single-relay scenario. Two types of detectors are proposed based on the principles of minimum mean square error (MMSE) and minimum bit error rate (MBER). The MMSE detector minimizes the mean square error, while the MBER minimizes the system bit error rate (BER). Both detectors exhibit excellent BER performance with relatively low complexity as compared to the maximal likelihood (ML) detector. The BER performance of both detectors is superior to the channel inversion, the maximal ratio combining, and the biased ML detectors. © 2013 IEEE.

  11. Optimal linear detectors for nonorthogonal amplify-and-forward protocol

    KAUST Repository

    Ahmed, Qasim Zeeshan

    2013-06-01

    In this paper, we propose optimal linear detectors for non-orthogonal amplify-and-forward cooperative protocol when considering a single-relay scenario. Two types of detectors are proposed based on the principles of minimum mean square error (MMSE) and minimum bit error rate (MBER). The MMSE detector minimizes the mean square error, while the MBER minimizes the system bit error rate (BER). Both detectors exhibit excellent BER performance with relatively low complexity as compared to the maximal likelihood (ML) detector. The BER performance of both detectors is superior to the channel inversion, the maximal ratio combining, and the biased ML detectors. © 2013 IEEE.

  12. Heralded noiseless amplification for single-photon entangled state with polarization feature

    Science.gov (United States)

    Wang, Dan-Dan; Jin, Yu-Yu; Qin, Sheng-Xian; Zu, Hao; Zhou, Lan; Zhong, Wei; Sheng, Yu-Bo

    2018-03-01

    Heralded noiseless amplification is a promising method to overcome the transmission photon loss in practical noisy quantum channel and can effectively lengthen the quantum communication distance. Single-photon entanglement is an important resource in current quantum communications. Here, we construct two single-photon-assisted heralded noiseless amplification protocols for the single-photon two-mode entangled state and single-photon three-mode W state, respectively, where the single-photon qubit has an arbitrary unknown polarization feature. After the amplification, the fidelity of the single-photon entangled state can be increased, while the polarization feature of the single-photon qubit can be well remained. Both the two protocols only require the linear optical elements, so that they can be realized under current experimental condition. Our protocols may be useful in current and future quantum information processing.

  13. Augmented Quadruple-Phase Contrast Media Administration and Triphasic Scan Protocol Increases Image Quality at Reduced Radiation Dose During Computed Tomography Urography.

    Science.gov (United States)

    Saade, Charbel; Mohamad, May; Kerek, Racha; Hamieh, Nadine; Alsheikh Deeb, Ibrahim; El-Achkar, Bassam; Tamim, Hani; Abdul Razzak, Farah; Haddad, Maurice; Abi-Ghanem, Alain S; El-Merhi, Fadi

    The aim of this article was to investigate the opacification of the renal vasculature and the urogenital system during computed tomography urography by using a quadruple-phase contrast media in a triphasic scan protocol. A total of 200 patients with possible urinary tract abnormalities were equally divided between 2 protocols. Protocol A used the conventional single bolus and quadruple-phase scan protocol (pre, arterial, venous, and delayed), retrospectively. Protocol B included a quadruple-phase contrast media injection with a triphasic scan protocol (pre, arterial and combined venous, and delayed), prospectively. Each protocol used 100 mL contrast and saline at a flow rate of 4.5 mL. Attenuation profiles and contrast-to-noise ratio of the renal arteries, veins, and urogenital tract were measured. Effective radiation dose calculation, data analysis by independent sample t test, receiver operating characteristic, and visual grading characteristic analyses were performed. In arterial circulation, only the inferior interlobular arteries in both protocols showed a statistical significance (P contrast-to-noise ratio than protocol A (protocol B: 22.68 ± 13.72; protocol A: 14.75 ± 5.76; P contrast media and triphasic scan protocol usage increases the image quality at a reduced radiation dose.

  14. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  15. Measurement and protocol for evaluating video and still stabilization systems

    Science.gov (United States)

    Cormier, Etienne; Cao, Frédéric; Guichard, Frédéric; Viard, Clément

    2013-01-01

    This article presents a system and a protocol to characterize image stabilization systems both for still images and videos. It uses a six axes platform, three being used for camera rotation and three for camera positioning. The platform is programmable and can reproduce complex motions that have been typically recorded by a gyroscope mounted on different types of cameras in different use cases. The measurement uses a single chart for still image and videos, the texture dead leaves chart. Although the proposed implementation of the protocol uses a motion platform, the measurement itself does not rely on any specific hardware. For still images, a modulation transfer function is measured in different directions and is weighted by a contrast sensitivity function (simulating the human visual system accuracy) to obtain an acutance. The sharpness improvement due to the image stabilization system is a good measurement of performance as recommended by a CIPA standard draft. For video, four markers on the chart are detected with sub-pixel accuracy to determine a homographic deformation between the current frame and a reference position. This model describes well the apparent global motion as translations, but also rotations along the optical axis and distortion due to the electronic rolling shutter equipping most CMOS sensors. The protocol is applied to all types of cameras such as DSC, DSLR and smartphones.

  16. A markerless protocol for genetic analysis of Aggregatibacter actinomycetemcomitans

    Science.gov (United States)

    Cheng, Ya-An; Jee, Jason; Hsu, Genie; Huang, Yanyan; Chen, Casey; Lin, Chun-Pin

    2015-01-01

    Background/Purpose The genomes of different Aggregatibacter actinomycetemcomitans strains contain many strain-specific genes and genomic islands (defined as DNA found in some but not all strains) of unknown functions. Genetic analysis for the functions of these islands will be constrained by the limited availability of genetic markers and vectors for A. actinomycetemcomitans. In this study we tested a novel genetic approach of gene deletion and restoration in a naturally competent A. actinomycetemcomitans strain D7S-1. Methods Specific genes’ deletion mutants and mutants restored with the deleted genes were constructed by a markerless loxP/Cre system. In mutants with sequential deletion of multiple genes loxP with different spacer regions were used to avoid unwanted recombinations between loxP sites. Results Eight single-gene deletion mutants, four multiple-gene deletion mutants, and two mutants with restored genes were constructed. No unintended non-specific deletion mutants were generated by this protocol. The protocol did not negatively affect the growth and biofilm formation of A. actinomycetemcomitans. Conclusion The protocol described in this study is efficient and specific for genetic manipulation of A. actinomycetemcomitans, and will be amenable for functional analysis of multiple genes in A. actinomycetemcomitans. PMID:24530245

  17. Formal description of the jumpstart just-in-time signaling protocol using EFSM

    Science.gov (United States)

    Zaim, A. H.; Baldine, Ilia; Cassada, Mark; Rouskas, George N.; Perros, Harry G.; Stevenson, Daniel S.

    2002-07-01

    We present a formal protocol description for a Just-In-Time (JIT) signaling scheme running over a core dWDM network which utilizes Optical Burst Switches (OBS). We apply an eight-tuple extended finite state machine (EFSM) model to formally specify the protocol. Using the EFSM model, we define the communication between a source client node and a destination client node through an ingress and one or multiple intermediate switches. We worked on single burst connections that means setting up the connection just before sending a single burst and then closing the connection as soon as the burst is sent. The communication between the EFSMs is handled through message transfer between protocol entities.

  18. Advanced CUBIC protocols for whole-brain and whole-body clearing and imaging.

    Science.gov (United States)

    Susaki, Etsuo A; Tainaka, Kazuki; Perrin, Dimitri; Yukinaga, Hiroko; Kuno, Akihiro; Ueda, Hiroki R

    2015-11-01

    Here we describe a protocol for advanced CUBIC (Clear, Unobstructed Brain/Body Imaging Cocktails and Computational analysis). The CUBIC protocol enables simple and efficient organ clearing, rapid imaging by light-sheet microscopy and quantitative imaging analysis of multiple samples. The organ or body is cleared by immersion for 1-14 d, with the exact time required dependent on the sample type and the experimental purposes. A single imaging set can be completed in 30-60 min. Image processing and analysis can take whole-brain neural activities at single-cell resolution using Arc-dVenus transgenic (Tg) mice. CUBIC informatics calculated the Venus signal subtraction, comparing different brains at a whole-organ scale. These protocols provide a platform for organism-level systems biology by comprehensively detecting cells in a whole organ or body.

  19. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  20. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  1. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  2. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  3. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  4. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  5. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  6. Quantification of platelets obtained by different centrifugation protocols in SHR rats

    OpenAIRE

    João Alberto Yazigi Junior; João Baptista Gomes dos Santos; Bruno Rodrigues Xavier; Marcela Fernandes; Sandra Gomes Valente; Vilnei Mattiolli Leite

    2015-01-01

    ABSTRACT OBJECTIVE: To quantify the platelet concentration in the blood of SHR rats, by means of different centrifugation protocols, and to evaluate what the most effective method for obtaining platelets is. METHODS: We used 40 male rats of the isogenic SHR lineage. The animals were divided into three groups: control, using whole blood without centrifugation; single centrifugation, using whole blood subjected to a single centrifugation at 200 × gand 400 × g; and double centrifugation, usin...

  7. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  8. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  9. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  10. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  11. Results of ERAS protocol in patients with colorectal cancer

    Directory of Open Access Journals (Sweden)

    A. O. Rasulov

    2016-01-01

    Full Text Available Objective: explore the use of enhanced recovery after surgery (ERAS in the treatment of patients with colorectal cancer, evaluate its efficacy and safety.Materials and methods. Prospective, single-site, randomized study for the implementation of enhanced recovery after surgery in patients with colorectal cancer has been conducted from October 2014 till the present time. All patients after laparoscopic surgeries undergo treatment according to ERAS protocol, patients after open surgeries are randomized (1:1 in groups of the standard treatment or treatment according to ERAS protocol. The study included patients with localized and locally disseminated colorectal cancer aged from 18 to 75 years, ECOG score ≤ 2. The primary evaluated parameters were the following: the number of postoperative complications (according to Clavien– Dindo classification, postoperative hospital days, incidence of complications and mortality in the 30-day period, timing of activation.Results. Up to date, the study includes 105 patients: laparoscopic group – 51 patients, open-surgery group of patients treated by ERAS protocol – 27 patients, open-surgery group of patients with the standard post-op treatment – 26 patients. Complications requiring emergency surgery for anastomotic leak (p = 0.159 developed in 3.7 % of patients with the standard post-op treatment and in 3.9 % of patients after laparoscopic surgery, while 1 patient required repeat hospitalization. The total number of complications was significantly lower in opensurgery group of patients treated by ERAS protocol compared with the standard post-op treatment (p = 0.021. However, there were no differences between laparoscopic and open-surgery group with the standard post-op treatment (p = 0.159. An average hospitalization stay in patients with the standard post-op treatment was equal to 10 days compared to 7 days in patients treated by ERAS protocol (p = 0.067 and 6 days after laparoscopic

  12. Next generation internet protocol marks shattered in Internet2 land speed record competition

    CERN Multimedia

    2003-01-01

    "An international team set new Internet2 Land Speed Records using next generation Internet Protocols (IPv6) by achieving 983 megabits-per-second with a single IPv6 stream for more than an hour across a distance of 7,067 kilometers (more than 4,000 miles) from Geneva, Switzerland to Chicago, Ill." (1 page).

  13. Abbreviated Combined MR Protocol: A New Faster Strategy for Characterizing Breast Lesions.

    Science.gov (United States)

    Moschetta, Marco; Telegrafo, Michele; Rella, Leonarda; Stabile Ianora, Amato Antonio; Angelelli, Giuseppe

    2016-06-01

    The use of an abbreviated magnetic resonance (MR) protocol has been recently proposed for cancer screening. The aim of our study is to evaluate the diagnostic accuracy of an abbreviated MR protocol combining short TI inversion recovery (STIR), turbo-spin-echo (TSE)-T2 sequences, a pre-contrast T1, and a single intermediate (3 minutes after contrast injection) post-contrast T1 sequence for characterizing breast lesions. A total of 470 patients underwent breast MR examination for screening, problem solving, or preoperative staging. Two experienced radiologists evaluated both standard and abbreviated protocols in consensus. Sensitivity, specificity, positive predictive value (PPV), negative predictive value (NPV), and diagnostic accuracy for both protocols were calculated (with the histological findings and 6-month ultrasound follow-up as the reference standard) and compared with the McNemar test. The post-processing and interpretation times for the MR images were compared with the paired t test. In 177 of 470 (38%) patients, the MR sequences detected 185 breast lesions. Standard and abbreviated protocols obtained sensitivity, specificity, diagnostic accuracy, PPV, and NPV values respectively of 92%, 92%, 92%, 68%, and 98% and of 89%, 91%, 91%, 64%, and 98% with no statistically significant difference (P < .0001). The mean post-processing and interpretation time were, respectively, 7 ± 1 minutes and 6 ± 3.2 minutes for the standard protocol and 1 ± 1.2 minutes and 2 ± 1.2 minutes for the abbreviated protocol, with a statistically significant difference (P < .01). An abbreviated combined MR protocol represents a time-saving tool for radiologists and patients with the same diagnostic potential as the standard protocol in patients undergoing breast MRI for screening, problem solving, or preoperative staging. Copyright © 2016 Elsevier Inc. All rights reserved.

  14. Indirect MR venography: contrast medium protocols, postprocessing and combination in diagnosing pulmonary emboli with MRI

    International Nuclear Information System (INIS)

    Kluge, A.; Bachmann, G.; Rominger, M.; Schoenburg, M.

    2004-01-01

    Purpose: Integration of MR venography in a comprehensive MR imaging protocol in patients with suspected pulmonary embolism (PE) and evaluation of contrast media dosage, timing and postprocessing for diagnostic accuracy. Materials and Methods: Fortyeight consecutive inpatients with suspected PE or deep vein thrombosis were examined by MR venography according to one of the following protocols: protocol I: MR venography only, 0.25 mmol/kg bodyweight (BW) Gadopentate dimeglumine(Gd-DTPA) as single dose, bolus timing; protocol II: MR angiography of pulmonary arteries with a cumulative dosage of 0.25 mmol/kg contrast media, modification of coil setting for MR venography without further contrast media application; protocol III: as protocol II but with 0.125 mmol/kg BW, followed by MR venography. Signal-to-noise ratio, contrast-to-noise ratio, number of definable vascular segments and image quality were evaluated. The results were compared to conventional bilateral venography. Results: All MR venography examinations were of diagnostic quality and the examination time was below 10 min. MR venography could be performed in all 48 patients comparted to 43 of 48 patients for conventional venography. Significantly more superficial and deep veins of the leg could be visualized by MR venography (94% compared to 83% for conventional venography). Sensitivity and specificity were 100% and 92%, respectively. Quality differed significantly between 0.125 mmol/kg (protocol III) and 0.25 mmol/kg Gd-DTPA (protocols I and II) while timing did not influence quality (protocol I vs. II). (orig.) [de

  15. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  16. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  17. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  18. Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier

    Science.gov (United States)

    Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-03-01

    In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.

  19. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  20. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  1. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  2. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  3. A comprehensive strategy for the analysis of acoustic compressibility and optical deformability on single cells

    DEFF Research Database (Denmark)

    Yang, Tie; Bragheri, Francesca; Nava, Giovanni

    2016-01-01

    We realized an integrated microfluidic chip that allows measuring both optical deformability and acoustic compressibility on single cells, by optical stretching and acoustophoresis experiments respectively. Additionally, we propose a measurement protocol that allows evaluating the experimental ap...

  4. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  5. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  6. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  7. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  8. Protocolized hyperventilation enhances electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Soria, Virginia; Salvat-Pujol, Neus; Ribes, Carmina; Sánchez-Allueva, Ana; Menchón, José Manuel; Urretavizcaya, Mikel

    2017-08-01

    Hyperventilation is recommended in electroconvulsive therapy (ECT) to enhance seizures and to increase patients' safety. However, more evidence is needed regarding its effects and the optimum method of application. This prospective study involving 21 subjects compared two procedures, protocolized hyperventilation (PHV) and hyperventilation as usual (HVau), applied to the same patient in two consecutive sessions. Transcutaneous partial pressure of carbon dioxide (TcPCO 2 ) was measured throughout all sessions. Ventilation parameters, hemodynamic measures, seizure characteristics, and side effects were also explored. PHV resulted in lower TcPCO 2 after hyperventilation (p=.008) and over the whole session (p=.035). The lowest TcPCO 2 was achieved after voluntary hyperventilation. Changes in TcPCO 2 from baseline showed differences between HVau and PHV at each session time-point (all p<.05). Between- and within-subjects factors were statistically significant in a general linear model. Seizure duration was greater in PHV sessions (p=.028), without differences in other seizure quality parameters or adverse effects. Correlations were found between hypocapnia induction and seizure quality indexes. Secondary outcomes could be underpowered. PHV produces hypocapnia before the stimulus, modifies patients' TcPCO 2 values throughout the ECT session and lengthens seizure duration. Voluntary hyperventilation is the most important part of the PHV procedure with respect to achieving hypocapnia. A specific ventilation approach, CO 2 quantification and monitoring may be advisable in ECT. PHV is easy to apply in daily clinical practice and does not imply added costs. Ventilation management has promising effects in terms of optimizing ECT technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  10. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  11. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  12. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  13. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  14. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  15. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  16. Scaling HEP to Web size with RESTful protocols: The frontier example

    International Nuclear Information System (INIS)

    Dykstra, Dave

    2011-01-01

    The World-Wide-Web has scaled to an enormous size. The largest single contributor to its scalability is the HTTP protocol, particularly when used in conformity to REST (REpresentational State Transfer) principles. High Energy Physics (HEP) computing also has to scale to an enormous size, so it makes sense to base much of it on RESTful protocols. Frontier, which reads databases with an HTTP-based RESTful protocol, has successfully scaled to deliver production detector conditions data from both the CMS and ATLAS LHC detectors to hundreds of thousands of computer cores worldwide. Frontier is also able to re-use a large amount of standard software that runs the Web: on the clients, caches, and servers. I discuss the specific ways in which HTTP and REST enable high scalability for Frontier. I also briefly discuss another protocol used in HEP computing that is HTTP-based and RESTful, and another protocol that could benefit from it. My goal is to encourage HEP protocol designers to consider HTTP and REST whenever the same information is needed in many places.

  17. Latency correction of event-related potentials between different experimental protocols

    Science.gov (United States)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  18. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Directory of Open Access Journals (Sweden)

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  19. Attacks on quantum key distribution protocols that employ non-ITS authentication

    Science.gov (United States)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  20. Genomic DNA extraction protocols from ovine hair

    Directory of Open Access Journals (Sweden)

    Jennifer Nonato da Silva Prate

    2013-12-01

    Full Text Available Genomic DNA extracted from animal cells can be used for several purposes, for example, to know genetic variability and genetic relationships between individuals, breeds and/or species, paternity tests, to describe the genetic profile for registration of the animal at association of breeders, detect genetic polymorphisms (SNP related to characteristics of commercial interest, disease diagnose, assess resistance or susceptibility to pathogens, etc. For such evaluations, in general, DNA is amplified by PCR (polymerase chain reaction, and then subjected to various techniques as RFLP (restriction fragments length polymorphism, SSCP (single strand conformation polymorphism, and sequencing. The DNA may be obtained from blood, buccal swabs, meat, cartilage or hair bulb. Among all, the last biological material has been preferred by farmers for its ease acquisition. Several methods for extracting DNA from hair bulb were reported without any consensus for its implementation. This study aimed to optimize a protocol for efficient DNA extraction for use in PCR-RFLP analysis of the Prion gene. For this study, were collected hair samples containing hair bulb from 131 Santa Inês sheep belonging to the Institute of Zootechny, Nova Odessa - SP. Two DNA extraction protocols were evaluated. The first, called phenol-chloroform-isoamyl alcohol (PCIA has long been used by Animal Genetic Laboratories, whose procedures are described below: in each microtube (1.5 mL containing 500 µL of TE-Tween solution (Tris-HCl 50 mM, EDTA 1 mM and 0.5% Tween 20 were added to approximately 30 hair bulb per animal which was incubated at 65°C with shaking at 170 rpm for 2 hours. Then was added 15 µL of proteinase K [10 mg mL-1] and incubated at 55°C at 170 rpm for 6-12 hours. At the end of digestion was added 1 volume of solution phenol-chloroform-isoamyl alcohol (25:24:1 followed by vigorous shaking for 10 seconds and centrifuged at 8000 rpm and 4°C for 10 minutes. The upper phase

  1. Authenticated multi-user quantum key distribution with single particles

    Science.gov (United States)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  2. Taking an idea to a research protocol

    African Journals Online (AJOL)

    2013-11-13

    Nov 13, 2013 ... Review Article: Taking an idea to a research protocol ... step is to identify the knowledge gap within the intended field of research by examining the background ... be found by writing a critical narrative review of the literature.

  3. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  4. Oxygen tolerance test : A standardised protocol

    Directory of Open Access Journals (Sweden)

    D K Ghosh

    2015-01-01

    Conclusion: By following a standardised protocol for Oxygen Tolerance Test, an objective assessment and recordkeeping is possible. This shall entail a more effective screening during the initial diving medical examination.

  5. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  6. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  7. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  8. Adaptive security protocol selection for mobile computing

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.

    2010-01-01

    The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for

  9. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  10. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  11. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  12. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  13. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  14. How to write a research protocol

    African Journals Online (AJOL)

    A research protocol is best viewed as a key to open the gates between the researcher and ... studies will be quantitative designs and these form the focus of this paper. ..... applied to the underlying clinical problem addressed by the study.

  15. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  16. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  17. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  18. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  19. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  20. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  1. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology ...

  2. Emulation of Industrial Control Field Device Protocols

    Science.gov (United States)

    2013-03-01

    today. The protocol operates at the application layer of the open systems interconnection ( OSI ) model, meaning it operates independently of the...the OSI model. Their job is to receive serial data from an MTU in the Modbus RTU or ASCII protocol, encapsulate and transmit the data to another modem...facing connection and out-of-band logging capabilities over the other LAN -facing connection. Despite the fact that the hardware configuration of the

  3. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  4. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  5. Broadening and Simplifying the First SETI Protocol

    Science.gov (United States)

    Michaud, M. A. G.

    The Declaration of Principles Concerning Activities Following the Detection of Extraterrestrial Intelligence, known informally as the First SETI Protocol, is the primary existing international guidance on this subject. During the fifteen years since the document was issued, several people have suggested revisions or additional protocols. This article proposes a broadened and simplified text that would apply to the detection of alien technology in our solar system as well as to electromagnetic signals from more remote sources.

  6. Dynamic Aggregation Protocol for Wireless Sensor Networks

    OpenAIRE

    Mounir Said , Adel; William Ibrahim , Ashraf; Soua , Ahmed; Afifi , Hossam

    2013-01-01

    International audience; Sensor networks suffer from limited capabilities such as bandwidth, low processing power, and memory size. There is therefore a need for protocols that deliver sensor data in an energy-efficient way to the sink. One of those techniques, it gathers sensors' data in a small size packet suitable for transmission. In this paper, we propose a new Effective Data Aggregation Protocol (DAP) to reduce the energy consumption in Wireless Sensor Networks (WSNs), which prolongs the...

  7. Control protocol: large scale implementation at the CERN PS complex - a first assessment

    International Nuclear Information System (INIS)

    Abie, H.; Benincasa, G.; Coudert, G.; Davydenko, Y.; Dehavay, C.; Gavaggio, R.; Gelato, G.; Heinze, W.; Legras, M.; Lustig, H.; Merard, L.; Pearson, T.; Strubin, P.; Tedesco, J.

    1994-01-01

    The Control Protocol is a model-based, uniform access procedure from a control system to accelerator equipment. It was proposed at CERN about 5 years ago and prototypes were developed in the following years. More recently, this procedure has been finalized and implemented at a large scale in the PS Complex. More than 300 pieces of equipment are now using this protocol in normal operation and another 300 are under implementation. These include power converters, vacuum systems, beam instrumentation devices, RF equipment, etc. This paper describes how the single general procedure is applied to the different kinds of equipment. The advantages obtained are also discussed. ((orig.))

  8. Current protocols in the management of oral submucous fibrosis: An update.

    Science.gov (United States)

    Arakeri, Gururaj; Rai, Kirthi Kumar; Boraks, George; Patil, Shekar Gowda; Aljabab, Abdulsalam S; Merkx, M A W; Carrozzo, Marco; Brennan, Peter A

    2017-07-01

    Oral submucous fibrosis (OSMF) is a debilitating condition of oral cavity which has significant potential for malignant transformation. In spite of over 20 years of research, the pathogenesis of the condition is still obscure and no single management modality is effective. Many OSMF treatment protocols have been proposed to alleviate the signs and symptoms of the disorder and there is overwhelming evidence that as areca nut is primary cause, stopping its use may have a considerable effect on symptoms rather than reversing pre-existing fibrosis. We present a review of the current protocols for managing OSMF. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  9. A protocol is not enough to implement an enhanced recovery programme for colorectal resection

    DEFF Research Database (Denmark)

    Maessen, J; Dejong, C.H.C.; Hausel, J

    2007-01-01

    BACKGROUND: Single-centre studies have suggested that enhanced recovery can be achieved with multimodal perioperative care protocols. This international observational study evaluated the implementation of an enhanced recovery programme in five European centres and examined the determinants...... with a shorter hospital stay. CONCLUSION: Functional recovery in 3 days after colorectal resection could be achieved in daily practice. A protocol is not enough to enable discharge of patients on the day of functional recovery; more experience and better organization of care may be required. Copyright (c) 2006...

  10. Sinusoidal voltage protocols for rapid characterisation of ion channel kinetics.

    Science.gov (United States)

    Beattie, Kylie A; Hill, Adam P; Bardenet, Rémi; Cui, Yi; Vandenberg, Jamie I; Gavaghan, David J; de Boer, Teun P; Mirams, Gary R

    2018-03-24

    Ion current kinetics are commonly represented by current-voltage relationships, time constant-voltage relationships and subsequently mathematical models fitted to these. These experiments take substantial time, which means they are rarely performed in the same cell. Rather than traditional square-wave voltage clamps, we fitted a model to the current evoked by a novel sum-of-sinusoids voltage clamp that was only 8 s long. Short protocols that can be performed multiple times within a single cell will offer many new opportunities to measure how ion current kinetics are affected by changing conditions. The new model predicts the current under traditional square-wave protocols well, with better predictions of underlying currents than literature models. The current under a novel physiologically relevant series of action potential clamps is predicted extremely well. The short sinusoidal protocols allow a model to be fully fitted to individual cells, allowing us to examine cell-cell variability in current kinetics for the first time. Understanding the roles of ion currents is crucial to predict the action of pharmaceuticals and mutations in different scenarios, and thereby to guide clinical interventions in the heart, brain and other electrophysiological systems. Our ability to predict how ion currents contribute to cellular electrophysiology is in turn critically dependent on our characterisation of ion channel kinetics - the voltage-dependent rates of transition between open, closed and inactivated channel states. We present a new method for rapidly exploring and characterising ion channel kinetics, applying it to the hERG potassium channel as an example, with the aim of generating a quantitatively predictive representation of the ion current. We fitted a mathematical model to currents evoked by a novel 8 second sinusoidal voltage clamp in CHO cells overexpressing hERG1a. The model was then used to predict over 5 minutes of recordings in the same cell in response to

  11. Protecting single-photon entanglement with practical entanglement source

    Science.gov (United States)

    Zhou, Lan; Ou-Yang, Yang; Wang, Lei; Sheng, Yu-Bo

    2017-06-01

    Single-photon entanglement (SPE) is important for quantum communication and quantum information processing. However, SPE is sensitive to photon loss. In this paper, we discuss a linear optical amplification protocol for protecting SPE. Different from the previous protocols, we exploit the practical spontaneous parametric down-conversion (SPDC) source to realize the amplification, for the ideal entanglement source is unavailable in current quantum technology. Moreover, we prove that the amplification using the entanglement generated from SPDC source as auxiliary is better than the amplification assisted with single photons. The reason is that the vacuum state from SPDC source will not affect the amplification, so that it can be eliminated automatically. This protocol may be useful in future long-distance quantum communications.

  12. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  13. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  14. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  15. Pelvic endometriosis with peritoneal fluid reduces pregnancy rates in women undergoing intrauterine insemination

    OpenAIRE

    Wu, Hong-Ming; Tzeng, Chii-Ruey; Chen, Chi-Hung; Chen, Pi-Hua

    2013-01-01

    Objective: This study investigated the occurrence of peritoneal fluid in women undergoing intrauterine insemination (IUI) and its correlation with the stage of pelvic endometriosis and its influence on pregnancy outcomes. Materials and Methods: A retrospective case–control design was used to recruit 272 infertile women with pelvic endometriosis. The treatment protocol consisted of controlled ovarian hyperstimulation with downregulation and gonadotropin for IUI treatment following ultrasoun...

  16. Generation of an arbitrary concatenated Greenberger-Horne-Zeilinger state with single photons

    Science.gov (United States)

    Chen, Shan-Shan; Zhou, Lan; Sheng, Yu-Bo

    2017-02-01

    The concatenated Greenberger-Horne-Zeilinger (C-GHZ) state is a new kind of logic-qubit entangled state, which may have extensive applications in future quantum communication. In this letter, we propose a protocol for constructing an arbitrary C-GHZ state with single photons. We exploit the cross-Kerr nonlinearity for this purpose. This protocol has some advantages over previous protocols. First, it only requires two kinds of cross-Kerr nonlinearities to generate single phase shifts  ±θ. Second, it is not necessary to use sophisticated m-photon Toffoli gates. Third, this protocol is deterministic and can be used to generate an arbitrary C-GHZ state. This protocol may be useful in future quantum information processing based on the C-GHZ state.

  17. Single cell transcriptomics of neighboring hyphae of Aspergillus niger

    Science.gov (United States)

    2011-01-01

    Single cell profiling was performed to assess differences in RNA accumulation in neighboring hyphae of the fungus Aspergillus niger. A protocol was developed to isolate and amplify RNA from single hyphae or parts thereof. Microarray analysis resulted in a present call for 4 to 7% of the A. niger genes, of which 12% showed heterogeneous RNA levels. These genes belonged to a wide range of gene categories. PMID:21816052

  18. Relationships of clinical protocols and reconstruction kernels with image quality and radiation dose in a 128-slice CT scanner: Study with an anthropomorphic and water phantom

    International Nuclear Information System (INIS)

    Paul, Jijo; Krauss, B.; Banckwitz, R.; Maentele, W.; Bauer, R.W.; Vogl, T.J.

    2012-01-01

    Research highlights: ► Clinical protocol, reconstruction kernel, reconstructed slice thickness, phantom diameter or the density of material it contains directly affects the image quality of DSCT. ► Dual energy protocol shows the lowest DLP compared to all other protocols examined. ► Dual-energy fused images show excellent image quality and the noise is same as that of single- or high-pitch mode protocol images. ► Advanced CT technology improves image quality and considerably reduce radiation dose. ► An important finding is the comparatively higher DLP of the dual-source high-pitch protocol compared to other single- or dual-energy protocols. - Abstract: Purpose: The aim of this study was to explore the relationship of scanning parameters (clinical protocols), reconstruction kernels and slice thickness with image quality and radiation dose in a DSCT. Materials and methods: The chest of an anthropomorphic phantom was scanned on a DSCT scanner (Siemens Somatom Definition flash) using different clinical protocols, including single- and dual-energy modes. Four scan protocols were investigated: 1) single-source 120 kV, 110 mA s, 2) single-source 100 kV, 180 mA s, 3) high-pitch 120 kV, 130 mA s and 4) dual-energy with 100/Sn140 kV, eff.mA s 89, 76. The automatic exposure control was switched off for all the scans and the CTDIvol selected was in between 7.12 and 7.37 mGy. The raw data were reconstructed using the reconstruction kernels B31f, B80f and B70f, and slice thicknesses were 1.0 mm and 5.0 mm. Finally, the same parameters and procedures were used for the scanning of water phantom. Friedman test and Wilcoxon-Matched-Pair test were used for statistical analysis. Results: The DLP based on the given CTDIvol values showed significantly lower exposure for protocol 4, when compared to protocol 1 (percent difference 5.18%), protocol 2 (percent diff. 4.51%), and protocol 3 (percent diff. 8.81%). The highest change in Hounsfield Units was observed with dual

  19. Single Photon Sources in Silicon Carbide

    International Nuclear Information System (INIS)

    Brett Johnson

    2014-01-01

    Single photon sources in semiconductors are highly sought after as they constitute the building blocks of a diverse range of emerging technologies such as integrated quantum information processing, quantum metrology and quantum photonics. In this presentation, we show the first observation of single photon emission from deep level defects in silicon carbide (SiC). The single photon emission is photo-stable at room temperature and surprisingly bright. This represents an exciting alternative to diamond color centers since SiC possesses well-established growth and device engineering protocols. The defect is assigned to the carbon vacancy-antisite pair which gives rise to the AB photoluminescence lines. We discuss its photo-physical properties and their fabrication via electron irradiation. Preliminary measurements on 3C SiC nano-structures will also be discussed. (author)

  20. Early Loaded Single Implant Reinforced Mandibular Overdenture

    Directory of Open Access Journals (Sweden)

    K. Nischal

    2016-01-01

    Full Text Available Rehabilitating atrophied mandible with two-implant supported denture is a common treatment modality for implant retained removable overdenture in mandible. This paper aims to design a treatment modality where single implant reinforced overdenture is fabricated for a severely atrophied mandibular ridge with early loading protocol. Results of studies have shown that a single implant mandibular overdenture significantly increases the satisfaction and quality of life of patients with edentulism. Midline fracture of the prosthesis is the most common complication related to single implant and two-implant retained mandibular overdentures. To manage such complication, a thin metal mesh is used to reinforce the overdenture and also to make the prostheses lighter and cost effective as compared to conventional cast metal framework.

  1. MDEP Protocol VICWG-01. MDEP Protocol: Witnessed, Joint, and Multinational Vendor Inspection Protocol

    International Nuclear Information System (INIS)

    2014-01-01

    The Multinational Design Evaluation Programme (MDEP) was launched in 2006 by the US Nuclear Regulatory Commission (NRC) and the French Nuclear Safety Authority (ASN) with the aim of developing innovative approaches to leverage the resources and knowledge of national regulatory authorities reviewing new reactor designs. MDEP full members are regulators from Canada, People's Republic of China, Finland, France, India, Japan, Republic of Korea, Russian Federation, South Africa, Sweden, the United Kingdom and the United States of America. The United Arab Emirates and Turkey are associate members. The OECD Nuclear Energy Agency (NEA) acts as the Technical Secretariat for the MDEP. The International Atomic Energy Agency (IAEA) participates in many of the MDEP activities, including harmonisation efforts. The Vendor Inspection Cooperation Working Group (VICWG) is one of the issue-specific working groups that the MDEP members are undertaking with one long term goal of the VICWG being to maximize the use of the results obtained from other regulator's efforts in inspecting vendors. To accomplish this goal, it is vital that the regulators learn about each other's procedures, processes, and regulations. To facilitate the learning process the VICWG is coordinating vendor inspections among the involved regulatory authorities with the purpose of enhancing the understanding of each other's vendor inspection procedures. This programme is administered by the NEA. Involvement in specific inspections provides a number of opportunities for member state regulators to witness other regulators' inspection methods, gain useful information on the quality systems and manufacturing arrangements of specific vendors and where appropriate, actively participate in the inspection. The purpose of this protocol is to provide guidance to regulators that wish to carry out vendor inspections or participate in or witness other regulators' vendor inspections. It also provides

  2. Assessment of Safety and Effectiveness of the Extracorporeal Continuous-Flow Ventricular Assist Device (BR16010) Use as a Bridge-to-Decision Therapy for Severe Heart Failure or Refractory Cardiogenic Shock: Study Protocol for Single-Arm Non-randomized, Uncontrolled, and Investigator-Initiated Clinical Trial.

    Science.gov (United States)

    Fukushima, Norihide; Tatsumi, Eisuke; Seguchi, Osamu; Takewa, Yoshiaki; Hamasaki, Toshimitsu; Onda, Kaori; Yamamoto, Haruko; Hayashi, Teruyuki; Fujita, Tomoyuki; Kobayashi, Junjiro

    2018-06-08

    The management of heart failure patients presenting in a moribund state remains challenging, despite significant advances in the field of ventricular assist systems. Bridge to decision involves using temporary devices to stabilize the hemodynamic state of such patients while further assessment is performed and a decision can be made regarding patient management. The purpose of this study (NCVC-BTD_01, National Cerebral and Cardiovascular Center-Bridge to Dicision_01) is to assess the safety and effectiveness of the newly developed extracorporeal continuous-flow ventricular assist system employing a disposable centrifugal pump with a hydrodynamically levitated bearing (BR16010) use as a bridge-to-decision therapy for patients with severe heart failure or refractory cardiogenic shock. NCVC-BTD_01 is a single-center, single-arm, open-label, exploratory, medical device, investigator-initiated clinical study. It is conducted at the National Cerebral and Cardiovascular Center in Japan. A total of nine patients will be enrolled in the study. The study was planned using Simon's minimax two-stage phase design. The primary endpoint is a composite of survival free of device-related serious adverse events and complications during device support. For left ventricular assistance, withdrawal of a trial device due to cardiac function recovery or exchange to other ventricular assist devices (VADs) for the purpose of bridge to transplantation (BTT) during 30 days after implantation will be considered study successes. For right ventricular assistance, withdrawal of tal device due to right ventricular function recovery within 30 days after implantation will be considered a study success. Secondary objectives include changes in brain natriuretic peptide levels (7 days after implantation of a trial device and the day of withdrawal of a trial device), period of mechanical ventricular support, changes in left ventricular ejection fraction (7 days after implantation of a trial device

  3. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  4. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  5. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  6. Three-Stage Quantum Cryptography Protocol under Collective-Rotation Noise

    Directory of Open Access Journals (Sweden)

    Linsen Wu

    2015-05-01

    Full Text Available Information security is increasingly important as society migrates to the information age. Classical cryptography widely used nowadays is based on computational complexity, which means that it assumes that solving some particular mathematical problems is hard on a classical computer. With the development of supercomputers and, potentially, quantum computers, classical cryptography has more and more potential risks. Quantum cryptography provides a solution which is based on the Heisenberg uncertainty principle and no-cloning theorem. While BB84-based quantum protocols are only secure when a single photon is used in communication, the three-stage quantum protocol is multi-photon tolerant. However, existing analyses assume perfect noiseless channels. In this paper, a multi-photon analysis is performed for the three-stage quantum protocol under the collective-rotation noise model. The analysis provides insights into the impact of the noise level on a three-stage quantum cryptography system.

  7. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  8. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  9. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  10. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  11. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  12. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  13. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  14. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  15. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  16. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  17. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  18. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  19. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  20. The SHIP: A SIP to HTTP Interaction Protocol

    Science.gov (United States)

    Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco

    IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.

  1. EFFICACY OF DIFFERENT ENDODONTIC IRRIGATION PROTOCOLS IN CALCIUM HYDROXIDE REMOVAL

    Directory of Open Access Journals (Sweden)

    Elka N. Radeva

    2016-10-01

    Full Text Available Introduction: Calcium hydroxide is widely used in the field of endodontics as a temporary root canal filling. This medicament significantly increases pH and optimizes the treatment outcome. Its total removal before final obturation is very important. Otherwise it could affect the hermetic filling and respectively the endodontic success. Aim: To evaluate the most effective irrigation protocol of calcium hydroxide removal from root canals. Materials and methods: In this study 36 single root canal teeth were observed. They were randomly divided into three groups (n=10 each group according to the technique applied for calcium hydroxide removal - manual irrigation, irrigation and Revo-S rotary instrumentation; and passive ultrasonic irrigation, and a control group (n=6 – irrigation with distilled water only. After calcium hydroxide removals following the procedures above, teeth were separated longitudinally in a buccal-lingual direction and remnants of medicaments were observed in the apical, middle and coronal part of each tooth. Then all of the specimens were observed using scanning electron microscopy and evaluated by a specified scale. The results have undergone statistical analysis. Results: In the case of calcium hydroxide in the apex and in the middle with highest average is Revo-S, followed by Ultrasonic and irrigation. In the coronal part the highest average belongs to Revo-S, irrigation and Ultrasonic. In all groups the highest average is represented by control group. Conclusion: There is not a universal technique for removal of intracanal medicaments and applying more than one protocol is required.

  2. The self-describing data sets file protocol and Toolkit

    International Nuclear Information System (INIS)

    Borland, M.; Emery, L.

    1995-01-01

    The Self-Describing Data Sets (SDDS) file protocol continues to be used extensively in commissioning the Advanced Photon Source (APS) accelerator complex. SDDS protocol has proved useful primarily due to the existence of the SDDS Toolkit, a growing set of about 60 generic commandline programs that read and/or write SDDS files. The SDDS Toolkit is also used extensively for simulation postprocessing, giving physicists a single environment for experiment and simulation. With the Toolkit, new SDDS data is displayed and subjected to complex processing without developing new programs. Data from EPICS, lab instruments, simulation, and other sources are easily integrated. Because the SDDS tools are commandline-based, data processing scripts are readily written using the user's preferred shell language. Since users work within a UNIX shell rather than an application-specific shell or GUI, they may add SDDS-compliant programs and scripts to their personal toolkits without restriction or complication. The SDDS Toolkit has been run under UNIX on SUN OS4, HP-UX, and LINUX. Application of SDDS to accelerator operation is being pursued using Tcl/Tk to provide a GUI

  3. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  4. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  5. Shoulder dystocia: simulation and a team-centered protocol.

    Science.gov (United States)

    Grobman, William A

    2014-06-01

    Shoulder dystocia is an obstetric emergency that has been reported to occur in 0.2-3% of all vaginal deliveries. Several characteristics of shoulder dystocia make it a particular challenge to manage effectively. It is relatively infrequent, the diagnosis cannot be made according to a single objective criterion that can be recognized to exist by all members of the care team who are present, it is unpredictable, and there is the need for coordinated actions of all members of the health care team who have come together on the day of the delivery and may not have worked together before or specifically during a shoulder dystocia. In general, there is evidence from different medical disciplines that checklists/protocols and simulation may be used to enhance team performance. There is also some evidence, albeit limited, that such techniques may be used to improve shoulder dystocia outcomes. Copyright © 2014 Elsevier Inc. All rights reserved.

  6. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  7. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  8. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  9. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  10. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  11. Will OPEC lose from the Kyoto Protocol?

    International Nuclear Information System (INIS)

    Barnett, Jon; Dessai, Suraje; Webber, Michael

    2004-01-01

    A range of energy-economy models forecast losses to members of the Organisation of Petroleum Exporting Countries (OPEC) should the Kyoto Protocol come into force. These forecasts are a powerful influence in the United Nations Framework Convention on Climate Change negotiations. They are used by OPEC to advance the agenda on the impacts of response measures, covertly arguing for compensation for lost oil revenues arising from implementation of the Protocol. This paper discusses this issue, and explores the key assumptions of these models and their uncertainties. Assumptions about carbon leakage, future availability of oil reserves, substitution, innovation, and capital turnover are considered. The paper suggests that losses will not affect OPEC countries equally, and that these losses are not likely to be as substantial as the models forecast. A range of policy measures are proposed to lessen any impact the Protocol may have on OPEC

  12. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  13. A secure distributed logistic regression protocol for the detection of rare adverse drug events.

    Science.gov (United States)

    El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat

    2013-05-01

    There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through

  14. Effects of Modification of Pain Protocol on Incidence of Post Operative Nausea and Vomiting.

    Science.gov (United States)

    Schwarzkopf, Ran; Snir, Nimrod; Sharfman, Zachary T; Rinehart, Joseph B; Calderon, Michael-David; Bahn, Esther; Harrington, Brian; Ahn, Kyle

    2016-01-01

    A Perioperative Surgical Home (PSH) care model applies a standardized multidisciplinary approach to patient care using evidence-based medicine to modify and improve protocols. Analysis of patient outcome measures, such as postoperative nausea and vomiting (PONV), allows for refinement of existing protocols to improve patient care. We aim to compare the incidence of PONV in patients who underwent primary total joint arthroplasty before and after modification of our PSH pain protocol. All total joint replacement PSH (TJR-PSH) patients who underwent primary THA (n=149) or TKA (n=212) in the study period were included. The modified protocol added a single dose of intravenous (IV) ketorolac given in the operating room and oxycodone immediate release orally instead of IV Hydromorphone in the Post Anesthesia Care Unit (PACU). The outcomes were (1) incidence of PONV and (2) average pain score in the PACU. We also examined the effect of primary anesthetic (spinal vs . GA) on these outcomes. The groups were compared using chi-square tests of proportions. The incidence of post-operative nausea in the PACU decreased significantly with the modified protocol (27.4% vs . 38.1%, p=0.0442). There was no difference in PONV based on choice of anesthetic or procedure. Average PACU pain scores did not differ significantly between the two protocols. Simple modifications to TJR-PSH multimodal pain management protocol, with decrease in IV narcotic use, resulted in a lower incidence of postoperative nausea, without compromising average PACU pain scores. This report demonstrates the need for continuous monitoring of PSH pathways and implementation of revisions as needed.

  15. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  16. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed

    2012-04-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network\\'s transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  17. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crawford, Alasdair J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gourisetti, Sri Nikhil [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Viswanathan, Vilayanur [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ferreira, Summer Rhodes [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schoenwald, David A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rosewater, David Martin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-04-01

    This Protocol provides a set of “best practices” for characterizing energy storage systems (ESSs) and measuring and reporting their performance. It serves as a basis for assessing how an ESS will perform with respect to key performance attributes relevant to different applications. It is intended to provide a valid and accurate basis for the comparison of different ESSs. By achieving the stated purpose, the Protocol will enable more informed decision-making in the selection of ESSs for various stationary applications. The Protocol identifies general information and technical specifications relevant in describing an ESS and also defines a set of test, measurement, and evaluation criteria with which to express the performance of ESSs that are intended for energy-intensive and/or power-intensive stationary applications. An ESS includes a storage device, battery management system, and any power conversion systems installed with the storage device. The Protocol is agnostic with respect to the storage technology and the size and rating of the ESS. The Protocol does not apply to single-use storage devices and storage devices that are not coupled with power conversion systems, nor does it address safety, security, or operations and maintenance of ESSs, or provide any pass/fail criteria.

  18. Quality improvement initiative: Preventative Surgical Site Infection Protocol in Vascular Surgery.

    Science.gov (United States)

    Parizh, David; Ascher, Enrico; Raza Rizvi, Syed Ali; Hingorani, Anil; Amaturo, Michael; Johnson, Eric

    2018-02-01

    Objective A quality improvement initiative was employed to decrease single institution surgical site infection rate in open lower extremity revascularization procedures. In an attempt to lower patient morbidity, we developed and implemented the Preventative Surgical Site Infection Protocol in Vascular Surgery. Surgical site infections lead to prolonged hospital stays, adjunctive procedure, and additive costs. We employed targeted interventions to address the common risk factors that predispose patients to post-operative complications. Methods Retrospective review was performed between 2012 and 2016 for all surgical site infections after revascularization procedures of the lower extremity. A quality improvement protocol was initiated in January 2015. Primary outcome was the assessment of surgical site infection rate reduction in the pre-protocol vs. post-protocol era. Secondary outcomes evaluated patient demographics, closure method, perioperative antibiotic coverage, and management outcomes. Results Implementation of the protocol decreased the surgical site infection rate from 6.4% to 1.6% p = 0.0137). Patient demographics and comorbidities were assessed and failed to demonstrate a statistically significant difference among the infection and no-infection groups. Wound closure with monocryl suture vs. staple proved to be associated with decreased surgical site infection rate ( p site infections in the vascular surgery population are effective and necessary. Our data suggest that there may be benefit in the incorporation of MRSA and Gram-negative coverage as part of the Surgical Care Improvement Project perioperative guidelines.

  19. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed; Abed-Meraim, Karim; Alouini, Mohamed-Slim

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network's transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  20. FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks.

    Science.gov (United States)

    Umar, Idris Abubakar; Mohd Hanapi, Zurina; Sali, A; Zulkarnain, Zuriati A

    2016-06-22

    Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.

  1. Performance analysis of signaling protocols on OBS switches

    Science.gov (United States)

    Kirci, Pinar; Zaim, A. Halim

    2005-10-01

    In this paper, Just-In-Time (JIT), Just-Enough-Time (JET) and Horizon signalling schemes for Optical Burst Switched Networks (OBS) are presented. These signaling schemes run over a core dWDM network and a network architecture based on Optical Burst Switches (OBS) is proposed to support IP, ATM and Burst traffic. In IP and ATM traffic several packets are assembled in a single packet called burst and the burst contention is handled by burst dropping. The burst length distribution in IP traffic is arbitrary between 0 and 1, and is fixed in ATM traffic at 0,5. Burst traffic on the other hand is arbitrary between 1 and 5. The Setup and Setup ack length distributions are arbitrary. We apply the Poisson model with rate λ and Self-Similar model with pareto distribution rate α to identify inter-arrival times in these protocols. We consider a communication between a source client node and a destination client node over an ingress and one or more multiple intermediate switches.We use buffering only in the ingress node. The communication is based on single burst connections in which, the connection is set up just before sending a burst and then closed as soon as the burst is sent. Our analysis accounts for several important parameters, including the burst setup, burst setup ack, keepalive messages and the optical switching protocol. We compare the performance of the three signalling schemes on the network under as burst dropping probability under a range of network scenarios.

  2. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  3. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  4. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  5. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    Rojas Blanco, Diana Lorena

    2013-01-01

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  6. Evolution of a C2 protocol gateway

    CSIR Research Space (South Africa)

    Duvenhage, A

    2008-06-01

    Full Text Available real-time or slower than real-time, depending on the type of link and the data source: The gateway normally reads logged raw protocol data much faster than real-time; a simulation could also start running slower than real-time if it requires too... inherent support for logging and playback of the raw protocol data. From a software architecture perspective, each link has a corresponding link component that is responsible for opening and closing the connection, as well as reading and writing...

  7. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom......Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any...

  8. Single-tube hydroponics as a novel idea for small-scale production of crop seed in a plant incubator.

    Science.gov (United States)

    Kuroda, Masaharu; Ikenaga, Sachiko

    2015-01-01

    We present a novel protocol for small-scale production of crop seed in a plant incubator termed "Single-tube hydroponics." Our protocol minimizes the materials and methods for cultivation whereby a large number of independent plants can be cultured in a limited space. This study may aid in the improvement of crop seed components, especially in the cultivation of transgenic plants.

  9. Single Audit: Single Audit Act Effectiveness Issues

    National Research Council Canada - National Science Library

    Thompson, Sally

    2002-01-01

    As discussed in the report we are releasing today, our work to review agency actions to ensure that recipients take timely and appropriate corrective actions to fix audit findings contained in single...

  10. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.

    Science.gov (United States)

    Scarani, Valerio; Renner, Renato

    2008-05-23

    We derive a bound for the security of quantum key distribution with finite resources under one-way postprocessing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, unconditional security follows immediately for standard protocols such as Bennett-Brassard 1984 and six-states protocol. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least N approximately 10(5) signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates.

  11. Hybrid entanglement concentration assisted with single coherent state

    International Nuclear Information System (INIS)

    Guo Rui; Zhou Lan; Sheng Yu-Bo; Gu Shi-Pu; Wang Xing-Fu

    2016-01-01

    Hybrid entangled state (HES) is a new type of entanglement, which combines the advantages of an entangled polarization state and an entangled coherent state. HES is widely discussed in the applications of quantum communication and computation. In this paper, we propose three entanglement concentration protocols (ECPs) for Bell-type HES, W-type HES, and cluster-type HES, respectively. After performing these ECPs, we can obtain the maximally entangled HES with some success probability. All the ECPs exploit the single coherent state to complete the concentration. These protocols are based on the linear optics, which are feasible in future experiments. (paper)

  12. Two-party secret key distribution via a modified quantum secret sharing protocol.

    Science.gov (United States)

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  13. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  14. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  15. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  16. Single-track handshake signaling with application to micropipelines and handshake circuits

    NARCIS (Netherlands)

    Berkel, van C.H.; Bink, A.J.

    1996-01-01

    Single-track handshake signaling is using the same wire for request and acknowledge signaling. After each 2-phase handshake the wire is back in its initial state. A sequence of three protocol definitions suggests both a design method for single-track circuits and a trade-off between their robustness

  17. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    is formalised in an extension of the LySa process calculus with blinding signatures. The analysis, which is fully automatic, pinpoints previously undiscovered flaws related to verifiability and accuracy and we suggest modifications of the protocol needed for validating these properties....

  18. Development of bull trout sampling protocols

    Science.gov (United States)

    R. F. Thurow; J. T. Peterson; J. W. Guzevich

    2001-01-01

    This report describes results of research conducted in Washington in 2000 through Interagency Agreement #134100H002 between the U.S. Fish and Wildlife Service (USFWS) and the U.S. Forest Service Rocky Mountain Research Station (RMRS). The purpose of this agreement is to develop a bull trout (Salvelinus confluentus) sampling protocol by integrating...

  19. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  20. The Nagoya Protocol: Fragmentation or Consolidation?

    Directory of Open Access Journals (Sweden)

    Carmen Richerzhagen

    2014-02-01

    Full Text Available In October, 2010, a protocol on access and benefit-sharing (ABS of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conservation, research and development, intellectual property rights, food security, health issues, climate change that are governed by different institutions and agreements. The Nagoya Protocol contributes to increased fragmentation. However, the question arises whether this new regulatory framework can help to advance the implementation of the ABS provisions of the Convention on Biological Diversity (CBD. This paper attempts to find an answer to that question by following three analytical steps. First, it analyzes the causes of change against the background of theories of institutional change. Second, it aims to assess the typology of the architecture in order to find out if this new set of rules will contribute to a more synergistic, cooperative or conflictive architecture of ABS governance. Third, the paper looks at the problem of “fit” and identifies criteria that can be used to assess the new ABS governance architecture with regard to its effectiveness.

  1. Real-time communication protocols: an overview

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Jansen, P.G.

    2003-01-01

    This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally

  2. Protocol design and implementation using formal methods

    NARCIS (Netherlands)

    van Sinderen, Marten J.; Ferreira Pires, Luis; Pires, L.F.; Vissers, C.A.

    1992-01-01

    This paper reports on a number of formal methods that support correct protocol design and implementation. These methods are placed in the framework of a design methodology for distributed systems that was studied and developed within the ESPRIT II Lotosphere project (2304). The paper focuses on

  3. On BAN logics for industrial security protocols

    NARCIS (Netherlands)

    Agray, N.; Hoek, van der W.; Vink, de E.P.; Dunin-Keplicz, B.; Nawarecki, E.

    2002-01-01

    This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism

  4. Radiotherapy QA of the DAHANCA 19 protocol

    DEFF Research Database (Denmark)

    Samsøe, E.; Andersen, E.; Hansen, C. R.

    2015-01-01

    Purpose/Objective: It has been demonstrated that nonadherence to protocol-specified radiotherapy (RT) requirements is associated with reduced survival, local control and potentially increased toxicity [1]. Thus, quality assurance (QA) of RT is important when evaluating the results of clinical...

  5. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbee...

  6. Semantics and logic for security protocols

    NARCIS (Netherlands)

    Jacobs, B.P.F.; Hasuo, I.

    2009-01-01

    This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prover support. The logic has formulas for sending and receiving messages (with nonces, public and private encryptions, etc.), and has both temporal and epistemic operators (describing the knowledge of

  7. Monitoring System with Two Central Facilities Protocol

    Directory of Open Access Journals (Sweden)

    Caesar Firdaus

    2017-03-01

    Full Text Available The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and implementing security protocol. In this research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could fulfill two of four cryptography objectives, consist of authentication and non-repudiation. The solid collaboration between central legitimization agency (CLA, central tabulating facility (CTF, and client is the main idea in two central facilities protocol. The utilization of AES algorithm could defend the data on transmission from man in the middle attack scenario. On the other hand, whitespace manipulation algorithm provided data integrity aspect of the document that is uploaded to the system itself. Both of the algorithm fulfill confidentiality, data integrity, and authentication.

  8. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  9. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Kurokawa, David

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete computa...

  10. Behaviour Protocols Verification: Fighting State Explosion

    Czech Academy of Sciences Publication Activity Database

    Mach, M.; Plášil, František; Kofroň, Jan

    2005-01-01

    Roč. 6, č. 2 (2005), s. 22-30 ISSN 1525-9293 R&D Projects: GA ČR(CZ) GA102/03/0672 Institutional research plan: CEZ:AV0Z10300504 Keywords : formal verification * software components * stateexplos ion * behavior protocols * parse trees Subject RIV: JC - Computer Hardware ; Software

  11. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.K.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt

  12. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 3. IPv6: The Next Generation Internet Protocol - IPv4 and its Shortcomings. Harsha Srinath. General Article Volume 8 Issue 3 March 2003 pp 33-41. Fulltext. Click here to view fulltext PDF. Permanent link:

  13. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 4. IPv6: The Next Generation Internet Protocol - New Features in IPv6. Harsha Srinath. General Article Volume 8 Issue 4 April 2003 pp 8-16. Fulltext. Click here to view fulltext PDF. Permanent link:

  14. Rethinking Protocol Analysis from a Cultural Perspective.

    Science.gov (United States)

    Smagorinsky, Peter

    2001-01-01

    Outlines a cultural-historical activity theory (CHAT) perspective that accounts for protocol analysis along three key dimensions: the relationship between thinking and speech from a representational standpoint; the social role of speech in research methodology; and the influence of speech on thinking and data collection. (Author/VWL)

  15. Current Sterilization Protocols-An Orthodontic Perspective

    Directory of Open Access Journals (Sweden)

    Abraham Vinod Korath

    2010-01-01

    Part I of this article focuses on the working principles of various methods of sterilization with an appraisalof their effects on orthodontic instruments. Additionally,contributory factors of instrument damage is enumerated to emphasis the importance of adhering to precise protocols and manufacturer recommendations as well as in alleviating some misconceptions about sterilization induced instrument damage.

  16. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  17. International protocol on volatile organic compounds

    International Nuclear Information System (INIS)

    Gauthier, J.-P.

    1992-01-01

    In August 1991, negotiations between Canada, the USA, and 33 European countries led to an international protocol on reducing the emissions of volatile organic compounds (VOC), which are responsible for serious ozone pollution problems. This was the third transborder pollution agreement developed under the auspices of the United Nations Economic Commission for Europe. Certain aspects of negotiations related to an earlier protocol developed for SO 2 and nitrogen oxide emissions had reappeared during the VOC negotiations, and these aspects are discussed. The VOC protocol proposes three approaches to satisfy basic obligations: reducing VOC emissions of a country by 30%, reducing VOC emissions by 30% in certain regions, and ensuring a freeze in VOC emissions in a country starting on a specified date. The protocol also introduces a new concept, that of zones of tropospheric ozone management. In Canada, plans for management of nitrogen oxides and VOC have been adapted to the ozone problem, and the management plan has been developed by a consultation process involving all sectors of society including industry, environmental groups, and governments. In Canada, it will be sufficient to reduce total VOC emissions by 16% during a first phase and to increase these reductions slightly in the second phase. Special ozone management zones in the Quebec City/Windsor corridor and the Fraser River valley have been established

  18. Performance comparison of secure comparison protocols

    NARCIS (Netherlands)

    Kerschbaum, F.; Biswas, D.; Hoogh, de S.J.A.

    2009-01-01

    Secure multiparty computation (SMC) has gained tremendous importance with the growth of the Internet and e-commerce, where mutually untrusted parties need to jointly compute a function of their private inputs. However, SMC protocols usually have very high computational complexities, rendering them

  19. Novel protocol for persister cells isolation.

    Directory of Open Access Journals (Sweden)

    Silvia J Cañas-Duarte

    Full Text Available Bacterial persistence, where a fraction of a population presents a transient resistance to bactericidal substances, has great medical importance due to its relation with the appearance of antibiotic resistances and untreatable bacterial chronic infections. The mechanisms behind this phenomenon remain largely unknown in spite of recent advances, in great part because of the difficulty in isolating the very small fraction of the population that is in this state at any given time. Current protocols for persister isolation have resulted in possible biases because of the induction of this state by the protocol itself. Here we present a novel protocol that allows rapid isolation of persister cells both from exponential and stationary phase. Moreover, it is capable of differentiating between type I and type II persister cells, which should allow the field to move beyond its current state of studying only one type. While this protocol prompts a revision of many of the current results, it should greatly facilitate further advances in the field.

  20. Direct data access protocols benchmarking on DPM

    Science.gov (United States)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.